{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:39:04Z","timestamp":1773931144910,"version":"3.50.1"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319203751","type":"print"},{"value":"9783319203768","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_57","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"642-653","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Business and Threat Analysis of Ports\u2019 Supply Chain Services"],"prefix":"10.1007","author":[{"given":"Spyridon","family":"Papastergiou","sequence":"first","affiliation":[]},{"given":"Nineta","family":"Polemi","sequence":"additional","affiliation":[]},{"given":"Ioannis","family":"Papagiannopoulos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"key":"57_CR1","unstructured":"ENISA report: Cyber security aspects in the maritime sector. ENISA (2011). \n                      http:\/\/www.enisa.europa.eu\/activities\/Resilience-and-CIIP\/critical-infrastructure-and-services\/dependencies-of-maritime-transport-to-icts"},{"issue":"6","key":"57_CR2","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/37.969131","volume":"21","author":"SM Rinaldi","year":"2001","unstructured":"Rinaldi, S.M., Peerenboom, J.P., Kelly, T.K.: Identifying, understanding, and analyzing critical infrastructure interdependencies. Control Syst. IEEE 21(6), 11\u201325 (2001)","journal-title":"Control Syst. IEEE"},{"key":"57_CR3","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.ress.2013.06.040","volume":"121","author":"M Ouyang","year":"2014","unstructured":"Ouyang, M.: Review on modeling and simulation of interdependent critical Infrastructure systems. Reliab. Eng. Syst. Saf. 121, 43\u201360 (2014)","journal-title":"Reliab. Eng. Syst. Saf."},{"issue":"1","key":"57_CR4","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1504\/IJCIS.2011.038958","volume":"7","author":"L Franchina","year":"2011","unstructured":"Franchina, L., Carbonelli, M., Gratta, L., Crisci, M.: An impact-based approach for the analysis of cascading effects in critical infrastructures. Int. J. Crit. Infrastruct. 7(1), 73\u201390 (2011)","journal-title":"Int. J. Crit. Infrastruct."},{"issue":"6","key":"57_CR5","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1016\/j.ress.2010.12.006","volume":"96","author":"IB Utne","year":"2011","unstructured":"Utne, I.B., Hokstad, P., Vatn, J.: A method for risk modeling of interdependencies in critical infrastructures. Reliab. Eng. Syst. Safety 96(6), 671\u2013678 (2011)","journal-title":"Reliab. Eng. Syst. Safety"},{"key":"57_CR6","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.ress.2012.02.006","volume":"105","author":"GH Kj\u00f8lle","year":"2012","unstructured":"Kj\u00f8lle, G.H., Utne, I.B., Gjerde, O.: Risk analysis of critical infrastructures emphasizing electricity supply and interdependencies. Reliab. Eng. Syst. Safety 105, 80\u201389 (2012)","journal-title":"Reliab. Eng. Syst. Safety"},{"issue":"1","key":"57_CR7","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1504\/IJCIS.2011.038958","volume":"7","author":"L Franchina","year":"2011","unstructured":"Franchina, L., Carbonelli, M., Gratta, L., Crisci, M.: An impact-based approach for the analysis of cascading effects in critical infrastructures. Int. J. Crit. Infrastruct. 7(1), 73\u201390 (2011)","journal-title":"Int. J. Crit. Infrastruct."},{"issue":"3","key":"57_CR8","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1061\/(ASCE)1076-0342(2008)14:3(253)","volume":"14","author":"KLS Bernhardt","year":"2008","unstructured":"Bernhardt, K.L.S., McNeil, S.: Agent-based modeling: approach for improving infrastructure management. J. Infrastruct. Syst. 14(3), 253\u2013261 (2008)","journal-title":"J. Infrastruct. Syst."},{"key":"57_CR9","doi-asserted-by":"crossref","unstructured":"Rinaldi, S.M.: Modeling and simulating critical infrastructures and their interdependencies. In: Proceedings of the Hawaii international conference on system sciences (HICSS-37), Big Island, Hawaii, pp. 54\u201361 (2004)","DOI":"10.1109\/HICSS.2004.1265180"},{"issue":"1\u20132","key":"57_CR10","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1504\/IJSSE.2008.018138","volume":"1","author":"YY Haimes","year":"2008","unstructured":"Haimes, Y.Y.: Models for risk management of systems of systems. Int. J. Syst. Syst. Eng. 1(1\u20132), 222\u2013236 (2008)","journal-title":"Int. J. Syst. Syst. Eng."},{"key":"57_CR11","doi-asserted-by":"publisher","first-page":"1416","DOI":"10.1016\/j.ress.2009.02.002","volume":"94","author":"M Kaegi","year":"2009","unstructured":"Kaegi, M., Mock, R., Kr\u04e7ger, W.: Analyzing maintenance strategies by agent- based simulations: a feasibility study. Reliab. Eng. Syst. Safety 94, 1416\u20131421 (2009)","journal-title":"Reliab. Eng. Syst. Safety"},{"key":"57_CR12","unstructured":"Ehlen, M.A., Scholand, A.J.: Modeling interdependencies between power and economic sectors using the N-ABLE agent based model. In: Proceedings of the IEEE conference on power systems. San Francisco (2005)"},{"key":"57_CR13","doi-asserted-by":"publisher","first-page":"2194","DOI":"10.1016\/j.wasman.2010.05.012","volume":"30","author":"N Kollikkathara","year":"2010","unstructured":"Kollikkathara, N., Feng, H., Yu, D.: A system dynamic modelling approach for evaluating municipal solid waste generation, land fill capacity and related cost management issues. Waste Manag. 30, 2194\u20132203 (2010)","journal-title":"Waste Manag."},{"key":"57_CR14","doi-asserted-by":"crossref","unstructured":"O\u2032Reilly, G.P., Jrad, A., Kelic, A., LeClaire, R.: Telecom critical infrastructure simulations: discrete event simulation vs. dynamic simulate on how do they compare? In: Proceedings of the IEEE global telecommunications conference, Washington, DC, pp. 2597\u20132601 (2007) \n                      http:\/\/dx.doi.org\/10.1109\/GLOCOM.2007.493","DOI":"10.1109\/GLOCOM.2007.493"},{"issue":"5","key":"57_CR15","first-page":"21","volume":"6","author":"RF Stapelberg","year":"2008","unstructured":"Stapelberg, R.F.: Infrastructure systems interdependencies and risk informed decision making (RIDM): impact scenario an alysis of infrastructure risks induced by natural, technological and intentional hazards. J. Syst. Cybern. Inf. 6(5), 21\u201327 (2008)","journal-title":"J. Syst. Cybern. Inf."},{"issue":"4","key":"57_CR16","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1111\/j.1541-1338.2009.00392.x","volume":"26","author":"N Santella","year":"2009","unstructured":"Santella, N., Steinberg, L.J., Parks, K.: Decision making for extreme events: modeling critical infrastructure interdependencies to aid mitigation and response planning. Rev. Policy Res. 26(4), 409\u2013422 (2009)","journal-title":"Rev. Policy Res."},{"key":"57_CR17","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1080\/07408170600940005","volume":"39","author":"HJ Min","year":"2007","unstructured":"Min, H.J., Beyeler, W., Brown, T., Son, Y.J., Jones, A.T.: Toward modelling and simulation of critical national infrastructure interdependencies. IEEE Trans. 39, 57\u201371 (2007)","journal-title":"IEEE Trans."},{"key":"57_CR18","unstructured":"Brown, T.: Multiple modeling approaches and insights for critical infrastructure protection. In: Skanata, D., Byrd, D.M. (eds.) Computational Models of Risks to Infrastructure, NATO Science for Peace and Security Series D: Information and Communication Security, vol. 13, p. 329. IOS Press, Amsterdam"},{"issue":"6","key":"57_CR19","doi-asserted-by":"publisher","first-page":"1437","DOI":"10.1111\/j.0272-4332.2004.00540.x","volume":"24","author":"JR Santos","year":"2004","unstructured":"Santos, J.R., Haimes, Y.Y.: Modeling the demand reduction input\u2013output (I\u2013O) inoperability due to terrorism of interconnected infrastructures. Risk Anal. 24(6), 1437\u20131451 (2004)","journal-title":"Risk Anal."},{"issue":"2","key":"57_CR20","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1061\/(ASCE)1076-0342(2005)11:2(67)","volume":"11","author":"YY Haimes","year":"2005","unstructured":"Haimes, Y.Y., Horowitz, B.M., Lambert, J.H., Santos, J.R., Lian, C., Crowther, K.G.: Inoperability input\u2013output model for interdependent infrastructure sectors. I: theory and methodology. J. Infrastruct. Syst. 11(2), 67\u201379 (2005)","journal-title":"J. Infrastruct. Syst."},{"key":"57_CR21","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-540-24787-6_2","volume-title":"Modeling Spatial and Economic Impacts of Disasters","author":"A Rose","year":"2004","unstructured":"Rose, A.: Economic principles, issues, and research priorities in hazard loss estimation. In: Okuyama, Y., Chang, S. (eds.) Modeling Spatial and Economic Impacts of Disasters, pp. 13\u201336. Springer, New York (2004)"},{"issue":"3","key":"57_CR22","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1016\/j.trb.2010.10.001","volume":"45","author":"P Zhang","year":"2011","unstructured":"Zhang, P., Peeta, S.: A generalized modelling framework to analyze interdependencies among infrastructure systems. Transp. Res. Part B: Methodol. 45(3), 553\u2013579 (2011)","journal-title":"Transp. Res. Part B: Methodol."},{"key":"57_CR23","unstructured":"Zhang, P., Peeta, S.: Dynamic analysis of interdependent infrastructure systems. In: Proceedings of the 90th Annual Meeting of the Transportation Research Board, Washington, DC (CD-ROM) (2011)"},{"issue":"6","key":"57_CR24","doi-asserted-by":"publisher","first-page":"1303","DOI":"10.1109\/TSMCC.2007.905859","volume":"37","author":"EE Lee","year":"2007","unstructured":"Lee, E.E., Mitchell, J.E., Wallace, W.A.: Restoration of services in interdependent infrastructure systems: a network flows approach. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 37(6), 1303\u20131317 (2007)","journal-title":"IEEE Trans. Syst. Man Cybern. Part C Appl. Rev."},{"issue":"1","key":"57_CR25","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.istr.2007.02.005","volume":"12","author":"NK Svendsen","year":"2007","unstructured":"Svendsen, N.K., Wolthusen, S.D.: Connectivity models of interdependency in mixed-type critical infrastructure networks. Inf. Secur. Tech. Rep. 12(1), 44\u201355 (2007)","journal-title":"Inf. Secur. Tech. Rep."},{"issue":"11","key":"57_CR26","doi-asserted-by":"publisher","first-page":"1462","DOI":"10.1016\/j.ress.2011.06.002","volume":"96","author":"M Ouyang","year":"2011","unstructured":"Ouyang, M., Duenas-Osorio, L.: An approach to design interface topologies across interdependent urban infrastructure systems. Reliab. Eng. Syst. Saf. 96(11), 1462\u20131473 (2011)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"57_CR27","series-title":"Lecture Notes in Geoinformation and Cartography","volume-title":"Advancesin 3D Geo-Information Sciences","author":"T Becker","year":"2011","unstructured":"Becker, T., Nagel, C., Kolbe, T.H.: Integrated 3D modelling of multi-utility networks and their interdependencies for critical infrastructure analysis. In: Kolbe, T.H., K\u00f6nig, G., Nagel, C. (eds.) Advancesin 3D Geo-Information Sciences. Lecture Notes in Geoinformation and Cartography. Springer, Heidelberg (2011). \n                      http:\/\/dx.doi.org\/10.1007\/978-3-642-12670-3_1"},{"issue":"3","key":"57_CR28","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1061\/(ASCE)1076-0342(2008)14:3(253)","volume":"14","author":"KLS Bernhardt","year":"2008","unstructured":"Bernhardt, K.L.S., McNeil, S.: Agent-based modeling: approach for improving infrastructure management. J. Infrastruct. Syst. 14(3), 253\u2013261 (2008)","journal-title":"J. Infrastruct. Syst."},{"key":"57_CR29","doi-asserted-by":"crossref","unstructured":"Brummitt, C.D., D\u2019Souza, R.M., Leicht, E.A.: Suppressing cascades of load in interdependent networks. In: Proceedings of the National Academy of Sciences, vol. 109, no. 12 (2011)","DOI":"10.1073\/pnas.1110586109"},{"key":"57_CR30","doi-asserted-by":"crossref","unstructured":"Eusgeld, I., Nan, C.: Creating a simulation environment for critical infrastructure interdependencies study. In: Proceedings of the IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), pp. 2104\u20132108 (2009)","DOI":"10.1109\/IEEM.2009.5373155"},{"key":"57_CR31","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1016\/j.ress.2010.12.010","volume":"96","author":"I Eusgeld","year":"2011","unstructured":"Eusgeld, I., Nan, C., Dietz, S.: System-of systems approach for interdependent critical infrastructures. Reliab. Eng. Syst. Saf. 96, 679\u2013686 (2011)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"57_CR32","doi-asserted-by":"crossref","unstructured":"Polemi, D., Ntouskas, T., Georgakakis, E., Douligeris, C., Theoharidou, M., Gritzalis, D.: S-Port: collaborative security management of Port Information systems. In: 2013 Fourth International Conference on Information, Intelligence, Systems and Applications (IISA), vol. 1, no. 6, pp. 10\u201312 (2013)","DOI":"10.1109\/IISA.2013.6623698"},{"key":"57_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/978-3-642-41476-3_9","volume-title":"Critical Information Infrastructure Security","author":"P Kotzanikolaou","year":"2013","unstructured":"Kotzanikolaou, P., Theoharidou, M., Gritzalis, D.: Interdependencies between critical infrastructures: analyzing the risk of cascading effects. In: Bologna, S., H\u00e4mmerli, B., Gritzalis, D., Wolthusen, S. (eds.) CRITIS 2011. LNCS, vol. 6983, pp. 104\u2013115. Springer, Heidelberg (2013)"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_57","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T15:21:18Z","timestamp":1583508078000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_57","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}