{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T18:06:58Z","timestamp":1750788418578,"version":"3.40.3"},"publisher-location":"Cham","reference-count":75,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030446840"},{"type":"electronic","value":"9783030446857"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-44685-7_11","type":"book-chapter","created":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T14:07:01Z","timestamp":1595426821000},"page":"271-298","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Emergency Networks for Post-Disaster Scenarios"],"prefix":"10.1007","author":[{"given":"Gianluca","family":"Rizzo","sequence":"first","affiliation":[]},{"given":"Sasko","family":"Ristov","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Fahringer","sequence":"additional","affiliation":[]},{"given":"Marjan","family":"Gusev","sequence":"additional","affiliation":[]},{"given":"Matija","family":"Dzanko","sequence":"additional","affiliation":[]},{"given":"Ivana","family":"Bilic","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Esposito","sequence":"additional","affiliation":[]},{"given":"Torsten","family":"Braun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,23]]},"reference":[{"key":"11_CR1","unstructured":"Alam F, Ofli F, Imran M (2018) A Twitter tale of three hurricanes: Harvey, Irma, and Maria. arXiv preprint:1805.05144"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Ali S, Rizzo G, Mancuso V, Marsan MA (2015) Persistence and availability of floating content in a campus environment. In: IEEE INFOCOM, pp 2326\u20132334","DOI":"10.1109\/INFOCOM.2015.7218620"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Ali S, Rizzo G, Marsan MA, Mancuso V (2013) Impact of mobility on the performance of context-aware applications using floating content. In: ICCASA, pp 198\u2013208. Springer, Berlin","DOI":"10.1007\/978-3-319-14227-2_20"},{"key":"11_CR4","unstructured":"Ali S, Rizzo G, Rengarajan B, Marsan MA (2013) A simple approximate analysis of floating content for context-aware applications. In: IEEE INFOCOM, pp 21\u201322"},{"key":"11_CR5","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/j.comnet.2016.03.006","volume":"107","author":"C Anastasiades","year":"2016","unstructured":"Anastasiades C, Schmid T, Weber J, Braun T (2016) Information-centric content retrieval for delay-tolerant networks. Comput Netw 107:194\u2013207","journal-title":"Comput Netw"},{"key":"11_CR6","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1016\/j.comnet.2016.03.009","volume":"107","author":"C Anastasiades","year":"2016","unstructured":"Anastasiades C, Weber J, Braun T (2016) Dynamic unicast: information-centric multi-hop routing for mobile ad-hoc networks. Comput Netw 107:208\u2013219","journal-title":"Comput Netw"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Aschenbruck N, Gerhards-Padilla E, Gerharz M, Frank M, Martini P (2007) Modelling mobility in disaster area scenarios. In: MSWiM, pp 4\u201312","DOI":"10.1145\/1298126.1298131"},{"issue":"5","key":"11_CR8","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1097\/HP.0b013e318222ec5c","volume":"101","author":"SM Becker","year":"2011","unstructured":"Becker SM (2011) Risk communication and radiological\/nuclear terrorism: a strategic view. Health Phys 101(5):551\u2013558","journal-title":"Health Phys"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Bircher E, Braun T (2004) An agent-based architecture for service discovery and negotiation in wireless networks. In: WWIC, pp 295\u2013306. Springer, Berlin","DOI":"10.1007\/978-3-540-24643-5_26"},{"key":"11_CR10","unstructured":"Borsetti D, Fiore M, Casetti C, Chiasserini CF (2009) Cooperative support for localized services in VANETs. In: ACM MSWiM, pp 1\u201310"},{"key":"11_CR11","doi-asserted-by":"publisher","first-page":"2021","DOI":"10.1007\/s11277-015-2888-y","volume":"85","author":"O Briante","year":"2015","unstructured":"Briante O, Loscr\u00ed V, Pace P, Ruggeri G, Zema NR (2015) Comvivor: an evolutionary communication framework based on survivors\u2019 devices reuse. Wirel Pers Commun 85:2021\u20132040","journal-title":"Wirel Pers Commun"},{"issue":"1\u20133","key":"11_CR12","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/0166-218X(94)90204-6","volume":"49","author":"P Brucker","year":"1994","unstructured":"Brucker P, Jurisch B, Sievers B (1994) A branch and bound algorithm for the job-shop scheduling problem. Discrete Appl Math 49(1\u20133):107\u2013127","journal-title":"Discrete Appl Math"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Castro AAV, Serugendo GDM, Konstantas D (2009) Hovering information\u2014self-organizing information that finds its own storage. In: Autonomic Communication, pp 111\u2013145. Springer, Berlin","DOI":"10.1007\/978-0-387-09753-4_5"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Chipara O, Griswold WG, Plymoth AN, Huang R, Liu F, Johansson P, Rao RR, Chan TC, Buono C (2012) WIISARD: a measurement study of network properties and protocol reliability during an emergency response. In: MobiSys, pp 407\u2013420","DOI":"10.1145\/2307636.2307674"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Cinque M, Cotroneo D, Esposito C, Fiorentino M (2017) Secure crisis information sharing through an interoperability framework among first responders: the SECTOR practical experience. In: IEEE WiMob, pp 316\u2013323","DOI":"10.1109\/WiMOB.2017.8115835"},{"key":"11_CR16","unstructured":"Cinque M, Esposito C, Fiorentino M, Carrasco FJP, Matarese F (2015) A collaboration platform for data sharing among heterogeneous relief organizations for disaster management. In: ISCRAM"},{"issue":"2","key":"11_CR17","first-page":"202","volume":"24","author":"S Cojocaru","year":"2016","unstructured":"Cojocaru S, Gaindric C, Secrieru I, Puiu S, Popcova O (2016) Multilayered knowledge base for triage task in mass casualty situations. Comput Sci J Mold 24(2):202\u2013212","journal-title":"Comput Sci J Mold"},{"issue":"18","key":"11_CR18","doi-asserted-by":"publisher","first-page":"3175","DOI":"10.1109\/JLT.2014.2334713","volume":"32","author":"F Dikbiyik","year":"2014","unstructured":"Dikbiyik F, Tornatore M, Mukherjee B (2014) Minimizing the risk from disaster failures in optical backbone networks. J Lightwave Technol 32(18):3175\u20133183","journal-title":"J Lightwave Technol"},{"key":"11_CR19","unstructured":"Esposito C, Ciampi M (2013) A hierarchical event-based architecture for the notification of medical document availability. In: IWBBIO, pp 585\u2013592"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Esposito C, Cotroneo D, Russo S (2010) An investigation on flexible communications in publish\/subscribe services. In: SEUS, pp 204\u2013215","DOI":"10.1007\/978-3-642-16256-5_20"},{"key":"11_CR21","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1016\/j.adhoc.2004.08.007","volume":"3","author":"T Fujiwara","year":"2005","unstructured":"Fujiwara T, Watanabe T (2005) An ad hoc networking scheme in hybrid networks for emergency communications. Ad Hoc Netw 3:607\u2013620","journal-title":"Ad Hoc Netw"},{"key":"11_CR22","unstructured":"Gamma G (2016) Fake captive portal with an Android phone. URL \n                  https:\/\/null-byte.wonderhowto.com\/how-to\/fake-captive-portal-with-android-phone-0167030\/"},{"issue":"3","key":"11_CR23","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1109\/MCOM.2010.5434384","volume":"48","author":"SM George","year":"2010","unstructured":"George SM, Zhou W, Chenji H, Won M, Lee YO, Pazarloglou A, Stoleru R, Barooah P (2010) DistressNet: a wireless ad hoc and sensor network architecture for situation management in disaster response. IEEE Commun Mag 48(3):128\u2013136","journal-title":"IEEE Commun Mag"},{"issue":"6","key":"11_CR24","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/MNET.2015.7340430","volume":"29","author":"R Goscien","year":"2015","unstructured":"Goscien R, Walkowiak K, Klinkowski M, Rak J (2015) Protection in elastic optical networks. IEEE Netw 29(6):88\u201396","journal-title":"IEEE Netw"},{"issue":"6","key":"11_CR25","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1080\/10810730.2015.1018566","volume":"20","author":"TA Gurman","year":"2015","unstructured":"Gurman TA, Ellenberger N (2015) Reaching the global community during disasters: findings from a content analysis of the organizational use of Twitter after the 2010 Haiti earthquake. J Health Commun 20(6):687\u2013696","journal-title":"J Health Commun"},{"issue":"2","key":"11_CR26","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/MIC.2018.022021657","volume":"22","author":"M Gusev","year":"2018","unstructured":"Gusev M, Dustdar S (2018) Going back to the roots-the evolution of edge computing, an IoT perspective. IEEE Internet Comput 22(2):5\u201315","journal-title":"IEEE Internet Comput"},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Gusev M, Ristov S, Prodan R, Dzanko M, Bilic I (2017) Resilient IoT eHealth solutions in case of disasters. In: RNDM, pp 1\u20137","DOI":"10.1109\/RNDM.2017.8093024"},{"issue":"1","key":"11_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1111\/disa.12092","volume":"39","author":"JB Houston","year":"2015","unstructured":"Houston JB, Hawthorne J, Perreault MF, Park EH, Goldstein Hode M, Halliwell MR, Turner McGowen SE, Davis R, Vaid S, McElderry JA et al (2015) Social media and disasters: a functional framework for social media use in disaster planning, response, and research. Disasters 39(1):1\u201322","journal-title":"Disasters"},{"issue":"10","key":"11_CR29","doi-asserted-by":"publisher","first-page":"1701","DOI":"10.1016\/j.jss.2010.04.065","volume":"83","author":"V Hristidis","year":"2010","unstructured":"Hristidis V, Chen SC, Li T, Luis S, Deng Y (2010) Survey of data management and analysis in disaster situations. J Syst Softw 83(10):1701\u20131714","journal-title":"J Syst Softw"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Hyyti\u00e4 E, Virtamo J, Lassila P, Kangasharju J, Ott J (2011) When does content float? Characterizing availability of anchored information in opportunistic content sharing. In: IEEE INFOCOM, pp 3123\u20133131. Shanghai, China","DOI":"10.1109\/INFCOM.2011.5935160"},{"key":"11_CR31","doi-asserted-by":"crossref","unstructured":"Islam HMA, Lukyanenko A, Tarkoma S, Yla-Jaaski A (2015) Towards disruption tolerant ICN. In: IEEE ISCC, pp 212\u2013219","DOI":"10.1109\/ISCC.2015.7884893"},{"issue":"1","key":"11_CR32","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1002\/nav.3800010110","volume":"1","author":"SM Johnson","year":"1954","unstructured":"Johnson SM (1954) Optimal two-and three-stage production schedules with setup times included. Naval Res Logist (NRL) 1(1):61\u201368","journal-title":"Naval Res Logist (NRL)"},{"key":"11_CR33","doi-asserted-by":"crossref","unstructured":"Kangasharju J, Ott J, Karkulahti O (2010) Floating content: Information availability in urban environments. In: IEEE PERCOM Workshops, pp 804\u2013808. IEEE, New York","DOI":"10.1109\/PERCOMW.2010.5470546"},{"issue":"1","key":"11_CR34","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s13753-014-0010-9","volume":"5","author":"B Khazai","year":"2014","unstructured":"Khazai B, Kunz-Plapp T, B\u00fcscher C, Wegner A (2014) VuWiki: an ontology-based semantic wiki for vulnerability assessments. Int J Disaster Risk Sci 5(1):55\u201373","journal-title":"Int J Disaster Risk Sci"},{"key":"11_CR35","doi-asserted-by":"crossref","unstructured":"Kr\u00f3l M, Ji Y, Yamada S, Borcea C, Zhong L, Takano K (2016) Extending network coverage by using static and mobile relays during natural disasters. In: WAINA, pp 681\u2013686","DOI":"10.1109\/WAINA.2016.147"},{"key":"11_CR36","doi-asserted-by":"crossref","unstructured":"Krug S, Seitz J (2016) Challenges of applying DTN routing protocols in realistic disaster scenarios. In: ICUFN, pp 784\u2013789","DOI":"10.1109\/ICUFN.2016.7537145"},{"key":"11_CR37","doi-asserted-by":"crossref","unstructured":"Manzo G, Marsan MA, Rizzo G (2017) Performance modeling of vehicular floating content in urban settings. In: IEEE ITC 29, vol 1, pp 99\u2013107","DOI":"10.23919\/ITC.2017.8064344"},{"key":"11_CR38","doi-asserted-by":"crossref","unstructured":"Manzo G, Soua R, Di Maio A, Engel T, Palattella MR, Rizzo G (2017) Coordination mechanisms for floating content in realistic vehicular scenarios. In: IEEE MobiWorld","DOI":"10.1109\/INFCOMW.2017.8116443"},{"key":"11_CR39","doi-asserted-by":"crossref","unstructured":"Matarese F, Di Crescenzo D, Strano A, Aligne F, Mattioli J (2012) An interoperable reconstruction and recovery decision support tool for complex crises situations. In: IEEE SoSE, pp 525\u2013530","DOI":"10.1109\/SYSoSE.2012.6384174"},{"issue":"15","key":"11_CR40","first-page":"1","volume":"7","author":"LN Medford-Davis","year":"2014","unstructured":"Medford-Davis LN, Kapur GB (2014) Preparing for effective communications during disasters: lessons from a World Health Organization quality improvement project. Int J Emerg Med 7(15):1\u20137","journal-title":"Int J Emerg Med"},{"key":"11_CR41","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MCOM.2014.6917403","volume":"52","author":"QT Minh","year":"2014","unstructured":"Minh QT, Nguyen K, Borcea C, Yamada S (2014) On-the-fly establishment of multihop wireless access networks for disaster recovery. IEEE Commun Mag 52:60\u201366","journal-title":"IEEE Commun Mag"},{"key":"11_CR42","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.adhoc.2015.12.008","volume":"40","author":"QT Minh","year":"2016","unstructured":"Minh QT, Shibata Y, Borcea C, Yamada S (2016) On-site configuration of disaster recovery access networks made easy. Ad Hoc Netw 40:46\u201360","journal-title":"Ad Hoc Netw"},{"key":"11_CR43","unstructured":"MIP: The joint c3 information exchange data model metamodel (jc3iedm metamodel), jc3iedm-metamodel-specification-3.1.4.pdf. \n                  https:\/\/public.mip-interop.org\/\n                  \n                . Accessed on 25\/02\/2019"},{"issue":"4","key":"11_CR44","doi-asserted-by":"publisher","first-page":"901","DOI":"10.5194\/nhess-14-901-2014","volume":"14","author":"D Molinari","year":"2014","unstructured":"Molinari D, Menoni S, Aronica G, Ballio F, Berni N, Pandolfo C, Stelluti M, Minucci G (2014) Ex post damage assessment: an Italian experience. Nat Hazards Earth Syst Sci 14(4):901\u2013916","journal-title":"Nat Hazards Earth Syst Sci"},{"key":"11_CR45","doi-asserted-by":"publisher","unstructured":"Monticelli E, Schubert BM, Arumaithurai M, Fu X, Ramakrishnan KK (2014) An information centric approach for communications in disaster situations. In: IEEE LANMAN, pp 1\u20136. \n                  https:\/\/doi.org\/10.1109\/LANMAN.2014.7028630","DOI":"10.1109\/LANMAN.2014.7028630"},{"key":"11_CR46","doi-asserted-by":"publisher","unstructured":"Morreale P, Goncalves A, Silva C (2015) Mobile ad hoc network communication for disaster recovery. Int J Space-Based Situated Comput 5(3):178\u2013186. \n                  https:\/\/doi.org\/10.1504\/IJSSC.2015.070949\n                  \n                . URL \n                  https:\/\/doi.org\/10.1504\/IJSSC.2015.070949","DOI":"10.1504\/IJSSC.2015.070949 10.1504\/IJSSC.2015.070949"},{"key":"11_CR47","doi-asserted-by":"publisher","first-page":"3347","DOI":"10.1016\/j.comnet.2012.05.012","volume":"56","author":"RGL Narayanan","year":"2012","unstructured":"Narayanan RGL, Ibe OC (2012) A joint network for disaster recovery and search and rescue operations. Comput Netw 56:3347\u20133373","journal-title":"Comput Netw"},{"issue":"4","key":"11_CR48","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MIC.2017.2911430","volume":"21","author":"S Nastic","year":"2017","unstructured":"Nastic S, Rausch T, Scekic O, Dustdar S, Gusev M, Koteska B, Kostoska M, Jakimovski B, Ristov S, Prodan R (2017) A serverless real-time data analytics platform for edge computing. IEEE Internet Comput 21(4):64\u201371. \n                  https:\/\/doi.org\/10.1109\/MIC.2017.2911430","journal-title":"IEEE Internet Comput"},{"key":"11_CR49","doi-asserted-by":"crossref","unstructured":"Ordille JJ, Tendick P, Yang Q (2009) Publish-subscribe services for urgent and emergency response. In: ACM Comsware, pp 8:1\u20138:10","DOI":"10.1145\/1621890.1621901"},{"key":"11_CR50","doi-asserted-by":"crossref","unstructured":"Ott J, Hyyti\u00e4 E, Lassila P, Vaegs T, Kangasharju J (2011) Floating content: information sharing in urban areas. In: IEEE PerCom, Seattle, USA, pp 136\u2013146","DOI":"10.1109\/PERCOM.2011.5767578"},{"key":"11_CR51","doi-asserted-by":"crossref","unstructured":"Pawelczak P, Prasad RV, Xia L, Niemegeers IG (2005) Cognitive radio emergency networks-requirements and design. In: IEEE DySPAN, pp 601\u2013606","DOI":"10.1109\/DYSPAN.2005.1542678"},{"issue":"3","key":"11_CR52","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1002\/ieam.230","volume":"7","author":"T Perko","year":"2011","unstructured":"Perko T (2011) Importance of risk communication during and after a nuclear accident. Integr Environ Assess Manag 7(3):388\u2013392","journal-title":"Integr Environ Assess Manag"},{"key":"11_CR53","doi-asserted-by":"crossref","unstructured":"Petersen H, Baccelli E, W\u00e4hlisch M, Schmidt TC, Schiller J (2014) The role of the Internet of Things in network resilience. In: International Internet of Things Summit, pp 283\u2013296. Springer, Berlin","DOI":"10.1007\/978-3-319-19743-2_39"},{"key":"11_CR54","doi-asserted-by":"publisher","unstructured":"Psaras I, Saino L, Arumaithurai M, Ramakrishnan KK, Pavlou G (2014) Name-based replication priorities in disaster cases. In: 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp 434\u2013439. \n                  https:\/\/doi.org\/10.1109\/INFCOMW.2014.6849271","DOI":"10.1109\/INFCOMW.2014.6849271"},{"key":"11_CR55","doi-asserted-by":"crossref","unstructured":"Radianti J, Gonzalez JJ, Granmo OC (2014) Publish-subscribe smartphone sensing platform for the acute phase of a disaster: a framework for emergency management support. In: IEEE PerCom Workshops, pp 285\u2013290","DOI":"10.1109\/PerComW.2014.6815219"},{"issue":"3","key":"11_CR56","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1145\/937503.937506","volume":"35","author":"S Rafaeli","year":"2003","unstructured":"Rafaeli S, Hutchison D (2003) A survey of key management for secure group communication. ACM Comput Surv (CSUR) 35(3):309\u2013329","journal-title":"ACM Comput Surv (CSUR)"},{"key":"11_CR57","doi-asserted-by":"crossref","unstructured":"Rak J (2015) Resilient routing in communication networks. Springer, Berlin","DOI":"10.1007\/978-3-319-22333-9"},{"key":"11_CR58","doi-asserted-by":"crossref","unstructured":"Rak J, Hutchison D, Calle E, Gomes T, Gunkel M, Smith P, Tapolcai J, Verbrugge S, Wosinska L (2016) RECODIS: resilient communication services protecting end-user applications from disaster-based failures. In: ICTON, pp 1\u20134","DOI":"10.1109\/ICTON.2016.7550596"},{"key":"11_CR59","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.vlsi.2016.11.011","volume":"58","author":"NK Ray","year":"2017","unstructured":"Ray NK, Turuk AK (2017) A framework for post-disaster communication using wireless ad hoc networks. Integrat VLSI J 58:274\u2013285","journal-title":"Integrat VLSI J"},{"issue":"2","key":"11_CR60","first-page":"79","volume":"17","author":"S Ristov","year":"2016","unstructured":"Ristov S, Cvetkov K, Gusev M (2016) Implementation of a horizontal scalable balancer for dew computing services. Scalable Comput Pract Exp 17(2):79\u201390","journal-title":"Scalable Comput Pract Exp"},{"key":"11_CR61","doi-asserted-by":"crossref","unstructured":"Rizzo G, Neukirchen H (2017) Geo-based content sharing for disaster relief applications. In: IMIS, pp 894\u2013903. Springer, Berlin","DOI":"10.1007\/978-3-319-61542-4_91"},{"issue":"5","key":"11_CR62","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1097\/HP.0b013e3182259a61","volume":"101","author":"GJ Rubin","year":"2011","unstructured":"Rubin GJ, Aml\u00f4t R, Page L (2011) The London polonium incident: lessons in risk communications. Health Phys 101(5):545\u2013550","journal-title":"Health Phys"},{"key":"11_CR63","doi-asserted-by":"crossref","unstructured":"Neves dos Santos F, Ertl B, Barakat C, Spyropoulos T, Turletti T (2013) CEDO: content-centric dissemination algorithm for delay-tolerant networks. In: MSWiM, pp 377\u2013386. ACM","DOI":"10.1145\/2507924.2507931"},{"issue":"4","key":"11_CR64","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1111\/j.1539-6924.2011.01634.x","volume":"32","author":"TL Sellnow","year":"2012","unstructured":"Sellnow TL, Sellnow DD, Lane DR, Littlefield RS (2012) The value of instructional communication in crisis situations: restoring order to chaos. Risk Anal Int J 32(4):633\u2013643","journal-title":"Risk Anal Int J"},{"key":"11_CR65","doi-asserted-by":"publisher","unstructured":"Sicuranza M, Ciampi M, Pietro GD, Esposito C (2013) Secure healthcare data sharing among federated health information systems. IJCCBS 4(4):349\u2013373. \n                  https:\/\/doi.org\/10.1504\/IJCCBS.2013.059023","DOI":"10.1504\/IJCCBS.2013.059023"},{"issue":"6","key":"11_CR66","doi-asserted-by":"publisher","first-page":"698","DOI":"10.1080\/10810730.2011.635777","volume":"17","author":"DE Sugerman","year":"2012","unstructured":"Sugerman DE, Keir JM, Dee DL, Lipman H, Waterman SH, Ginsberg M, Fishbein DB (2012) Emergency health risk communication during the 2007 San Diego wildfires: comprehension, compliance, and recall. J Health Commun 17(6):698\u2013712","journal-title":"J Health Commun"},{"key":"11_CR67","doi-asserted-by":"crossref","unstructured":"Thompson N, Crepaldi R, Kravets R (2010) Locus: a location-based data overlay for disruption-tolerant networks. In: CHANTS, pp 47\u201354. ACM","DOI":"10.1145\/1859934.1859945"},{"key":"11_CR68","doi-asserted-by":"publisher","unstructured":"Tyson G, Bigham J, Bodanese E (2013) Towards an information-centric delay-tolerant network. In: 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp 387\u2013392. \n                  https:\/\/doi.org\/10.1109\/INFCOMW.2013.6970723","DOI":"10.1109\/INFCOMW.2013.6970723"},{"issue":"3","key":"11_CR69","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MNET.2014.6843231","volume":"28","author":"G Tyson","year":"2014","unstructured":"Tyson G, Bodanese E, Bigham J, Mauthe A (2014) Beyond content delivery: can ICNs help emergency scenarios? IEEE Netw 28(3):44\u201349. \n                  https:\/\/doi.org\/10.1109\/MNET.2014.6843231","journal-title":"IEEE Netw"},{"key":"11_CR70","unstructured":"Velev D, Zlateva P (2012) Use of social media in natural disaster management. In: International Proceedings of Economic Development and Research, vol 39, pp 41\u201345"},{"issue":"3","key":"11_CR71","doi-asserted-by":"publisher","first-page":"1758","DOI":"10.1109\/COMST.2016.2540004","volume":"18","author":"J Wang","year":"2016","unstructured":"Wang J, Wu Y, Yen N, Guo S, Cheng Z (2016) Big data analytics for emergency communication networks: a survey. IEEE Commun Surv Tutor 18(3):1758\u20131778. \n                  https:\/\/doi.org\/10.1109\/COMST.2016.2540004","journal-title":"IEEE Commun Surv Tutor"},{"key":"11_CR72","unstructured":"Wi-Fi Alliance: Wi-Fi peer-to-peer (P2P) technical specification"},{"key":"11_CR73","doi-asserted-by":"crossref","unstructured":"Yi S, Hao Z, Zhang Q, Zhang Q, Shi W, Li Q (2017) Lavea: latency-aware video analytics on edge computing platform. In: IEEE ICDCS, pp 2573\u20132574","DOI":"10.1145\/3132211.3134459"},{"key":"11_CR74","doi-asserted-by":"crossref","unstructured":"Yu Y, Joy J, Fan R, Lu Y, Gerla M, Sanadidi MY (2014) DT-ICAN: a disruption-tolerant information-centric ad-hoc network. In: IEEE Military Communications Conference, pp 1021\u20131026","DOI":"10.1109\/MILCOM.2014.174"},{"key":"11_CR75","doi-asserted-by":"crossref","unstructured":"Zhang L, Afanasyev A, Burke J, Jacobson V, Claffy K, Crowley P, Papadopoulos C, Wang L, Zhang B (2014) Named data networking. In: SIGCOMM, vol 44, pp 66\u201373. ACM","DOI":"10.1145\/2656877.2656887"}],"container-title":["Computer Communications and Networks","Guide to Disaster-Resilient Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-44685-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,24]],"date-time":"2020-07-24T04:33:03Z","timestamp":1595565183000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-44685-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030446840","9783030446857"],"references-count":75,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-44685-7_11","relation":{},"ISSN":["1617-7975","2197-8433"],"issn-type":[{"type":"print","value":"1617-7975"},{"type":"electronic","value":"2197-8433"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"23 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}