{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T21:35:54Z","timestamp":1769204154813,"version":"3.49.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030321680","type":"print"},{"value":"9783030321697","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-32169-7_4","type":"book-chapter","created":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T18:10:26Z","timestamp":1569953426000},"page":"36-49","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["CBRN Risk Analysis Using the Analytical Tools of the WAZkA System"],"prefix":"10.1007","author":[{"given":"Ryszard","family":"Antkiewicz","sequence":"first","affiliation":[]},{"given":"Zbigniew","family":"Tarapata","sequence":"additional","affiliation":[]},{"given":"Dariusz","family":"Pierzcha\u0142a","sequence":"additional","affiliation":[]},{"given":"Jaros\u0142aw","family":"Rulka","sequence":"additional","affiliation":[]},{"given":"Andrzej","family":"Najgebauer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,2]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.jlp.2013.07.014","volume":"28","author":"ON Aneziris","year":"2014","unstructured":"Aneziris, O.N., Papazoglou, I.A., Konstantinidou, M., Nivolianitou, Z.: Integrated risk assessment for LNG terminals. J. Loss Prev. Process Ind. 28, 23\u201335 (2014)","journal-title":"J. Loss Prev. Process Ind."},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-642-13568-2_12","volume-title":"Analytical and Stochastic Modeling Techniques and Applications","author":"R Antkiewicz","year":"2010","unstructured":"Antkiewicz, R., G\u0105secki, A., Najgebauer, A., Pierzcha\u0142a, D., Tarapata, Z.: Stochastic PERT and CAST logic approach for computer support of complex operation planning. In: Al-Begain, K., Fiems, D., Knottenbelt, William J. (eds.) ASMTA 2010. LNCS, vol. 6148, pp. 159\u2013173. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13568-2_12"},{"issue":"4","key":"4_CR3","first-page":"15","volume":"36","author":"T Binek","year":"2014","unstructured":"Binek, T., Czepiel, J.: The national system of contamination detection and alarm, currently operating in Poland. BiTP 36(4), 15\u201324 (2014)","journal-title":"BiTP"},{"issue":"4","key":"4_CR4","first-page":"147","volume":"46","author":"D Grabowski","year":"2001","unstructured":"Grabowski, D., Kurowski, W., Muszynski, W., Rubel, B., Smagala, G., Swietochowska, J.: Radiation monitoring network in Poland. Nukleonika 46(4), 147\u2013149 (2001)","journal-title":"Nukleonika"},{"issue":"1","key":"4_CR5","first-page":"48","volume":"58","author":"L Jelemensk\u00fd","year":"2004","unstructured":"Jelemensk\u00fd, L., Harisov\u00e1, J., Moln\u00e1r, A., Marko, J.: Reliable risk estimation in the risk analysis of chemical industry case study: ammonia storage pressurized spherical tank. Chem. Pap. Slovak Acad. Sci. 58(1), 48\u201354 (2004)","journal-title":"Chem. Pap. Slovak Acad. Sci."},{"key":"4_CR6","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-030-00840-6_18","volume-title":"Computer and Information Sciences","author":"W Kulas","year":"2018","unstructured":"Kulas, W., Tarapata, Z.: An IT tool to support anti-crisis training in WAZkA system: a case study. In: Czach\u00f3rski, T., Gelenbe, E., Grochla, K., Lent, R. (eds.) ISCIS 2018. CCIS, vol. 935, pp. 158\u2013165. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00840-6_18"},{"issue":"4","key":"4_CR7","first-page":"143","volume":"46","author":"P Lipi\u0144ski","year":"2001","unstructured":"Lipi\u0144ski, P., Isajenko, K., Biernacka, M., \u017bak, A.: Integration of polish monitoring networks (ASS-500 and PMS systems). Nukleonika 46(4), 143\u2013146 (2001)","journal-title":"Nukleonika"},{"issue":"4","key":"4_CR8","first-page":"133","volume":"40","author":"M Mlynarczyk","year":"2015","unstructured":"Mlynarczyk, M., Maciejewski, P., Szerszen, M.: CBRN analysis and SI Promie\u0144 \u2013 comparison of the functionality of the software for the assessment of contamination. BiTP 40(4), 133\u2013138 (2015)","journal-title":"BiTP"},{"issue":"3","key":"4_CR9","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1111\/j.1539-6924.1984.tb00137.x","volume":"4","author":"ME Pate-Cornell","year":"1984","unstructured":"Pate-Cornell, M.E.: Fault trees vs. event trees in reliability analysis. Risk Anal. 4(3), 177\u2013186 (1984)","journal-title":"Risk Anal."},{"key":"4_CR10","unstructured":"Sch\u00fcller, J.C.H., Brinkman, J.L., Van Gestel, P.J., van Otterloo, R.W.: Methods for Determining and Processing Probabilities, Committee for Prevention of Disasters (Red Book), The Hague, Netherlands (1997)"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Tarapata, Z., et al.: A computer system for CBRN contamination threats analysis support, prediction their effects and alarming the population: polish case study. In: CSCC 2017, MATEC Web of Conferences, vol. 125, p. 02012 (2017)","DOI":"10.1051\/matecconf\/201712502012"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Tu\u015bnio, R.: Applications for mobile devices informing about threats. In: FESE 2018, MATEC Web of Conferences, vol. 247, p. 00012 (2018)","DOI":"10.1051\/matecconf\/201824700012"},{"key":"4_CR13","unstructured":"Uijt de Haag, P.A.M., Ale, B.J.M.: Guidelines for Quantitative Risk Assessment (Purple Book), The Advisory Council on Dangerous Substances, The Hague, Netherlands (2005)"},{"key":"4_CR14","unstructured":"Aloha Software Homepage. https:\/\/www.epa.gov\/cameo\/aloha-software. Accessed 05 Dec 2018"},{"key":"4_CR15","unstructured":"digitexCZK\/IP System Homepage. https:\/\/www.publicalerting.com\/products\/public-warning-system\/advantages-of-digitexczkip\/. Accessed 05 Dec 2018"},{"key":"4_CR16","unstructured":"LOGAN System Homepage. http:\/\/loganfta.com. Accessed 05 Dec 2018"},{"key":"4_CR17","unstructured":"TERYT register Homepage. http:\/\/eteryt.stat.gov.pl\/eTeryt\/english.aspx. Accessed 31 Dec 2018"},{"key":"4_CR18","unstructured":"WAZkA Project Homepage. http:\/\/wazka.wat.edu.pl\/. Accessed 05 Dec 2018"}],"container-title":["IFIP Advances in Information and Communication Technology","Information Technology in Disaster Risk Reduction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32169-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:16:56Z","timestamp":1696119416000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-32169-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030321680","9783030321697"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32169-7_4","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"2 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ITDRR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Technology in Disaster Risk Reduction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poznan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"itdrr2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/itdrr.unwe.bg\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"n\/a","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}