{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:40:50Z","timestamp":1743144050485,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030376697"},{"type":"electronic","value":"9783030376703"}],"license":[{"start":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T00:00:00Z","timestamp":1576800000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T00:00:00Z","timestamp":1576800000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-37670-3_5","type":"book-chapter","created":{"date-parts":[[2019,12,19]],"date-time":"2019-12-19T18:03:40Z","timestamp":1576778620000},"page":"57-68","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Aggregating Centrality Rankings: A Novel Approach to Detect Critical Infrastructure Vulnerabilities"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7257-4079","authenticated-orcid":false,"given":"Gabriele","family":"Oliva","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7284-9690","authenticated-orcid":false,"given":"Annunziata","family":"Esposito Amideo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3510-9896","authenticated-orcid":false,"given":"Stefano","family":"Starita","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8792-2520","authenticated-orcid":false,"given":"Roberto","family":"Setola","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2725-5439","authenticated-orcid":false,"given":"Maria Paola","family":"Scaparra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,20]]},"reference":[{"issue":"2","key":"5_CR1","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1080\/09535310701330233","volume":"19","author":"CW Anderson","year":"2007","unstructured":"Anderson, C.W., Santos, J.R., Haimes, Y.Y.: A risk-based input-output methodology for measuring the effects of the August 2003 northeast blackout. Econ. Syst. Res. 19(2), 183\u2013204 (2007)","journal-title":"Econ. Syst. Res."},{"issue":"6162","key":"5_CR2","doi-asserted-by":"publisher","first-page":"1069","DOI":"10.1126\/science.1242642","volume":"342","author":"OP Popova","year":"2013","unstructured":"Popova, O.P., et al.: Chelyabinsk airburst, damage assessment, meteorite recovery, and characterization. Science 342(6162), 1069\u20131073 (2013)","journal-title":"Science"},{"key":"5_CR3","series-title":"Topics in Safety, Risk, Reliability and Quality","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04426-2","volume-title":"Railway Infrastructure Security","year":"2015","unstructured":"Setola, R., Sforza, A., Vittorini, V., Pragliola, C. (eds.): Railway Infrastructure Security. TSRRQ, vol. 27. Springer, Cham (2015). \n                    https:\/\/doi.org\/10.1007\/978-3-319-04426-2"},{"issue":"1","key":"5_CR4","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1504\/IJSSE.2010.035380","volume":"2","author":"R Setola","year":"2010","unstructured":"Setola, R.: How to measure the degree of interdependencies among critical infrastructures. Int. J. Syst. Syst. Eng. 2(1), 38\u201359 (2010)","journal-title":"Int. J. Syst. Syst. Eng."},{"unstructured":"Faramondi, L., et al.: Network structural vulnerability: a multiobjective attacker perspective. IEEE Trans. Syst. Man Cybern. Syst. (99), 1\u201314 (2018)","key":"5_CR5"},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.ijcip.2015.05.003","volume":"10","author":"G Stergiopoulos","year":"2015","unstructured":"Stergiopoulos, G., Kotzanikolaou, P., Theocharidou, M., Gritzalis, D.: Risk mitigation strategies for critical infrastructures based on graph centrality analysis. Int. J. Crit. Infrastruct. Prot. 10, 34\u201344 (2015)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"issue":"1\u20134","key":"5_CR7","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/s40747-016-0006-8","volume":"1","author":"X Chen","year":"2015","unstructured":"Chen, X.: Critical nodes identification in complex systems. Complex Intell. Syst. 1(1\u20134), 37\u201356 (2015)","journal-title":"Complex Intell. Syst."},{"key":"5_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.physrep.2016.06.007","volume":"650","author":"L L\u00fc","year":"2016","unstructured":"L\u00fc, L., Chen, D., Ren, X.-L., Zhang, Q.-M., Zhang, Y.-C., Zhou, T.: Vital nodes identification in complex networks. Phys. Rep. 650, 1\u201363 (2016)","journal-title":"Phys. Rep."},{"issue":"2","key":"5_CR9","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s10922-016-9391-y","volume":"25","author":"DF Rueda","year":"2017","unstructured":"Rueda, D.F., Calle, F., Marzo, J.L.: Robustness comparison of 15 real telecommunication networks: structural and centrality measurements. J. Netw. Syst. Manag. 25(2), 269\u2013289 (2017)","journal-title":"J. Netw. Syst. Manag."},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-319-99843-5_13","volume-title":"Critical Information Infrastructures Security","author":"S Starita","year":"2018","unstructured":"Starita, S., Esposito Amideo, A., Scaparra, M.P.: Assessing urban rail transit systems vulnerability: metrics vs. interdiction models. In: D\u2019Agostino, G., Scala, A. (eds.) CRITIS 2017. LNCS, vol. 10707, pp. 144\u2013155. Springer, Cham (2018). \n                    https:\/\/doi.org\/10.1007\/978-3-319-99843-5_13"},{"issue":"3","key":"5_CR11","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/0022-2496(77)90033-5","volume":"15","author":"TL Saaty","year":"1977","unstructured":"Saaty, T.L.: A scaling method for priorities in hierarchical structures. J. Math. Psychol. 15(3), 234\u2013281 (1977)","journal-title":"J. Math. Psychol."},{"issue":"3\u20135","key":"5_CR12","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1016\/0270-0255(87)90489-1","volume":"9","author":"GB Crawford","year":"1987","unstructured":"Crawford, G.B.: The geometric mean procedure for estimating the scale of a judgement matrix. Math. Model. 9(3\u20135), 327\u2013334 (1987)","journal-title":"Math. Model."},{"issue":"3","key":"5_CR13","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/0167-6377(87)90026-5","volume":"6","author":"J Barzilai","year":"1987","unstructured":"Barzilai, J., Cook, W.D., Golany, B.: Consistent weights for judgements matrices of the relative importance of alternatives. Oper. Res. Lett. 6(3), 131\u2013134 (1987)","journal-title":"Oper. Res. Lett."},{"issue":"1\u20132","key":"5_CR14","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1016\/j.mcm.2010.02.047","volume":"52","author":"S Boz\u00f3ki","year":"2010","unstructured":"Boz\u00f3ki, S., F\u00fcl\u00f6p, J., R\u00f3nyai, L.: On optimal completion of incomplete pairwise comparison matrices. Math. Comput. Model. 52(1\u20132), 318\u2013333 (2010)","journal-title":"Math. Comput. Model."},{"key":"5_CR15","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.automatica.2017.07.051","volume":"85","author":"G Oliva","year":"2017","unstructured":"Oliva, G., Setola, R., Scala, A.: Sparse and distributed analytic hierarchy process. Automatica 85, 211\u2013220 (2017)","journal-title":"Automatica"},{"doi-asserted-by":"crossref","unstructured":"Boz\u00f3ki, S., Tsyganok, V.: The (logarithmic) least squares optimality of the arithmetic (geometric) mean of weight vectors calculated from all spanning trees for incomplete additive (multiplicative) pairwise comparison matrices. Int. J. Gen. Syst. (2019, to appear)","key":"5_CR16","DOI":"10.1080\/03081079.2019.1585432"},{"doi-asserted-by":"crossref","unstructured":"Fagin, R., Kumar, R., Mahdian, M., Sivakumar, D., Vee, E.: Comparing and aggregating rankings with ties. In: Proceedings of the Twenty-Third ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 47\u201358. ACM (2004)","key":"5_CR17","DOI":"10.1145\/1055558.1055568"},{"key":"5_CR18","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.eswa.2017.01.051","volume":"78","author":"E Dopazo","year":"2017","unstructured":"Dopazo, E., Mart\u00ednez-C\u00e9spedes, M.L.: Rank aggregation methods dealing with ordinal uncertain preferences. Expert Syst. Appl. 78, 103\u2013109 (2017)","journal-title":"Expert Syst. Appl."},{"key":"5_CR19","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.dss.2017.03.006","volume":"97","author":"JA Aledo","year":"2017","unstructured":"Aledo, J.A., G\u00e1mez, J.A., Rosete, A.: Utopia in the solution of the bucket order problem. Decis. Support Syst. 97, 69\u201380 (2017)","journal-title":"Decis. Support Syst."},{"key":"5_CR20","series-title":"Graduate Text in Mathematics","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-0163-9","volume-title":"Algebraic Graph Theory","author":"C Godsil","year":"2001","unstructured":"Godsil, C., Royle, G.: Algebraic Graph Theory. Graduate Text in Mathematics. Springer, New York (2001)"},{"issue":"1","key":"5_CR21","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/JPROC.2006.887293","volume":"95","author":"R Olfati-Saber","year":"2007","unstructured":"Olfati-Saber, R., Alex Fax, J., Murray, R.M.: Consensus and cooperation in networked multi-agent systems. Proc. IEEE 95(1), 215\u2013233 (2007)","journal-title":"Proc. IEEE"},{"issue":"1","key":"5_CR22","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1145\/1052934.1052942","volume":"5","author":"A Borodin","year":"2005","unstructured":"Borodin, A., Roberts, G.O., Rosenthal, J.S., Tsaparas, P.: Link analysis ranking: algorithms, theory, and experiments. ACM Trans. Internet Technol. (TOIT) 5(1), 231\u2013297 (2005)","journal-title":"ACM Trans. Internet Technol. (TOIT)"},{"issue":"1\/2","key":"5_CR23","doi-asserted-by":"publisher","first-page":"81","DOI":"10.2307\/2332226","volume":"30","author":"MG Kendall","year":"1938","unstructured":"Kendall, M.G.: A new measure of rank correlation. Biometrika 30(1\/2), 81\u201393 (1938)","journal-title":"Biometrika"},{"unstructured":"Oliva, G., Boz\u00f3ki, S.: Incomplete analytic hierarchy process with minimum ordinal violations. arXiv preprint: \n                    arXiv:1904.04701\n                    \n                   (2019)","key":"5_CR24"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-37670-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,5]],"date-time":"2020-09-05T00:02:33Z","timestamp":1599264153000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-37670-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,20]]},"ISBN":["9783030376697","9783030376703"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-37670-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019,12,20]]},"assertion":[{"value":"20 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CRITIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Critical Information Infrastructures Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Link\u00f6ping","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"critis2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/critis2019.on.liu.se\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}