{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T15:54:56Z","timestamp":1773330896855,"version":"3.50.1"},"publisher-location":"Cham","reference-count":64,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030446840","type":"print"},{"value":"9783030446857","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-44685-7_1","type":"book-chapter","created":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T14:07:01Z","timestamp":1595426821000},"page":"1-43","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Fundamentals of Communication Networks Resilience to Disasters and Massive Disruptions"],"prefix":"10.1007","author":[{"given":"Jacek","family":"Rak","sequence":"first","affiliation":[]},{"given":"David","family":"Hutchison","sequence":"additional","affiliation":[]},{"given":"Janos","family":"Tapolcai","sequence":"additional","affiliation":[]},{"given":"Rasa","family":"Bruzgiene","sequence":"additional","affiliation":[]},{"given":"Massimo","family":"Tornatore","sequence":"additional","affiliation":[]},{"given":"Carmen","family":"Mas-Machuca","sequence":"additional","affiliation":[]},{"given":"Marija","family":"Furdek","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Smith","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,23]]},"reference":[{"key":"1_CR1","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.optcom.2014.08.050","volume":"334","author":"M Abaza","year":"2015","unstructured":"Abaza M, Mesleh R, Mansour A, el-Hadi A (2015) Performance analysis of MISO multi-hop FSO links over log-normal channels with fog and beam divergence attenuations. Opt Commun 334:247\u2013252","journal-title":"Opt Commun"},{"issue":"5","key":"1_CR2","doi-asserted-by":"publisher","first-page":"1525","DOI":"10.1109\/TNET.2012.2232111","volume":"21","author":"PK Agarwal","year":"2013","unstructured":"Agarwal PK, Efrat A, Ganjugunte SK, Hay D, Sankararaman S, Zussman G (2013) The resilience of WDM networks to probabilistic geographical failures. IEEE\/ACM Trans Netw 21(5):1525\u20131538","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"4","key":"1_CR3","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutorials 17(4):2347\u20132376","journal-title":"IEEE Commun Surv Tutorials"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Ali K, Nguyen HX, Vien Q, Shah P (2015) Disaster management communication networks: challenges and architecture design. In: Proceedings of IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), pp 537\u2013542","DOI":"10.1109\/PERCOMW.2015.7134094"},{"key":"1_CR5","unstructured":"Cetinkaya EK, Sterbenz JPG (2013) A taxonomy of network challenges. In: Proceedings of DRCN\u201913, pp 322\u2013330"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41(3):15:1\u201315:58","DOI":"10.1145\/1541880.1541882"},{"key":"1_CR7","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.comnet.2015.02.021","volume":"82","author":"Y Cheng","year":"2015","unstructured":"Cheng Y, Gardner MT, Li J, May R, Medhi D, Sterbenz JPG (2015) Analysing geopath diversity and improving routing performance in optical networks. Comput Netw 82:50\u201367","journal-title":"Comput Netw"},{"issue":"18","key":"1_CR8","doi-asserted-by":"publisher","first-page":"3175","DOI":"10.1109\/JLT.2014.2334713","volume":"32","author":"F Dikbiyik","year":"2014","unstructured":"Dikbiyik F, Tornatore M, Mukherjee B (2014) Minimizing the risk from disaster failures in optical backbone networks. IEEE\/OSA J Lightwave Technol 32(18):3175\u20133183","journal-title":"IEEE\/OSA J Lightwave Technol"},{"issue":"10","key":"1_CR9","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MCOM.2014.6917401","volume":"52","author":"C Doerr","year":"2014","unstructured":"Doerr C, Kuipers FA (2014) All quiet on the internet front? IEEE Commun Mag 52(10):46\u201351","journal-title":"IEEE Commun Mag"},{"key":"1_CR10","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1016\/j.comnet.2003.10.003","volume":"44","author":"C Douligeris","year":"2003","unstructured":"Douligeris C, Mitrokotsa A (2003) DDoS attacks and defense mechanisms: classification and state-of-the-art. Comput Netw 44:643\u2013666","journal-title":"Comput Netw"},{"key":"1_CR11","unstructured":"Esposito C, Gouglidis A, Hutchison D, Gurtov A, Helvik BE, Heegaard PE, Rizzo G, Rak J (2018) On the disaster resiliency within the context of 5G networks. In: Proceedings of 2018 27th European Conference on Networks and Communications (ECNC), pp 1\u20134"},{"key":"1_CR12","unstructured":"Foster JS, Gjelde E, Graham WR, Hermann RJ, Kluepfel HM, Lawson RL, Soper GK, Wood LL, Woodard JB (2008) Report of the commission to assess the threat to the United States from electromagnetic pulse (EMP) attack, vol I: executive report"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Furdek M, Wosinska L, Goscien R, Manousakis K, Aibin M, Walkowiak K, Ristov S, Marzo JL (2016) An overview of security challenges in communication networks. In: Proceedings of RNDM\u201916, pp 43\u201350","DOI":"10.1109\/RNDM.2016.7608266"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Gomes T, Tapolcai J, Esposito C, Hutchison D, Kuipers F, Rak J, de Sousa A, Iossifides A, Travanca R, Andre J, Jorge L, Martins L, Ortiz Ugalde P, Pasic A, Pezaros D, Jouet S, Secci S, Tornatore M (2016) A survey of strategies for communication networks to protect against large-scale natural disasters. In: Proceedings of RNDM\u201916, pp 11\u201312","DOI":"10.1109\/RNDM.2016.7608263"},{"key":"1_CR15","unstructured":"G\u00f3rniak S, Ikonomou D, Tirtea R, Cadzow S, Gierszal H, Sutton D, Theron P, Vishik C (2011) Enabling and managing end-to-end resilience. ENISA"},{"issue":"6","key":"1_CR16","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/MNET.2015.7340430","volume":"29","author":"R Goscien","year":"2015","unstructured":"Goscien R, Walkowiak K, Klkinkowski M, Rak J (2015) Protection in elastic optical networks. IEEE Netw 29(6):88\u201396","journal-title":"IEEE Netw"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Gouglidis A, Hu VC, Busby JS, Hutchison D (2017) Verification of resilience policies that assist attribute based access control. In: Proceedings of 2nd ACM Workshop on Attribute-Based Access Control, pp 43\u201352","DOI":"10.1145\/3041048.3041049"},{"key":"1_CR18","unstructured":"Google Cloud Storage Incident #19002. \nhttps:\/\/status.cloud.google.com\/incident\/storage\/19002\n\n. Cited 21 Oct 2019"},{"key":"1_CR19","unstructured":"Gruenthat G. European Macroseismic Scale (EMS-98). \nhttp:\/\/www.gfz-potsdam.de\/en\/section\/seismic-hazard-and-stress-field\/projects\/previous-projects\/seismic-vulnerability-risk-intensity-scales\/ems-98\/"},{"issue":"16","key":"1_CR20","doi-asserted-by":"publisher","first-page":"2563","DOI":"10.1109\/JLT.2012.2201696","volume":"30","author":"MF Habib","year":"2012","unstructured":"Habib MF, Tornatore M, De Leenheer M, Dikbiyik F, Mukherjee B (2012) Design of disaster-resilient optical datacenter networks. IEEE\/OSA J Lightwave Technol 30(16):2563\u20132573","journal-title":"IEEE\/OSA J Lightwave Technol"},{"issue":"6","key":"1_CR21","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1016\/j.comcom.2013.01.004","volume":"36","author":"MF Habib","year":"2013","unstructured":"Habib MF, Tornatore M, Dikbiyik F, Mukherjee B (2013) Disaster survivability in optical communication networks. Comput Commun 36(6):630\u2013644","journal-title":"Comput Commun"},{"key":"1_CR22","unstructured":"http:\/\/effis.jrc.ec.europa.eu\/\n\n. Cited 18 Oct 2019"},{"key":"1_CR23","unstructured":"https:\/\/www.a10networks.com\/blog\/5-most-famous-ddos-attacks\/\n\n. Cited 21 Oct 2019"},{"key":"1_CR24","unstructured":"https:\/\/aws.amazon.com\/message\/41926\/\n\n. Cited 22 Oct 2019"},{"key":"1_CR25","unstructured":"https:\/\/www.cnet.com\/news\/google-goes-down-for-5-minutes-internet-traffic-drops-40\/\n\n. Cited 18 Oct 2019"},{"key":"1_CR26","unstructured":"https:\/\/www.theguardian.com\/technology\/2017\/nov\/08\/cryptocurrency-300m-dollars-stolen-bug-ether\n\n. Cited 18 Oct 2019"},{"key":"1_CR27","unstructured":"https:\/\/azure.microsoft.com\/en-us\/status\/history\/\n\n. Cited 21 Oct 2019"},{"key":"1_CR28","unstructured":"https:\/\/www.telegraph.co.uk\/news\/uknews\/defence\/9097706\/Electromagnetic-pulses-in-history.html\n\n. Cited 21 Oct 2019"},{"key":"1_CR29","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.comcom.2018.07.028","volume":"131","author":"D Hutchison","year":"2018","unstructured":"Hutchison D, Sterbenz JPG (2018) Architecture and design for resilient networked systems. Comput Commun 131:13\u201321","journal-title":"Comput Commun"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Jabbar A, Rohrer JP, Oberthaler A, Cetinkaya EK, Frost V, Sterbenz JPG (2009) Performance comparison of weather disruption-tolerant cross-layer routing algorithms. In: Proceedings of IEEE INFOCOM\u201909, pp 1143\u20131151","DOI":"10.1109\/INFCOM.2009.5062027"},{"issue":"4","key":"1_CR31","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1109\/SURV.2011.061411.00019","volume":"13","author":"G Karagiannis","year":"2011","unstructured":"Karagiannis G, Altintas O, Ekici E, Heijenk G, Jarupan B, Lin K, Weil T (2011) Vehicular networking: a survey and tutorial on requirements, architectures, challenges, standards, and solutions. IEEE Commun Surv Tutorials 13(4):584\u2013616","journal-title":"IEEE Commun Surv Tutorials"},{"key":"1_CR32","unstructured":"Kott A et\u00a0al (2016) Approaches to enhancing cyber resilience: report of the North Atlantic Treaty Organization (NATO) workshop IST-153, US Army Research Laboratory, ARL-SR-0396, pp 1\u201336 (2016)"},{"issue":"1","key":"1_CR33","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/JPROC.2014.2371999","volume":"103","author":"D Kreutz","year":"2015","unstructured":"Kreutz D, Ramos FMV, Esteves Verissimo P, Esteve Rothenberg C, Azodolmolky S, Uhlig S (2015) Software-defined networking: a comprehensive survey. Proc IEEE 103(1):14\u201376","journal-title":"Proc IEEE"},{"issue":"2","key":"1_CR34","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1002\/bltj.20032","volume":"9","author":"RE Krock","year":"2004","unstructured":"Krock RE (2004) Effective quality control during disaster recovery. Bell Labs Tech J 9(2):163\u2013171","journal-title":"Bell Labs Tech J"},{"issue":"3","key":"1_CR35","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1109\/JSYST.2009.2026783","volume":"3","author":"A Kwasinski","year":"2011","unstructured":"Kwasinski A, Weaver WW, Chapman PI, Krein PT (2011) Telecommunications power plant damage assessment for Hurricane Katrina-site survey and follow-up results. IEEE Syst J 3(3):277\u2013287","journal-title":"IEEE Syst J"},{"key":"1_CR36","unstructured":"Lehmann A, Tchinda AP, Trick U (2016) Optimization of wireless disaster network through network virtualization. In: Proceedings of INC\u201916, pp 165\u2013170"},{"key":"1_CR37","doi-asserted-by":"crossref","unstructured":"Markopoulou A, Iannaccone G, Bhattacharyya S, Chuah C, Ganjali Y, Diot C (2008) Characterization of failures in an operational IP backbone network. IEEE\/ACM Trans Netw 6(4): 749\u2013762","DOI":"10.1109\/TNET.2007.902727"},{"key":"1_CR38","unstructured":"Martins L, Girao-Silva R, Jorge L, Gomes A, Musumeci F, Rak J (2017) Interdependence between power grids and communication networks: a resilience perspective. In: Proceedings of DRCN\u201917, pp 1\u20139"},{"key":"1_CR39","doi-asserted-by":"crossref","unstructured":"Mas Machuca C, Secci S, Vizarreta P, Kuipers F, Gouglidis A, Hutchison D, Jouet S, Pezaros D, Elmokashfi A, Heegaard P, Ristov S, Gusev M (2016) Technology-related disasters: a survey towards disaster-resilient software defined networks. In: Proceedings of 2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM), pp 35\u201342","DOI":"10.1109\/RNDM.2016.7608265"},{"key":"1_CR40","doi-asserted-by":"crossref","unstructured":"Mauthe A, Hutchison D, Cetinkaya EK, Ganchev I, Rak J, Sterbenz JPG, Gunkel M, Smith P, Gomes T (2016) Disaster-resilient communication networks: principles and best practices. In: Proceedings of RNDM\u201916, pp 1\u201310","DOI":"10.1109\/RNDM.2016.7608262"},{"issue":"5","key":"1_CR41","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1109\/MCOM.2014.6815917","volume":"52","author":"B Mukherjee","year":"2014","unstructured":"Mukherjee B, Habib MF, Dikbiyik F (2014) Network adaptability from disaster disruptions and cascading failures. IEEE Commun Mag 52(5):230\u2013238","journal-title":"IEEE Commun Mag"},{"issue":"2","key":"1_CR42","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1109\/TNET.2007.892851","volume":"15","author":"S Nelakuditi","year":"2007","unstructured":"Nelakuditi S, Lee S, Yu Y, Zhang Zh-L, Chuah Ch-N (2007) Fast local rerouting for handling transient link failures. IEEE\/ACM Trans Netw 15(2):359\u2013372","journal-title":"IEEE\/ACM Trans Netw"},{"key":"1_CR43","doi-asserted-by":"crossref","unstructured":"Neumayer S, Modiano E (2010) Network reliability with geographically correlated failures. In: Proceedings of IEEE INFOCOM\u201910, pp 1\u20139","DOI":"10.1109\/INFCOM.2010.5461984"},{"key":"1_CR44","unstructured":"Public Safety and Homeland Security Bureau Federal Communications Commission (FCC) (2018) 2017 Atlantic Hurricane season impact on communications report and recommendations. Public Safety Docket No. 17-344. \nhttps:\/\/docs.fcc.gov\/public\/attachments\/DOC-353805A1.pdf\n\n (Aug)"},{"key":"1_CR45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22333-9","volume-title":"Resilient routing in communication networks","author":"J Rak","year":"2015","unstructured":"Rak J (2015) Resilient routing in communication networks. Springer, Berlin"},{"key":"1_CR46","doi-asserted-by":"crossref","unstructured":"Rak J, Hutchison D, Calle E, Gomes T, Gunkel M, Smith P, Tapolcai J, Verbrugge S, Wosinska L (2016) RECODIS: resilient communication services protecting end-user applications from disaster-based failures. In: Proc. ICTON\u201916, pp. 1\u20134 (2016)","DOI":"10.1109\/ICTON.2016.7550596"},{"issue":"1","key":"1_CR47","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MCOM.2011.5681013","volume":"49","author":"Y Ran","year":"2011","unstructured":"Ran Y (2011) Considerations and suggestions on improvement of communication network disaster countermeasures after the Wenchuan earthquake. IEEE Commun Mag 49(1):44\u201347","journal-title":"IEEE Commun Mag"},{"key":"1_CR48","unstructured":"ResumeNet: Resilience and survivability for future networking: framework, mechanisms, and experimental evaluation (2011). \nhttp:\/\/www.resumenet.eu\/"},{"key":"1_CR49","unstructured":"Reuter C (2013) Power outage communications: survey of needs, infrastructures and concepts. In: Proceedings of ISCRAM\u201913, pp 1\u20135"},{"key":"1_CR50","unstructured":"Reuters: Experts warn of substantial risk of WMD Attack (2005). \nhttps:\/\/research.lifeboat.com\/lugar.htm\n\n. Cited 18 Oct 2019"},{"issue":"4","key":"1_CR51","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MNET.2013.6574664","volume":"27","author":"T Sakano","year":"2013","unstructured":"Sakano T, Fadlullah ZM, Ngo T, Nishiyama H, Nakazawa M, Adachi F, Kato N, Takahara A, Kumagai T, Kasahara H, Kurihara S (2013) Disaster-resilient networking: a new vision based on movable and deployable resource units. IEEE Netw 27(4):40\u201346","journal-title":"IEEE Netw"},{"key":"1_CR52","unstructured":"Sedgewick A (2014) Framework for improving critical infrastructure cybersecurity, version 1.0 (No. NIST-Cybersecurity Framework)"},{"key":"1_CR53","doi-asserted-by":"crossref","unstructured":"Silva B, Maciel P, Tavares E, Zimmermann A (2013) Dependability models for designing disaster tolerant cloud computing systems. In: 43rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp 1\u20136","DOI":"10.1109\/DSN.2013.6575323"},{"issue":"7","key":"1_CR54","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/MCOM.2011.5936160","volume":"49","author":"P Smith","year":"2011","unstructured":"Smith P, Hutchison D, Sterbenz JPG, Schoeller M, Fessi A, Karaliopoulos M, Plattner B (2011) Network resilience: a systematic approach. IEEE Commun Mag 49(7):88\u201397","journal-title":"IEEE Commun Mag"},{"issue":"8","key":"1_CR55","doi-asserted-by":"publisher","first-page":"1245","DOI":"10.1016\/j.comnet.2010.03.005","volume":"54","author":"JPG Sterbenz","year":"2010","unstructured":"Sterbenz JPG, Hutchison D, Cetinkaya EK, Jabbar A, Rohrer JP, Schoeller M, Smith P (2010) Resilience and survivability in communication networks: strategies, principles, and survey of disciplines. Comput Netw 54(8):1245\u20131265","journal-title":"Comput Netw"},{"key":"1_CR56","doi-asserted-by":"crossref","unstructured":"Tornatore M, Andre J, Babarczi P, Braun T, Folstad E, Heegaard P, Hmaity A, Furdek M, Jorge L, Kmiecik W, Mas Machuca C, Martins L, Medeiros C, Musumeci F, Pasic A, Rak J, Simpson S, Travanca R, Voyiatzis A (2016) A survey on network resiliency methodologies against weather-based disruptions. In: Proceedings of RNDM\u201916, pp 23\u201334","DOI":"10.1109\/RNDM.2016.7608264"},{"key":"1_CR57","unstructured":"Vizarreta P, Sakic E, Kellerer W, Mas Machuca C (2019) Mining software repositories for predictive modelling of defects in SDN controller. In: Proceedings of IM\u201919, pp 80\u201388"},{"key":"1_CR58","doi-asserted-by":"crossref","unstructured":"Volvach I, Globa L (2016) Mobile networks disaster recovery using SDN-NFV. In: Proceedings of 2016 International Conference on Radio Electronics & Info Communications (UkrMiCo), pp 1\u20133","DOI":"10.1109\/UkrMiCo.2016.7739648"},{"key":"1_CR59","unstructured":"Wilson C (2008) CRS report for congress: high altitude electromagnetic pulse (HEMP) and high power microwave (HPM) devices: threat assessments, Order Code RL32544, pp 1\u201327"},{"key":"1_CR60","doi-asserted-by":"crossref","unstructured":"Wu W, Moran B, Manton JH, Zukerman M (2009) Topology design of undersea cables considering survivability under major disasters. In: Proceedings of WAINA\u201909, pp 1154\u20131159","DOI":"10.1109\/WAINA.2009.77"},{"issue":"2","key":"1_CR61","first-page":"18","volume":"28","author":"G Xanthopoulos","year":"2019","unstructured":"Xanthopoulos G, Athanasiou M (2019) Attica region, Greece July 2018: a tale of two fires and a seaside tragedy. Wildfire 28(2):18\u201321","journal-title":"Wildfire"},{"key":"1_CR62","unstructured":"Yokobiki T, Iwase R, Momma H (2013) Development of underwater repair method for shunt fault on a submarine cable. In: Proceedings of 2013 IEEE International Underwater Technology Symposium (UT), pp 1\u20134"},{"key":"1_CR63","doi-asserted-by":"crossref","unstructured":"Zhong L, Takano K, Jiang F, Wang X, Ji Y, Yamada S (2016) Spatio-temporal data-driven analysis of mobile network availability during natural disasters. In: Proceedings of 2016 IEEE 3rd International Conference on Information and Communication Technologies for Disaster Management (ICT-DM), pp 1\u20137","DOI":"10.1109\/ICT-DM.2016.7857223"},{"key":"1_CR64","doi-asserted-by":"crossref","unstructured":"Zhong L, Ji Y, Wang X, Yamada S, Takano K, Xue G (2017) Population-aware relay placement for wireless multi-hop based network disaster recovery. In: Proceedings of 2017 IEEE Global Communications Conference (GLOBECOM), pp 1\u20136","DOI":"10.1109\/GLOCOM.2017.8253922"}],"container-title":["Computer Communications and Networks","Guide to Disaster-Resilient Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-44685-7_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T14:07:44Z","timestamp":1595426864000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-44685-7_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030446840","9783030446857"],"references-count":64,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-44685-7_1","relation":{},"ISSN":["1617-7975","2197-8433"],"issn-type":[{"value":"1617-7975","type":"print"},{"value":"2197-8433","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"23 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}