{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T04:04:00Z","timestamp":1746158640422,"version":"3.40.4"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319039633"},{"type":"electronic","value":"9783319039640"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-03964-0_17","type":"book-chapter","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T02:34:56Z","timestamp":1387247696000},"page":"191-196","source":"Crossref","is-referenced-by-count":8,"title":["Optimization Models in a Smart Tool for the Railway Infrastructure Protection"],"prefix":"10.1007","author":[{"given":"Antonio","family":"Sforza","sequence":"first","affiliation":[]},{"given":"Claudio","family":"Sterle","sequence":"additional","affiliation":[]},{"given":"Pasquale","family":"D\u2019amore","sequence":"additional","affiliation":[]},{"given":"Annarita","family":"Tedesco","sequence":"additional","affiliation":[]},{"given":"Francesca","family":"De Cillis","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Setola","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Jenkins, B.M., Butterworth, B.R.: Explosives and incendiaries used in terrorist attacks on Public Surface Transportation: a preliminary empirical analysis. Mineta Transportation Institute (2010)","key":"17_CR1"},{"unstructured":"Butterworth, B.R.: Empirical Data to guide risk mitigation: examples from MTI database. Mineta Transportation Institute National Transportation Security Center (2011)","key":"17_CR2"},{"unstructured":"Wilson, J.M., Jackson, B.A., Eisman, M., Steinberg, P., Riley, K.J.: Securing America\u2019s Passenger-Rail Systems. Rand Corporation (2007)","key":"17_CR3"},{"issue":"2","key":"17_CR4","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.compenvurbsys.2006.06.002","volume":"31","author":"A.T. Murray","year":"2007","unstructured":"Murray, A.T., Kim, K., Davis, J.W., Machiraju, R., Parent, R.: Coverage optimization to support security monitoring. Comp., Envir. Urb. Syst.\u00a031(2), 133\u2013147 (2007)","journal-title":"Comp., Envir. Urb. Syst."},{"doi-asserted-by":"crossref","unstructured":"Yabuta, K., Kitazawa, H.: Optimum camera placement considering camera specification for security monitoring. In: IEEE Inter. Sym. on Circ. Syst., ISCAS 2008, pp. 2114\u20132117 (2008)","key":"17_CR5","DOI":"10.1109\/ISCAS.2008.4541867"},{"key":"17_CR6","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/S0747-7171(89)80003-3","volume":"7","author":"R. Cole","year":"1989","unstructured":"Cole, R., Sharir, M.: Visibility problems for polyhedral terrains. J. Symb. Comp.\u00a07, 11\u201330 (1989)","journal-title":"J. Symb. Comp."},{"key":"17_CR7","volume-title":"Art gallery theorems and algorithms","author":"J.. O\u2019Rourke","year":"1987","unstructured":"O\u2019Rourke, J.: Art gallery theorems and algorithms. Oxford University Press, New York (1987)"},{"key":"17_CR8","doi-asserted-by":"publisher","first-page":"1363","DOI":"10.1287\/opre.19.6.1363","volume":"19","author":"C. Toregas","year":"1971","unstructured":"Toregas, C., ReVelle, C., Swain, R., Bergman, L.: The location of emergency service facilities. Oper. Res.\u00a019, 1363\u20131373 (1971)","journal-title":"Oper. Res."},{"key":"17_CR9","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/BF01942293","volume":"32","author":"R. Church","year":"1974","unstructured":"Church, R., ReVelle, C.: The maximal covering location problem. Papers of the Regional Science Association\u00a032, 101\u2013118 (1974)","journal-title":"Papers of the Regional Science Association"},{"key":"17_CR10","doi-asserted-by":"publisher","first-page":"1434","DOI":"10.1287\/mnsc.32.11.1434","volume":"32","author":"K. Hogan","year":"1986","unstructured":"Hogan, K., ReVelle, C.: Concepts and applications of backup coverage. Man. Scien.\u00a032, 1434\u20131444 (1986)","journal-title":"Man. Scien."}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-03964-0_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T06:08:58Z","timestamp":1746079738000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-03964-0_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319039633","9783319039640"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-03964-0_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}