{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:06:09Z","timestamp":1743077169495,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030376697"},{"type":"electronic","value":"9783030376703"}],"license":[{"start":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T00:00:00Z","timestamp":1576800000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-37670-3_15","type":"book-chapter","created":{"date-parts":[[2019,12,19]],"date-time":"2019-12-19T18:03:40Z","timestamp":1576778620000},"page":"176-181","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Dynamic Risk Assessment (DRA) Methodology for High Impact Low Probability (HILP) Security Risks"],"prefix":"10.1007","author":[{"given":"Carlo","family":"Dambra","sequence":"first","affiliation":[]},{"given":"Chanan","family":"Graf","sequence":"additional","affiliation":[]},{"given":"Jordi","family":"Arias","sequence":"additional","affiliation":[]},{"given":"Alex","family":"Gralewski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,20]]},"reference":[{"key":"15_CR1","unstructured":"UK Government Office for Science: Blackett Review of High Impact Low Probability Risks, London (2011)"},{"issue":"4","key":"15_CR2","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1111\/j.1539-6924.2010.01401.x","volume":"30","author":"B Ezell","year":"2010","unstructured":"Ezell, B., Bennet, S., von Winterfeldt, D., Sokolowski, J., Collins, A.: Probabilistic risk analysis and terrorism risk. Risk Anal. 30(4), 575\u2013589 (2010)","journal-title":"Risk Anal."},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Brynielsson, J., Horndahl, A., Johansson, F., Kaati, L., Martenson, C., Svenson, P.: Analysis of weak signals for detecting lone wolf terrorists. In: 2012 IEEE European Intelligence and Security Informatics Conference (2012)","DOI":"10.1109\/EISIC.2012.20"},{"issue":"3","key":"15_CR4","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1111\/0272-4332.00056","volume":"22","author":"ML Pat\u00e9-Cornell","year":"2002","unstructured":"Pat\u00e9-Cornell, M.L.: Fusion of intelligence information: a Bayesian approach. Risk Anal. 22(3), 445\u2013454 (2002)","journal-title":"Risk Anal."},{"key":"15_CR5","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.futures.2011.10.002","volume":"44","author":"M Holopainen","year":"2012","unstructured":"Holopainen, M., Toivonen, M.: Weak signals: ansoff today. Futures 44, 198\u2013205 (2012)","journal-title":"Futures"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Chakir, E., Moughit, M., Khamlichi, Y.: A real-time risk assessment model for intrusion detection systems. In: 2017 IEEE International Symposium on Networks, Computers and Communications (ISNCC) (2017)","DOI":"10.1109\/ISNCC.2017.8071990"},{"key":"15_CR7","unstructured":"North Atlantic Treaty Organization (NATO) Information Handling Services: Annex to STANAG 2022 (Edition 8) (1992)"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Vu, H.: Deep Abnormality Detection in Video Data, Melbourne (2017)","DOI":"10.24963\/ijcai.2017\/768"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Xu, D., Ricci, E., Yan, Y., Song, J., Sebe, N.: Learning deep representations of appearance and motion for anomalous event detection (2015)","DOI":"10.5244\/C.29.8"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Hasan, M., Choi, J., Neumann, J., Roy-Chowdhury, A.K., Davis, L.S.: Learning temporal regularity in video sequences, Las Vegas (2016)","DOI":"10.1109\/CVPR.2016.86"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Strom, K.J., Hollywood, J.P.M.: Using 911 calls to detect terrorism threats, June 2009. \nhttps:\/\/www.nij.gov\/journals\/263\/pages\/911-calls.aspx","DOI":"10.1037\/e516022010-005"},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1016\/S0950-7051(00)00073-3","volume":"14","author":"PJF Lucas","year":"2001","unstructured":"Lucas, P.J.F.: Certainty-factor-like structures in Bayesian belief networks. Knowl.-Based Syst. 14, 327\u2013335 (2001)","journal-title":"Knowl.-Based Syst."},{"key":"15_CR13","unstructured":"UK HM Treasury: Orange Book: Management of risk - Principles and Concepts, London (2004)"},{"issue":"3","key":"15_CR14","first-page":"80","volume":"50","author":"PJH Schoemaker","year":"2009","unstructured":"Schoemaker, P.J.H., Day, G.S.: How to make sense of weak signals. MIT Sloan Manag. Rev. 50(3), 80\u201389 (2009)","journal-title":"MIT Sloan Manag. Rev."}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-37670-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,4]],"date-time":"2020-09-04T12:16:04Z","timestamp":1599221764000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-37670-3_15"}},"subtitle":["Short Paper"],"short-title":[],"issued":{"date-parts":[[2019,12,20]]},"ISBN":["9783030376697","9783030376703"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-37670-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019,12,20]]},"assertion":[{"value":"20 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CRITIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Critical Information Infrastructures Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Link\u00f6ping","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"critis2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/critis2019.on.liu.se\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}