{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T09:29:20Z","timestamp":1743067760553,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030321680"},{"type":"electronic","value":"9783030321697"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-32169-7_5","type":"book-chapter","created":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T18:10:26Z","timestamp":1569953426000},"page":"50-65","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Analyzing Cascading Effects in Interdependent Critical Infrastructures"],"prefix":"10.1007","author":[{"given":"Ahmed","family":"Abdelgawad","sequence":"first","affiliation":[]},{"given":"Mohamed","family":"Saleh","sequence":"additional","affiliation":[]},{"given":"Jose","family":"Gonzalez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,2]]},"reference":[{"key":"5_CR1","unstructured":"Norwegian Directorate for Civil Protection (DSB): Risikoanalyse av \u00abCyberangrep mot ekom-infrastruktur\u00bb (2015)"},{"key":"5_CR2","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.ress.2013.06.040","volume":"121","author":"M Ouyang","year":"2014","unstructured":"Ouyang, M.: Review on modeling and simulation of interdependent critical infrastructure systems. Reliab. Eng. Syst. Saf. 121, 43\u201360 (2014). https:\/\/doi.org\/10.1016\/j.ress.2013.06.040","journal-title":"Reliab. Eng. Syst. Saf."},{"volume-title":"The Delphi method: techniques and applications","year":"1975","key":"5_CR3","unstructured":"Linstone, H.A., Turoff, M. (eds.): The Delphi method: techniques and applications. Addison-Wesley Pub. Co., Advanced Book Program, Reading (1975)"},{"key":"5_CR4","volume-title":"The Wisdom of Crowds","author":"J Surowiecki","year":"2005","unstructured":"Surowiecki, J.: The Wisdom of Crowds. Anchor Books, New York (2005)"},{"key":"5_CR5","unstructured":"Canzani, E.: Modeling dynamics of disruptive events for impact analysis in networked critical infrastructures. In: Tapia, A., Antunes, P., Ba\u00f1uls, V.A., Moore, K., Porto, J. (eds.) ISCRAM 2016 Conference Proceedings \u2013 13th International Conference on Information Systems for Crisis Response and Management. Federal University of Rio de Janeiro, Rio de Janeiro, Brasil (2016)"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Abdelgawad, A.A., Farstad, T.-E., Gonzalez, J.J.: Vulnerability analysis of interdependent critical infrastructures upon a cyber-attack. In: Proceedings of the 52nd Hawaii International Conference on System Sciences., Hawaii, USA (2019)","DOI":"10.24251\/HICSS.2019.078"},{"key":"5_CR7","unstructured":"Laug\u00e9, A.: Crisis Management Toolbox: the Relevant Role of Critical Infrastructures and their Dependencies (2014). http:\/\/hdl.handle.net\/10171\/37071"},{"key":"5_CR8","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.ijcip.2014.12.004","volume":"8","author":"A Laug\u00e9","year":"2015","unstructured":"Laug\u00e9, A., Hernantes, J., Sarriegi, J.M.: Critical infrastructure dependencies: a holistic, dynamic and quantitative approach. Int. J. Crit. Infrastruct. Prot. 8, 16\u201323 (2015). https:\/\/doi.org\/10.1016\/j.ijcip.2014.12.004","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"5_CR9","unstructured":"European Commission: Green Paper on a European Programme for Critical Infrastructure Protection, COM (2005) 576 Final (2005). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/ALL\/?uri=CELEX:52005DC0576"},{"key":"5_CR10","doi-asserted-by":"publisher","unstructured":"Panula-Ontto, J.: EXIT method for cross-impact analysis. Unpublished (2016). https:\/\/doi.org\/10.13140\/rg.2.2.17159.09121","DOI":"10.13140\/rg.2.2.17159.09121"},{"key":"5_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53622-3","volume-title":"Graph Theory","author":"R Diestel","year":"2017","unstructured":"Diestel, R.: Graph Theory. Springer-Verlag, Berlin Heidelberg (2017)"},{"key":"5_CR12","volume-title":"Advanced Engineering Mathematics","author":"E Kreyszig","year":"2011","unstructured":"Kreyszig, E.: Advanced Engineering Mathematics. Wiley, Hoboken (2011)"},{"key":"5_CR13","volume-title":"Automatic Control Systems","author":"BC Kuo","year":"2003","unstructured":"Kuo, B.C.: Automatic Control Systems. John Wiley & Sons, New York (2003)"},{"key":"5_CR14","volume-title":"Modern Control Engineering","author":"K Ogata","year":"2009","unstructured":"Ogata, K.: Modern Control Engineering. Pearson, Boston (2009)"},{"key":"5_CR15","first-page":"45","volume":"12","author":"K Chao","year":"2008","unstructured":"Chao, K.: A new look at the cross-impact matrix and its application in futures studies. J. Futur. Stud. 12, 45\u201352 (2008)","journal-title":"J. Futur. Stud."},{"key":"5_CR16","volume-title":"Digraph Toolbox - A Tutorial, Electric Power Engineering Department","author":"M Bahar","year":"1994","unstructured":"Bahar, M., Jantzen, J.: Digraph Toolbox - A Tutorial, Electric Power Engineering Department. Technical University of Denmark, Kgs. Lyngby (1994)"},{"key":"5_CR17","unstructured":"Abdelgawad, A.: Automated Eigenvalue analysis of SD models (2004)"}],"container-title":["IFIP Advances in Information and Communication Technology","Information Technology in Disaster Risk Reduction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32169-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:17:06Z","timestamp":1696119426000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-32169-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030321680","9783030321697"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32169-7_5","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"2 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ITDRR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Technology in Disaster Risk Reduction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poznan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"itdrr2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/itdrr.unwe.bg\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"n\/a","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}