{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T00:13:16Z","timestamp":1769213596622,"version":"3.49.0"},"publisher-location":"Cham","reference-count":7,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030975487","type":"print"},{"value":"9783030975494","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-97549-4_26","type":"book-chapter","created":{"date-parts":[[2022,3,17]],"date-time":"2022-03-17T08:05:37Z","timestamp":1647504337000},"page":"226-233","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Risk Registry Platform for Optimizations in Cases of CBRN and Critical Infrastructure Attacks"],"prefix":"10.1007","author":[{"given":"Nina","family":"Dobrinkova","sequence":"first","affiliation":[]},{"given":"Evangelos","family":"Katsaros","sequence":"additional","affiliation":[]},{"given":"Ilias","family":"Gkotsis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,18]]},"reference":[{"key":"26_CR1","doi-asserted-by":"publisher","unstructured":"Linkov I., Tkachuk A., Canis L., Mohan M., Keisler J., Risk informed decision framework for integrated evaluation of countermeasures against CBRN threats. J. Homel. Secur. Emerg. Manag. 9(1), Article no. 17 (2012). https:\/\/doi.org\/10.1515\/1547-7355.1926","DOI":"10.1515\/1547-7355.1926"},{"key":"26_CR2","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1089\/bsp.2009.0010","volume":"7","author":"B Ezell","year":"2009","unstructured":"Ezell, B., von Winterfeldt, D.: Probabilistic risk analysis and terrorism. Biosecur. Bioterrorism 7, 108\u2013110 (2009)","journal-title":"Biosecur. Bioterrorism"},{"key":"26_CR3","doi-asserted-by":"publisher","unstructured":"Bier, V.M., Cox Jr., L.A., Azaiez, M.N.: Why both game theory and reliability theory are important in defending infrastructure against intelligent attacks. In: Bier, V.M.M., Azaiez, M.N. (eds.) Game Theoretic Risk Analysis of Security Threats. ISORMS, vol. 128, pp. 1\u201311. Springer, Boston (2009). https:\/\/doi.org\/10.1007\/978-0-387-87767-9_1","DOI":"10.1007\/978-0-387-87767-9_1"},{"key":"26_CR4","volume-title":"Value Focused Thinking: A Path to Creative Decision Making","author":"RL Keeney","year":"1992","unstructured":"Keeney, R.L.: Value Focused Thinking: A Path to Creative Decision Making. Harvard University Press, Cambridge (1992)"},{"key":"26_CR5","doi-asserted-by":"publisher","DOI":"10.1201\/b11471","volume-title":"Multi-Criteria Decision Analysis: Environmental Applications and Case Studies","author":"I Linkov","year":"2011","unstructured":"Linkov, I., Moberg, E.: Multi-Criteria Decision Analysis: Environmental Applications and Case Studies. CRC Press, Boca Raton (2011)"},{"key":"26_CR6","doi-asserted-by":"publisher","first-page":"1072","DOI":"10.1016\/j.envint.2006.06.013","volume":"32","author":"I Linkov","year":"2006","unstructured":"Linkov, I., Satterstrom, K., Kiker Batchelor, C.G., Bridges, T.: From comparative risk assessment to multi-criteria decision analysis and adaptive management: recent developments and applications. Environ. Int. 32, 1072\u20131093 (2006)","journal-title":"Environ. Int."},{"key":"26_CR7","unstructured":"Mohan M., von Winterfeldt D.: Using risk assessment, economic assessment, and risk management to improve preparedness for terrorist attacks and natural disasters: a methodology for a qualitative assessment of target capabilities of the department of homeland security, technical report to the National Center for Risk and Economic Analysis of Terrorism Events (CREATE), University of Southern California (2010)"}],"container-title":["Lecture Notes in Computer Science","Large-Scale Scientific Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-97549-4_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,17]],"date-time":"2022-03-17T08:07:52Z","timestamp":1647504472000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-97549-4_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030975487","9783030975494"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-97549-4_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"18 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"LSSC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Large-Scale Scientific Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sozopol","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bulgaria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 June 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"lssc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/parallel.bas.bg\/Conferences\/SciCom21\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}