{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:26:01Z","timestamp":1742955961136,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031495847"},{"type":"electronic","value":"9783031495854"}],"license":[{"start":{"date-parts":[[2023,12,29]],"date-time":"2023-12-29T00:00:00Z","timestamp":1703808000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,29]],"date-time":"2023-12-29T00:00:00Z","timestamp":1703808000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-49585-4_7","type":"book-chapter","created":{"date-parts":[[2023,12,28]],"date-time":"2023-12-28T16:02:21Z","timestamp":1703779341000},"page":"143-163","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Modeling and\u00a0Assessing the\u00a0Impacts of\u00a0Cyber Threats on\u00a0Interdependent Critical Infrastructures"],"prefix":"10.1007","author":[{"given":"Valeria","family":"Bonagura","sequence":"first","affiliation":[]},{"given":"Chiara","family":"Foglietta","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Panzieri","sequence":"additional","affiliation":[]},{"given":"Massimiliano","family":"Rossi","sequence":"additional","affiliation":[]},{"given":"Riccardo","family":"Santini","sequence":"additional","affiliation":[]},{"given":"Monica","family":"Scannapieco","sequence":"additional","affiliation":[]},{"given":"Luisa","family":"Franchina","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,29]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2020.03.007","volume":"155","author":"T Alladi","year":"2020","unstructured":"Alladi, T., Chamola, V., Zeadally, S.: Industrial control systems: cyberattack trends and countermeasures. Comput. Commun. 155, 1\u20138 (2020)","journal-title":"Comput. Commun."},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/978-3-319-33331-1_23","volume-title":"Critical Information Infrastructures Security","author":"G Am\u00e9lie","year":"2016","unstructured":"Am\u00e9lie, G., Aur\u00e9lia, B., Emmanuel, L., Mohamed, E., Gilles, D.: The challenge of critical infrastructure dependency modelling and simulation for emergency management and decision making by the civil security authorities. In: Rome, E., Theocharidou, M., Wolthusen, S. (eds.) CRITIS 2015. LNCS, vol. 9578, pp. 255\u2013258. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-33331-1_23"},{"key":"7_CR3","unstructured":"Assante, M., Lee, R.: The Industrial Control System Cyber Kill Chain, White Paper, SANS Institute, Bethesda, Maryland (2015)"},{"key":"7_CR4","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-030-62840-6_16","volume-title":"Critical Infrastructure Protection XIV","author":"E Bernardini","year":"2020","unstructured":"Bernardini, E., Foglietta, C., Panzieri, S.: Modeling telecommunications infrastructures using the CISIApro\u00a02.0 simulator. In: ICCIP 2020. IAICT, vol. 596, pp. 325\u2013348. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-62840-6_16"},{"key":"7_CR5","unstructured":"Cyber and Infrastructure Security Centre, CIPMA: Critical Infrastructure, Program for Modeling and Analysis, Australian Department of Home Affairs, Canberra, Australia (2015)"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Digioia, G., Foglietta, C., Panzieri, S., Falleni, A.: Mixed holistic reductionistic approach for impact assessment of cyber attacks. In: Proceedings of the European Intelligence and Security Informatics Conference, pp. 123\u2013130 (2012)","DOI":"10.1109\/EISIC.2012.30"},{"key":"7_CR7","unstructured":"Dudley, R., Golden, D.: The Colonial Pipeline ransomware hackers had a secret weapon: self-promoting cybersecurity firms, ProPublica (24 May 2021)"},{"key":"7_CR8","unstructured":"European Cybersecurity Competence Centre and Network, Bucharest, Romania (2023). (cybersecurity-centre.europa.eu\/index_en)"},{"key":"7_CR9","unstructured":"European Network and Information Security Agency, ENISA Threat Landscape 2022, Heraklion, Greece (2022) (www.enisa.europa.eu\/publications\/enisa-threat-landscape-2022)"},{"key":"7_CR10","unstructured":"European Network and Information Security Agency, ENISA Threat Landscape for Ransomware Attacks, Heraklion, Greece (2022). (www.enisa.europa.eu\/publications\/enisa-threat-landscape-for-ransomware-attacks)"},{"key":"7_CR11","unstructured":"European Parliament and the Council of the European Union, Directive (EU) 2016\/1148 of the European Parliament and of the Council of 6 July 2016 Concerning Measures for a High Common Level of Security of Network and Information Systems Across the Union, Document 32016L1148, Brussels, Belgium (2016)"},{"key":"7_CR12","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.jocs.2017.03.025","volume":"22","author":"M Ficco","year":"2017","unstructured":"Ficco, M., Choras, M., Kozik, R.: Simulation platform for cyber-security and vulnerability analysis of critical infrastructures. J. Comput. Sci. 22, 179\u2013186 (2017)","journal-title":"J. Comput. Sci."},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Foglietta, C., Panzieri, S.: Resilience in critical infrastructures: the role of modeling and simulation. In: Rosato, V., Di Pietro, A. (eds.) Issues on Risk Analysis for Critical Infrastructure Protection, IntechOpen, London, United Kingdom, pp. 3\u201318 (2020)","DOI":"10.5772\/intechopen.94506"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Franchina, L., Socal, A.: Innovative predictive model for smart city security risk assessment. In: Proceedings of the Forty-Third International Convention on Information, Communications and Electronic Technology, pp. 1831\u20131836 (2020)","DOI":"10.23919\/MIPRO48935.2020.9245358"},{"key":"7_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.frl.2022.103329","volume":"51","author":"J Goodell","year":"2023","unstructured":"Goodell, J., Corbet, S.: Commodity market exposure to energy-firm distress: evidence from the colonial pipeline ransomware attack. Finance Res. Lett. 51, 103329 (2023)","journal-title":"Finance Res. Lett."},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Hobbs, A.: The Colonial Pipeline hack: Exposing vulnerabilities in U.S. cybersecurity, SAGE Business Cases (6 July 2021)","DOI":"10.4135\/9781529789768"},{"key":"7_CR17","unstructured":"International Electrotechnical Commission, IEC 62443 Series - Industrial Communication Networks - Network and System Security, Geneva, Switzerland, 2009\u20132023"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Katagiri, N.: Hackers of critical infrastructure: expectations and limits of the principle of target distinction. Inter. Rev. Law Comput. Technol. article no. 2164462 (2023)","DOI":"10.1080\/13600869.2022.2164462"},{"key":"7_CR19","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.ijcip.2015.02.002","volume":"9","author":"W Knowles","year":"2015","unstructured":"Knowles, W., Prince, D., Hutchison, D., Pagna Disso, J., Jones, K.: A survey of cyber security management in industrial control systems. Inter. J. Critical Infrastructure Protect. 9, 52\u201380 (2015)","journal-title":"Inter. J. Critical Infrastructure Protect."},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Miclea, L., Sanislav, T.: About dependability in cyber-physical systems. In: Proceedings of the Ninth East-West Design and Test Symposium, pp. 17\u201321 (2011)","DOI":"10.1109\/EWDTS.2011.6116428"},{"key":"7_CR21","unstructured":"National Cybersecurity Agency, National Cybersecurity Strategy 2022 \u2013 2026, Rome, Italy. (2022) (www.acn.gov.it\/ACN_EN_Strategia.pdf)"},{"key":"7_CR22","doi-asserted-by":"publisher","first-page":"39","DOI":"10.2495\/978-1-84564-562-5\/03","volume":"54","author":"G Oliva","year":"2012","unstructured":"Oliva, G., Panzieri, S., Setola, R.: Modeling and simulation of critical infrastructures. WIT Trans. State-of-the-Art Sci. Eng. 54, 39\u201356 (2012)","journal-title":"WIT Trans. State-of-the-Art Sci. Eng."},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Pathirana, A.: EPANET2 desktop application for pressure-driven demand modeling. In: Proceedings of the Twelfth Annual Conference on Water Distribution System Analysis, pp. 65\u201374 (2010)","DOI":"10.1061\/41203(425)8"},{"key":"7_CR24","unstructured":"Republic of Italy, Legislative Decree of May 18, 2018, no. 65 (in Italian), Gazzeta Ufficiale della Repubblica Italiana, L.D. no. 65\/2018, Rome, Italy (2018). (www.gazzettaufficiale.it\/eli\/id\/2018\/06\/09\/18G00092\/sg)"},{"key":"7_CR25","unstructured":"Republic of Italy, Law Decree of September 21, 2019, no. 105 (in Italian), Gazzeta Ufficiale della Repubblica Italiana, L.D. no. 105\/2019, Rome, Italy (2019). (www.gazzettaufficiale.it\/eli\/id\/2019\/09\/21\/19G00111\/sg)"},{"key":"7_CR26","unstructured":"Republic of Italy, Decree of the President and the Council of Ministers of July 30, 2020, no. 131 (in Italian), Gazzeta Ufficiale della Repubblica Italiana, DPCM no. 131\/2020, Rome, Italy (2020). (www.gazzettaufficiale.it\/eli\/id\/2020\/10\/21\/20G00150\/sg)"},{"key":"7_CR27","unstructured":"Republic of Italy, Decree of the President of the Republic of February 5, 2021, no. 54 (in Italian), Gazzeta Ufficiale della Repubblica Italiana, DPR no. 54\/2021, Rome, Italy (2021). (www.gazzettaufficiale.it\/eli\/id\/2021\/04\/23\/21G00060\/sg)"},{"key":"7_CR28","unstructured":"Republic of Italy, Decree of the President and the Council of Ministers of April 14, 2021, no. 81 (in Italian), Gazzeta Ufficiale della Repubblica Italiana, DPCM no. 81\/2021, Rome, Italy (2021). (www.gazzettaufficiale.it\/eli\/id\/2021\/06\/11\/21G00089\/sg)"},{"key":"7_CR29","unstructured":"Republic of Italy, Legal Decree of June 14, 2021, no. 82 (in Italian), Gazzeta Ufficiale della Repubblica Italiana, L.D. no. 82\/2021, Rome, Italy (2021). (www.gazzettaufficiale.it\/eli\/id\/2021\/06\/14\/21G00098\/sg)"},{"key":"7_CR30","unstructured":"Republic of Italy, Decree of the President and the Council of Ministers of June 15, 2021, no. 198 (in Italian), Gazzeta Ufficiale della Repubblica Italiana, DPCM no. 198\/2021, Rome, Italy (2021). (www.gazzettaufficiale.it\/eli\/id\/2021\/08\/19\/21A05087\/sg)"},{"key":"7_CR31","unstructured":"Republic of Italy, Decree of the President and the Council of Ministers of May 18, 2022, no. 92 (in Italian), Gazzeta Ufficiale della Repubblica Italiana, DPCM no. 92\/2022, Rome, Italy (2022). (www.gazzettaufficiale.it\/eli\/id\/2022\/07\/15\/22G00099\/sg)"},{"issue":"2\u20133","key":"7_CR32","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/0166-3615(94)90017-5","volume":"24","author":"T Williams","year":"1994","unstructured":"Williams, T.: The Purdue enterprise reference architecture. Comput. Ind. 24(2\u20133), 141\u2013158 (1994)","journal-title":"Comput. Ind."}],"container-title":["IFIP Advances in Information and Communication Technology","Critical Infrastructure Protection XVII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-49585-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T00:12:13Z","timestamp":1730938333000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-49585-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,29]]},"ISBN":["9783031495847","9783031495854"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-49585-4_7","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2023,12,29]]},"assertion":[{"value":"29 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Critical Infrastructure Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Arlington, VA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 March 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 March 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccip2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}