{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:17:03Z","timestamp":1742919423938,"version":"3.40.3"},"publisher-location":"Cham","reference-count":89,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030703691"},{"type":"electronic","value":"9783030703707"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-70370-7_7","type":"book-chapter","created":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T23:37:06Z","timestamp":1613777826000},"page":"118-138","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Chapter 7 Data Science and Resilience"],"prefix":"10.1007","author":[{"given":"Fred S.","family":"Roberts","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,20]]},"reference":[{"key":"7_CR1","unstructured":"Adem, A., et al.: Human well-being and the natural environment Appendix 1. In: Cozzens, M., Roberts, F.S. (eds.) Mathematical and Statistical Challenges for Sustainability, pp. 61\u201385. American Mathematical Society, Providence (2011)"},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/MPAE.2005.1405887","volume":"3","author":"M Amin","year":"2005","unstructured":"Amin, M.: Powering the 21st century: we can - and must - modernize the grid. IEEE Power Energ. Mag. 3, 93\u201395 (2005)","journal-title":"IEEE Power Energ. Mag."},{"key":"7_CR3","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1038\/scientificamerican0507-60","volume":"296","author":"M Amin","year":"2007","unstructured":"Amin, M., Schewe, P.: Preventing blackouts. Sci. Am. 296, 60\u201367 (2007)","journal-title":"Sci. Am."},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1557\/mrs2008.80","volume":"33","author":"M Amin","year":"2008","unstructured":"Amin, M., Stringer, J.: The electric power grid: today and tomorrow. Mater. Res. Soc. Bull. 33, 399\u2013407 (2008)","journal-title":"Mater. Res. Soc. Bull."},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MPAE.2005.1507024","volume":"3","author":"M Amin","year":"2005","unstructured":"Amin, M., Wollenberg, B.: Towards a smart grid. IEEE Power Energ. Mag. 3, 34\u201341 (2005)","journal-title":"IEEE Power Energ. Mag."},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/11760146_28","volume-title":"Intelligence and Security Informatics","author":"S Anand","year":"2006","unstructured":"Anand, S., Madigan, D., Mammone, R., Pathak, S., Roberts, F.: Experimental analysis of sequential decision making algorithms for port of entry inspection procedures. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. LNCS, vol. 3975, pp. 319\u2013330. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11760146_28"},{"key":"7_CR7","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-90-481-9045-4_2","volume-title":"e-Democracy","author":"M Arenilla","year":"2010","unstructured":"Arenilla, M.: Concepts in democratic theory. In: Rios Insua, D., French, S. (eds.) e-Democracy, pp. 15-30. Springer, Dordrecht (2010). https:\/\/doi.org\/10.1007\/978-90-481-9045-4_2"},{"key":"7_CR8","doi-asserted-by":"publisher","unstructured":"Baptista, A.T., Bouillet, E., Calabrese, F., Verscheure, O.: Towards building an uncertainty-aware personal journey planner. In: Proceedings 14th International IEEE Conference on Intelligent Transportation Systems (ITSC), pp. 378\u2013383. IEEE (2011). https:\/\/doi.org\/10.1109\/ITSC.2011.6082962.","DOI":"10.1109\/ITSC.2011.6082962"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1038\/nature11018","volume":"486","author":"AD Barnosky","year":"2012","unstructured":"Barnosky, A.D., et al.: Approaching a state shift in earth\u2019s biosphere. Nature 486, 51 (2012)","journal-title":"Nature"},{"key":"7_CR10","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1038\/nature02691","volume":"429","author":"DR Bellwood","year":"2004","unstructured":"Bellwood, D.R., Hughes, T.P., Folke, C., Nystrom, M.: Confronting the coral reef crisis. Nature 429, 827\u2013833 (2004). https:\/\/doi.org\/10.1038\/nature02691","journal-title":"Nature"},{"key":"7_CR11","first-page":"4734","volume":"279","author":"C Boettiger","year":"2012","unstructured":"Boettiger, C., Hastings, A.: Early warning signals and the prosecutor\u2019s fallacy. Proc. R. Soc. Lond. B Biol. Sci. 279, 4734\u20134739 (2012)","journal-title":"Proc. R. Soc. Lond. B Biol. Sci."},{"issue":"5","key":"7_CR12","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1002\/nav.20349","volume":"56","author":"E Boros","year":"2009","unstructured":"Boros, E., Fedzhora, L., Kantor, P.B., Saeger, K., Stroud, P.: A large-scale linear programming model for finding optimal container inspection strategies. Naval Res. Logist. (NRL) 56(5), 404\u2013420 (2009). https:\/\/doi.org\/10.1002\/nav.20349","journal-title":"Naval Res. Logist. (NRL)"},{"key":"7_CR13","unstructured":"Boros, E., Fedzhora, L., Kantor, P.B., Saeger, K., Stroud, P.: Large scale LP model for finding optimal container inspection strategies. Technical report RUTCOR 26\u20132006. Rutgers University Center for Operations Research (2006)"},{"key":"7_CR14","unstructured":"Boyens, J., Paulsen, C., Moorthy, R., Bartol, N.: Supply Chain Risk Management Practices for Federal Information Systems and Organizations. NIST Special Publication 800-161, April 2015. https:\/\/www.dni.gov\/files\/NCSC\/documents\/supplychain\/20190327-NIST-Sp-800-161.pdf. Accessed 14 Jan 2020"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24873-3","volume-title":"Algorithmic decision theory","year":"2011","unstructured":"Brafman, R.I., Roberts, F.S., Tsouki\u00e0s, A. (eds.): ADT 2011. LNCS (LNAI), vol. 6992. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24873-3"},{"key":"7_CR16","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1126\/science.1203672","volume":"332","author":"SR Carpenter","year":"2011","unstructured":"Carpenter, S.R., et al.: Early warnings of regime shifts: a whole-ecosystem experiment. Science 332, 1079\u20131082 (2011). https:\/\/doi.org\/10.1126\/science.1203672","journal-title":"Science"},{"key":"7_CR17","unstructured":"CCICADA: CCICADA launches ID verification project to speed responses to natural and terrorist disasters. CCICADA Center, Rutgers University, 22 March 2016. https:\/\/ccicada.org\/2016\/03\/22\/ccicada-launches-id-verification-project-to-speed-responses-to-natural-and-terrorist-disasters\/. Accessed 2 June 2020"},{"key":"7_CR18","unstructured":"CCICADA: Fight against Zika virus to benefit from Ebola math models. CCICADA Center, Rutgers University, 5 May 2016. https:\/\/ccicada.org\/2016\/05\/05\/fight-against-zika-virus-to-benefit-from-ebola-math-models\/. Accessed 1 June 2020"},{"key":"7_CR19","unstructured":"CCICADA: Expanding information-sharing environments to fight crime and terror is goal of Rutgers research team. CCICADA Center, Rutgers University, 6 April 2017. https:\/\/ccicada.org\/2017\/04\/06\/expanding-information-sharing-environments-to-fight-crime-and-terror-is-goal-of-rutgers-research-team\/. Accessed 31 May 2020"},{"key":"7_CR20","unstructured":"Centers for Disease Control and Prevention, National Center for Environmental Health: Extreme Heat Events. https:\/\/www.cdc.gov\/climateandhealth\/pubs\/ClimateChangeandExtremeHeatEvents.pdf. Accessed 1 June 2020"},{"key":"7_CR21","volume-title":"World Atlas of Desertification","author":"M Cherlet","year":"2018","unstructured":"Cherlet, M., Hutchinson, C., Reynolds, J., Hill, J., von Sommer, S., Maltitz, G.: World Atlas of Desertification. Publication Office of the European Union, Luxembourg (2018)"},{"key":"7_CR22","unstructured":"CISA: Cybersecurity and Infrastructure Security Agency Information and Communications Technology Supply Chain Risk Management Task Force: Interim report: status update on activities and objectives of the task force, September 2019. https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/ICT%20Supply%20Chain%20Risk%20Management%20Task%20Force%20Interim%20Report%20%28FINAL%29_508.pdf. Accessed 14 Jan 2020"},{"volume-title":"Mathematical and Statistical Challenges for Sustainability","year":"2011","key":"7_CR23","unstructured":"Cozzens, M.B., Roberts, F.S. (eds.): Mathematical and Statistical Challenges for Sustainability. American Mathematical Society, Providence (2011)"},{"key":"7_CR24","unstructured":"CyberKeel: Maritime cyber-risks: Virtual pirates at large on the cyber seas. White Paper, CyberKeel, Copenhagen, 15 October 2014"},{"issue":"1","key":"7_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-017-0070-y","volume":"4","author":"H Daki","year":"2017","unstructured":"Daki, H., El Hannani, A., Aqqal, A., Haidine, A., Dahbi, A.: Big Data management in smart grid: concepts, requirements and implementation. J. Big Data 4(1), 1\u201319 (2017). https:\/\/doi.org\/10.1186\/s40537-017-0070-y","journal-title":"J. Big Data"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Dalal, S.R., Jain, A., Kantor, P.B.: Creating configurations for testing radiation portal algorithms using factor covering combinatorial designs. Presented at the 2015 IEEE International Symposium on Technologies for Homeland Security, Boston, MA (2015)","DOI":"10.1109\/THS.2015.7445579"},{"key":"7_CR27","volume-title":"Human + Machine: Reimagining Work in the Age of AI","author":"PR Daugherty","year":"2018","unstructured":"Daugherty, P.R., Wilson, H.J.: Human + Machine: Reimagining Work in the Age of AI. Harvard Business Review Press, Boston (2018)"},{"key":"7_CR28","unstructured":"Deloitte: COVID-19: Managing supply chain risk and disruption. Coronavirus highlights the need to transform traditional supply chain models (2020). https:\/\/www2.deloitte.com\/global\/en\/pages\/risk\/articles\/covid-19-managing-supply-chain-risk-and-disruption.html. Accessed 28 Apr 2020"},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"DiRenzo III, J., Goward, D.A., Roberts, F.S.: The little known challenge of maritime cyber security. In: Proceedings 6th International Conference on Information, Intelligence, Systems, and Applications (IISA), pp. 1\u20135. IEEE, Piscataway (2015)","DOI":"10.1109\/IISA.2015.7388071"},{"volume-title":"Issues in Maritime Cyber Security","year":"2017","key":"7_CR30","unstructured":"DiRenzo, J., III., Drumhiller, N., Roberts, F.S. (eds.): Issues in Maritime Cyber Security. Westphalia Press, Washington, DC (2017)"},{"key":"7_CR31","doi-asserted-by":"publisher","first-page":"026103","DOI":"10.1063\/1.2737822","volume":"17","author":"I Dobson","year":"2007","unstructured":"Dobson, I., Carreras, B.A., Lynch, V.E., Newman, D.E.: Complex systems analysis of series of blackouts: cascading failure, critical points, self-organization. Chaos 17, 026103 (2007). https:\/\/doi.org\/10.1063\/1.2737822","journal-title":"Chaos"},{"issue":"1","key":"7_CR32","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1017\/S0269964805050023","volume":"19","author":"I Dobson","year":"2005","unstructured":"Dobson, I., Carreras, B.A., Newman, D.E.: A loading-dependent model of probabilistic cascading failure. Prob. Eng. Inf. Sci. 19(1), 15\u201332 (2005)","journal-title":"Prob. Eng. Inf. Sci."},{"key":"7_CR33","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1016\/j.advwatres.2012.01.013","volume":"51","author":"P D\u2019Odorico","year":"2013","unstructured":"D\u2019Odorico, P., Bhattachan, A., Davis, K.F., Ravi, S., Runyan, C.W.: Global desertification: drivers and feedbacks. Adv. Water Res. 51, 326\u2013344 (2013)","journal-title":"Adv. Water Res."},{"key":"7_CR34","doi-asserted-by":"publisher","first-page":"7177","DOI":"10.1038\/s41598-017-07202-y","volume":"7","author":"KR Fair","year":"2017","unstructured":"Fair, K.R., Bauch, C.T., Anand, M.: Dynamics of the global wheat trade network and resilience to shocks. Sci. Rep. 7, 7177 (2017)","journal-title":"Sci. Rep."},{"key":"7_CR35","unstructured":"FBI: FBI and Secret Service working against COVID-19 threats. FBI National Press Office, 15 April 2020. https:\/\/www.fbi.gov\/news\/pressrel\/press-releases\/fbi-and-secret-service-working-against-covid-19-threats. Accessed 30 Apr 2020. (A version of this appeared in the Washington Post online edition of 14 April 2020.)"},{"key":"7_CR36","unstructured":"Fefferman, N., Emergency shelter location and resource allocation. In: Lacy, C. (ed.), Report on the Development of the University Center for Disaster Preparedness and Emergency Response (UCDPER), pp. 50\u201386. Rutgers University, New Brunswick (2011). https:\/\/www.researchgate.net\/publication\/279336405_Development_of_the_University_Center_for_Disaster_Preparedness_and_Emergency_Response_UCDPER. Accessed 2 June 2020."},{"key":"7_CR37","unstructured":"Gallagher, R., Bloomberg News: Hackers \u201cwithout conscience\u201d demand ransom from dozens of hospitals and labs working on coronavirus. Fortune, 1 April 2020. https:\/\/fortune.com\/2020\/04\/01\/hackers-ransomware-hospitals-labs-coronavirus\/. Accessed 31 May 2020"},{"issue":"4","key":"7_CR38","first-page":"341","volume":"53","author":"JN Galloway","year":"2003","unstructured":"Galloway, J.N., et al.: The nitrogen cascade. AIBS Bull. 53(4), 341\u2013356 (2003)","journal-title":"AIBS Bull."},{"issue":"8","key":"7_CR39","doi-asserted-by":"publisher","first-page":"2207","DOI":"10.1109\/TGRS.2006.872081","volume":"44","author":"F Gao","year":"2006","unstructured":"Gao, F., Masek, J., Schwaller, M., Hall, F.: On the blending of the Landsat and MODIS surface reflectance: predicting daily Landsat surface reflectance. IEEE Trans. Geosci. Remote Sens. 44(8), 2207\u20132218 (2006)","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"7_CR40","doi-asserted-by":"crossref","unstructured":"Gasparini, L., Bouillet, E., Calabrese, F., Verscheure, O., O'Brien, B., O'Donnell, M.: System and analytics for continuously assessing transport systems from sparse and noisy observations: case study in Dublin. In: Proceedings of IEEE Conference on Intelligent Transportation Systems, pp. 1827\u20131832. IEEE (2011)","DOI":"10.1109\/ITSC.2011.6082982"},{"key":"7_CR41","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.rse.2014.09.012","volume":"156","author":"CM Gevaert","year":"2015","unstructured":"Gevaert, C.M., Garc\u00eda-Haro, F.J.: A comparison of STARFM and an unmixing-based algorithm for Landsat and MODIS data fusion. Remote Sens. Environ. 156, 34\u201344 (2015)","journal-title":"Remote Sens. Environ."},{"key":"7_CR42","unstructured":"Greenberg, A.: Hackers reveal nasty new car attacks \u2013 with me behind the wheel. Forbes, 12 August 2013. https:\/\/www.forbes.com\/sites\/andygreenberg\/2013\/07\/24\/hackers-reveal-nasty-new-car-attacks-with-me-behind-the-wheel-video\/#3fe5a27c228c. Accessed 31 May 2020"},{"key":"7_CR43","unstructured":"Greenberg M.: Willingness to pay for a sustainable shoreline: public reactions follow Superstorm Sandy in New Jersey, USA. In: Krope, J., Olabi, A.G., Goricanec, D. (eds.) Sustainable Energy and Environmental Protection, SEEP, Maribor, Slovenia, pp. 46\u201350 (2013)"},{"key":"7_CR44","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.erss.2014.02.004","volume":"1","author":"MR Greenberg","year":"2014","unstructured":"Greenberg, M.R.: Energy policy and research: the underappreciation of trust. Energy Res. Soc. Sci. 1, 152\u2013160 (2014)","journal-title":"Energy Res. Soc. Sci."},{"key":"7_CR45","unstructured":"GTRI: GTRI NSTIC Trustmark Pilot. https:\/\/trustmark.gtri.gatech.edu\/technical-framework\/. Accessed 31 May 2020"},{"key":"7_CR46","unstructured":"Hood, P.: Sandy\u2019s wake. Columbia Magazine, Winter 2012\u20132013. https:\/\/magazine.columbia.edu\/article\/sandys-wake. Accessed 2 June 2020."},{"key":"7_CR47","unstructured":"Jacob, K., Blake, R.: Indicators and monitoring. In: Climate Change Adaptation in New York City: Building a Risk Management Response. The New York City Panel on Climate Change 2010 Report. Annals of The New York Academy of Sciences, Chapter 7, vol. 1196, pp. 1\u2013354 (2010)"},{"key":"7_CR48","unstructured":"Jacob, K., et al. (eds.): Responding to climate change in New York State: the ClimAID integrated assessment for effective climate change adaptation in New York State, pp. 299\u2013369. Technical report 11-18, New York State Energy Research and Development Authority (2011)"},{"key":"7_CR49","unstructured":"Jewell, Z.C., et al.: Automated biometrics for biodiversity assessment: opportunities and challenges (2020, in preparation)"},{"key":"7_CR50","unstructured":"Kantor, P., Dalal, S., Jain, A., Nelson, C.: Optimal selection of configurations to test radiation detectors. Presented at the Informs Annual Meeting, San Francisco, CA (2014)"},{"key":"7_CR51","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/978-3-030-22044-0_10","volume-title":"Mathematics of Planet Earth: Protecting Our Planet, Learning from the Past, Safeguarding for the Future","author":"HG Kaper","year":"2019","unstructured":"Kaper, H.G., Engler, H.: Modeling food systems. In: Kaper, H.G., Roberts, F.S. (eds.) Mathematics of Planet Earth: Protecting Our Planet, Learning from the Past, Safeguarding for the Future, pp. 267\u2013296. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-22044-0_10"},{"key":"7_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.measurement.2017.10.064","volume":"116","author":"S Kumar","year":"2018","unstructured":"Kumar, S., et al.: Deep learning framework for recognition of cattle using muzzle point image pattern. Measurement 116, 1\u201317 (2018)","journal-title":"Measurement"},{"key":"7_CR53","doi-asserted-by":"crossref","unstructured":"Kumar, S., Singh, S.K., Singh, R.K, Singh, A.K.: Muzzle point pattern-based techniques for individual cattle identification. In: Kumar, S., Singh, S.K., Singh, R.K., Singh, A.K (eds.) Animal Biometrics: Techniques and Applications, pp. 111\u2013135. Springer, Singapore (2017)","DOI":"10.1007\/978-981-10-7956-6_4"},{"issue":"52","key":"7_CR54","doi-asserted-by":"publisher","first-page":"20696","DOI":"10.1073\/pnas.0705005104","volume":"104","author":"D Lawrence","year":"2007","unstructured":"Lawrence, D., D\u2019Odorico, P., Diekmann, L., DeLonge, M., Das, R., Eaton, J.: Ecological feedbacks following deforestation create the potential for a catastrophic ecosystem shift in tropical dry forest. Proc. Natl. Acad. Sci. U.S.A. 104(52), 20696\u201320701 (2007)","journal-title":"Proc. Natl. Acad. Sci. U.S.A."},{"key":"7_CR55","unstructured":"Liao, R., Fan, Z.: Supply chains have been upended. Here\u2019s how to make them more resilient. World Economic Forum, 6 Apr 2020. https:\/\/www.weforum.org\/agenda\/2020\/04\/supply-chains-resilient-covid-19\/. Accessed 28 Apr 2020"},{"key":"7_CR56","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.fcr.2012.08.008","volume":"143","author":"DB Lobell","year":"2013","unstructured":"Lobell, D.B.: The use of satellite data for crop yield gap analysis. Field Crops Res. 143, 56\u201364 (2013)","journal-title":"Field Crops Res."},{"key":"7_CR57","unstructured":"Lundstrom, M.: Hoarding in a pandemic: a problem of messaging, selfishness, or simply fear? FairWarning, 21 March 2020. https:\/\/www.salon.com\/2020\/03\/21\/hoarding-in-a-pandemic-a-problem-of-messaging-selfishness-or-simply-fear_partner\/. Accessed 30 Apr 2020"},{"key":"7_CR58","doi-asserted-by":"crossref","unstructured":"Madigan, D., Mittal, S., Roberts, F.S.: Sequential decision making algorithms for port of entry inspection: overcoming computational challenges. In: Muresan, G., Altiok, T., Melamed, B., Zeng, D. (eds.) Proceedings of IEEE International Conference on Intelligence and Security Informatics (ISI-2007), pp. 1\u20137. IEEE Press, Piscataway (2007)","DOI":"10.1109\/ISI.2007.379521"},{"key":"7_CR59","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1002\/nav.20472","volume":"58","author":"D Madigan","year":"2011","unstructured":"Madigan, D., Mittal, S., Roberts, F.S.: Efficient sequential decision-making algorithms for container inspection operations. Naval Res. Logist. 58, 637\u2013654 (2011)","journal-title":"Naval Res. Logist."},{"key":"7_CR60","doi-asserted-by":"crossref","unstructured":"M\u00e9ndez, F.J., Men\u00e9ndez, M., Luce\u00f1o, A., Losada, I.J.: Estimation of the long\u2010term variability of extreme significant wave height using a time\u2010dependent peak over threshold (POT) model. J. Geophy. Res. Oceans 111(C7) (2006)","DOI":"10.1029\/2005JC003344"},{"key":"7_CR61","unstructured":"Mohney, G.: Hospitals remain key targets as ransomware attacks expected to increase. ABC News, 15 May 2017. https:\/\/abcnews.go.com\/Health\/hospitals-remain-key-targets-ransomware-attacks-expected-increase\/story?id=47416989. Accessed 1 June 2020."},{"key":"7_CR62","unstructured":"National Counterintelligence and Security Center, Supply Chain Directorate: Supply Chain Risk Management: Best Practices. https:\/\/www.dni.gov\/files\/NCSC\/documents\/supplychain\/20190405-UpdatedSCRM-Best-Practices.pdf. Accessed 14 Jan 2020"},{"issue":"25","key":"7_CR63","doi-asserted-by":"publisher","first-page":"E5716","DOI":"10.1073\/pnas.1719367115","volume":"115","author":"MS Norouzzadeh","year":"2018","unstructured":"Norouzzadeh, M.S., et al.: Automatically identifying, counting, and describing wild animals in camera-trap images with deep learning. Proc. Natl. Acad. Sci. U.S.A. 115(25), E5716\u2013E5725 (2018)","journal-title":"Proc. Natl. Acad. Sci. U.S.A."},{"key":"7_CR64","unstructured":"Pasternack, J., Roth, D.: Comprehensive trust metrics for information networks. In: Proceedings of the Army Science Conference (ASC), Orlando, Florida, December 2010."},{"key":"7_CR65","unstructured":"Pasternack, J., Roth. D.: Knowing what to believe (when you already know something). In: Proceedings of International Conference on Computational Linguistics (COLING), pp. 877\u2013885 (2010)."},{"key":"7_CR66","doi-asserted-by":"publisher","unstructured":"Pei, S., Kandula, S., Shaman, J.: Differential effects of intervention timing on COVID-19 spread in the United States. medRxiv preprint, posted 20 May 2020. https:\/\/doi.org\/10.1101\/2020.05.15.20103655. Accessed 31 May 2020","DOI":"10.1101\/2020.05.15.20103655"},{"key":"7_CR67","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31489-7","volume-title":"Algorithmic decision theory","year":"2019","unstructured":"Peke\u010d, S., Venable, K.B. (eds.): ADT 2019. LNCS (LNAI), vol. 11834. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-31489-7"},{"key":"7_CR68","doi-asserted-by":"publisher","unstructured":"Perry, J., Gupta, D., Feigenbaum, J., Wright, R.N.: Systematizing secure computation for research and decision support. In: Abdalla, M., De Prisco, R. (eds.) Security and Cryptography for Networks (SCN 2014). LNCS, vol. 8642. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10879-7_22.","DOI":"10.1007\/978-3-319-10879-7_22"},{"issue":"2","key":"7_CR69","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/s10726-018-09610-5","volume":"28","author":"I Pluchinotta","year":"2019","unstructured":"Pluchinotta, I., Kazak\u00e7i, A.O., Giordano, R., Tsouki\u00e0s, A.: Design theory for generating alternatives in public decision making processes. Group Decis. Negot. 28(2), 341\u2013375 (2019). https:\/\/doi.org\/10.1007\/s10726-018-09610-5","journal-title":"Group Decis. Negot."},{"key":"7_CR70","doi-asserted-by":"publisher","DOI":"10.1007\/978-90-481-9045-4","volume-title":"e-Democracy","year":"2010","unstructured":"Rios Insua, D., French, S. (eds.): e-Democracy. Springer, Dordrecht (2010). https:\/\/doi.org\/10.1007\/978-90-481-9045-4"},{"key":"7_CR71","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s10479-008-0328-z","volume":"163","author":"FS Roberts","year":"2008","unstructured":"Roberts, F.S.: Computer science and decision theory. Ann. Oper. Res. 163, 209\u2013253 (2008)","journal-title":"Ann. Oper. Res."},{"key":"7_CR72","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1017\/bca.2019.15","volume":"10","author":"FS Roberts","year":"2019","unstructured":"Roberts, F.S.: From football to oil rigs: risk assessment for combined cyber and physical attacks. J. Benefit-Cost Anal. 10, 251\u2013273 (2019)","journal-title":"J. Benefit-Cost Anal."},{"key":"7_CR73","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-030-22044-0_8","volume-title":"Mathematics of Planet Earth: Protecting Our Planet, Learning from the Past, Safeguarding for the Future","author":"FS Roberts","year":"2019","unstructured":"Roberts, F.S.: Measurement of biodiversity: richness and evenness. In: Kaper, H.G., Roberts, F.S. (eds.) Mathematics of Planet Earth: Protecting Our Planet, Learning from the Past, Safeguarding for the Future, pp. 203\u2013224. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-22044-0_8"},{"key":"7_CR74","unstructured":"Roberts, F.S.: Socially responsible facial recognition of animals (2020, in preparation)"},{"key":"7_CR75","first-page":"321","volume-title":"Issues in Maritime Cyber Security","author":"A Rose","year":"2017","unstructured":"Rose, A.: Economic consequence analysis of maritime cyber threats. In: DiRenzo, J.D., Drumhiller, N.K., Roberts, F.S. (eds.) Issues in Maritime Cyber Security, pp. 321\u2013356. Westphalia Press, Washington, DC (2017)"},{"key":"7_CR76","doi-asserted-by":"crossref","unstructured":"Rosenzweig, C., Solecki, W.: Advancing Tools and Methods for Flexible Adaptation Pathways and Science Policy Integration. New York City Panel on Climate Change 2019 report. Annals NY Acad. Sci. 1439 (2019)","DOI":"10.1111\/nyas.14004"},{"issue":"1","key":"7_CR77","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5595\/idrim.2012.0035","volume":"2","author":"H Rosoff","year":"2012","unstructured":"Rosoff, H., John, R.S., Burns, W., Siko, R.: Structuring uncertainty and conflicting objectives for life or death decisions following an urban biological catastrophe. Integr. Disaster Risk Manage. J. 2(1), 1\u201321 (2012)","journal-title":"Integr. Disaster Risk Manage. J."},{"issue":"4","key":"7_CR78","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1111\/j.1539-6924.2012.01769.x","volume":"32","author":"H Rosoff","year":"2012","unstructured":"Rosoff, H., John, R.S., Prager, F.: Flu, risks, and videotape: escalation of fear and avoidance behavior. Risk Anal. 32(4), 729\u2013743 (2012)","journal-title":"Risk Anal."},{"key":"7_CR79","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04428-1","volume-title":"Algorithmic Decision Theory","year":"2009","unstructured":"Rossi, F., Tsoukias, A. (eds.): ADT 2009. LNCS (LNAI), vol. 5783. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04428-1"},{"key":"7_CR80","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2601-8","volume-title":"Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software","author":"M Schwartz","year":"2018","unstructured":"Schwartz, M., Machulak, M.: Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software. APress, New York (2018)"},{"key":"7_CR81","unstructured":"Sturgis, L.A. Smythe, T.C., Tucci, A.E.: Port recovery in the aftermath of hurricane Sandy: improving port resiliency in the era of climate change. Center for New American Security, Washington, DC, August 2014"},{"key":"7_CR82","doi-asserted-by":"publisher","first-page":"014032","DOI":"10.1088\/1748-9326\/7\/1\/014032","volume":"7","author":"C Tebaldi","year":"2012","unstructured":"Tebaldi, C., Strauss, B.H., Zervas, C.E.: Modelling sea level rise impacts on storm surges along US coasts. Environ. Res. Lett. 7, 014032 (2012)","journal-title":"Environ. Res. Lett."},{"key":"7_CR83","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.gfs.2015.08.001","volume":"6","author":"DM Tendall","year":"2015","unstructured":"Tendall, D.M., et al.: Food system resilience: defining the concept. Global Food Secur. 6, 17\u201323 (2015)","journal-title":"Global Food Secur."},{"key":"7_CR84","unstructured":"The 9\/11 Commission: The 9\/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States (2014). https:\/\/fas.org\/irp\/offdocs\/911commission.pdf. Accessed 31 May 2020"},{"key":"7_CR85","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1016\/j.gloenvcha.2010.07.003","volume":"20","author":"BL Turner II","year":"2010","unstructured":"Turner, B.L., II.: Vulnerability and resilience: coalescing or paralleling approaches for sustainability science? Global Environ. Change 20, 570\u2013576 (2010)","journal-title":"Global Environ. Change"},{"key":"7_CR86","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.anbehav.2016.12.005","volume":"124","author":"JJ Valletta","year":"2017","unstructured":"Valletta, J.J., Torney, C., Kings, M., Thornton, A., Jmadden, J.: Applications of machine learning in animal behavior studies. Anim. Behav. 124, 203\u2013220 (2017)","journal-title":"Anim. Behav."},{"key":"7_CR87","unstructured":"Wagstaff, J.: All at sea: Global shipping fleet exposed to hacking threat. Reuters, 23 April 2014. https:\/\/www.reuters.com\/article\/2014\/04\/23\/tech-cybersecurity-shipping-idUSL3N0N402020140423. Accessed 21 Feb 2015"},{"key":"7_CR88","doi-asserted-by":"crossref","unstructured":"Zhao, W., Villaseca, F.E.: Byzantine fault tolerance for electric power grid monitoring and control. In: Proceedings of the 2008 International Conference on Embedded Software and Systems, pp. 129\u2013135. IEEE Computer Society (2008)","DOI":"10.1109\/ICESS.2008.13"},{"key":"7_CR89","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.ins.2018.10.024","volume":"476","author":"C Zhao","year":"2019","unstructured":"Zhao, C., et al.: Secure multi-party computation: theory practice applications. Inf. Sci. 476, 357\u2013372 (2019). https:\/\/doi.org\/10.1016\/j.ins.2018.10.024","journal-title":"Inf. Sci."}],"container-title":["Lecture Notes in Computer Science","Resilience in the Digital Age"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-70370-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T16:20:56Z","timestamp":1619281256000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-70370-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030703691","9783030703707"],"references-count":89,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-70370-7_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"20 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}