{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T11:07:20Z","timestamp":1777892840318,"version":"3.51.4"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031254598","type":"print"},{"value":"9783031254604","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-25460-4_17","type":"book-chapter","created":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T09:12:22Z","timestamp":1676625142000},"page":"308-320","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Modelling and\u00a0Simulation of\u00a0Railway Networks for\u00a0Resilience Analysis"],"prefix":"10.1007","author":[{"given":"Kushal","family":"Srivastava","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Corinna","family":"K\u00f6pke","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Johannes","family":"Walter","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Katja","family":"Faist","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"John Marschalk","family":"Berry","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Claudio","family":"Porretti","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alexander","family":"Stolz","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,2,18]]},"reference":[{"key":"17_CR1","doi-asserted-by":"publisher","unstructured":"Ip, W. H., Wang, D.: Resilience evaluation approach of transportation networks. In: International Joint Conference on Computational Sciences and Optimization, 2009, pp. 618\u2013622. https:\/\/doi.org\/10.1109\/CSO.2009.294","DOI":"10.1109\/CSO.2009.294"},{"key":"17_CR2","doi-asserted-by":"publisher","unstructured":"Alessio, P., et al.: Resilience or robustness: identifying topological vulnerabilities in rail networks. R. Soc. open sci. 6(2), 181301 (2019). https:\/\/doi.org\/10.1098\/rsos.181301","DOI":"10.1098\/rsos.181301"},{"key":"17_CR3","doi-asserted-by":"publisher","unstructured":"Castanier, B., et al.: A risk and resilience assessment approach for railway networks (2021). https:\/\/doi.org\/10.3850\/978-981-18-2016-8_402-cd","DOI":"10.3850\/978-981-18-2016-8_402-cd"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Be\u0161inovi\u0107, N.: Resilience in railway transport systems: a literature review and research agenda. Transport Rev. 40(4), 457-478 (2020)","DOI":"10.1080\/01441647.2020.1728419"},{"issue":"2","key":"17_CR5","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1109\/JSYST.2010.2096670","volume":"5","author":"WH Ip","year":"2011","unstructured":"Ip, W.H., Wang, D.: Resilience and friability of transportation networks: evaluation, analysis and optimization. IEEE Syst. J. 5(2), 189\u2013198 (2011). https:\/\/doi.org\/10.1109\/JSYST.2010.2096670","journal-title":"IEEE Syst. J."},{"key":"17_CR6","doi-asserted-by":"publisher","unstructured":"Furno, A., El Faouzi, N.-E., Sharma, R., Cammarota, V., Zimeo, E.: A graph-based framework for real-time vulnerability assessment of road networks. In: IEEE International Conference on Smart Computing (SMARTCOMP), pp. 234\u2013241 (2018). https:\/\/doi.org\/10.1109\/SMARTCOMP.2018.00096","DOI":"10.1109\/SMARTCOMP.2018.00096"},{"key":"17_CR7","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1186\/1756-0381-4-10","volume":"4","author":"GA Pavlopoulos","year":"2011","unstructured":"Pavlopoulos, G.A., Secrier, M., Moschopoulos, C.N., et al.: Using graph theory to analyze biological networks. BioData Min. 4, 10 (2011). https:\/\/doi.org\/10.1186\/1756-0381-4-10","journal-title":"BioData Min."},{"key":"17_CR8","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.ijcip.2018.02.003","volume":"21","author":"A Psaltoglou","year":"2018","unstructured":"Psaltoglou, A., Calle, E.: Enhanced connectivity index - a new measure for identifying critical points in urban public transportation networks. Int. J. Crit. Infrastruct. Prot. 21, 22\u201332 (2018). https:\/\/doi.org\/10.1016\/j.ijcip.2018.02.003","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"17_CR9","doi-asserted-by":"publisher","unstructured":"K\u00f6pke, C., Srivastava, K., Miller, N., Branchini, E.: Resilience quantification for critical infrastructure: exemplified for airport operations. In: et al. Computer Security. ESORICS 2021 International Workshops. ESORICS 2021. Lecture Notes in Computer Science(), vol. 13106. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-95484-0_26","DOI":"10.1007\/978-3-030-95484-0_26"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Bigdeli, A., et al.: Comparison of network criticality, algebraic connectivity, and other graph metrics. In: Proceedings of the 1st Annual Workshop on Simplifying Complex Network for Practitioners (2009)","DOI":"10.1145\/1610304.1610308"},{"key":"17_CR11","doi-asserted-by":"publisher","unstructured":"K\u00f6pke, C., et al.: Impact propagation in airport systems. Cyber-Physical Security for Critical Infrastructures Protection, pp. 191\u2013206. Guildford, UK, 18 September 2020. https:\/\/doi.org\/10.1007\/978-3-030-69781-5_13","DOI":"10.1007\/978-3-030-69781-5_13"},{"key":"17_CR12","doi-asserted-by":"publisher","unstructured":"Fehling-Kaschek, M., et al.: Risk and resilience assessment and improvement in the telecommunication industry, pp. 247\u2013254 (2020). https:\/\/doi.org\/10.3850\/978-981-14-8593-0_3995-cd","DOI":"10.3850\/978-981-14-8593-0_3995-cd"},{"key":"17_CR13","doi-asserted-by":"publisher","unstructured":"Crabbe, S., et al.: SAFETY4RAILS Information System platform demonstration at Madrid Metro simulation exercise. In: Leva, M.C., Patelli, E., Podofillini, L., Wilson, S. (eds.) Proceedings of the 32nd European Safety and Reliability Conference, Copyright 2022 by ESREL2022 Organizers. Published by Research Publishing, Singapore ISBN: 981-973-0000-00-0. https:\/\/doi.org\/10.3850\/981-973-0000-00-0_esrel2022-paper","DOI":"10.3850\/981-973-0000-00-0_esrel2022-paper"},{"key":"17_CR14","unstructured":"Layton, R., Watters, P.: Automating open source intelligence: algorithms for OSINT (2015)"},{"key":"17_CR15","unstructured":"Scharte, B., Hiller, D., Leismann, T., Thoma, K.: Automating open source intelligence. In: Resilien Tech. Resilience by design: a strategy for the technology issues of the future (acatech STUDY), Munich: Herbert Utz Verlag (2014)"},{"key":"17_CR16","unstructured":"OpenMobilityData. https:\/\/transitfeeds.com\/p\/roma-servizi-per-la-mobilita\/542\/latest. Accessed 28 June 2022"},{"key":"17_CR17","unstructured":"Google Transit APIs. https:\/\/developers.google.com\/transit\/gtfs. Accessed 28 June 2022"},{"key":"17_CR18","unstructured":"SAFETY4RAILS. https:\/\/safety4rails.eu\/"},{"key":"17_CR19","unstructured":"Resisto. https:\/\/www.resistoproject.eu\/"},{"key":"17_CR20","unstructured":"Satie. https:\/\/satie-h2020.eu\/"},{"key":"17_CR21","unstructured":"Numpy. https:\/\/numpy.org\/"},{"key":"17_CR22","unstructured":"Networkx. https:\/\/networkx.org\/"},{"key":"17_CR23","unstructured":"Shapely. https:\/\/shapely.readthedocs.io\/en\/stable\/manual.html"},{"key":"17_CR24","unstructured":"GeoPandas. https:\/\/geopandas.org\/en\/stable\/"},{"key":"17_CR25","unstructured":"Bokeh. http:\/\/docs.bokeh.org\/en\/latest\/"}],"container-title":["Lecture Notes in Computer Science","Computer Security. ESORICS 2022 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-25460-4_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,5]],"date-time":"2024-02-05T18:07:50Z","timestamp":1707156470000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-25460-4_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031254598","9783031254604"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-25460-4_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"18 February 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2022.compute.dtu.dk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"80","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1.7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}