{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:08:03Z","timestamp":1748664483717,"version":"3.41.0"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319242484"},{"type":"electronic","value":"9783319242491"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24249-1_29","type":"book-chapter","created":{"date-parts":[[2015,9,7]],"date-time":"2015-09-07T11:43:15Z","timestamp":1441626195000},"page":"335-344","source":"Crossref","is-referenced-by-count":2,"title":["How to Use Mobile Communication in Critical Infrastructures: A Dependability Analysis"],"prefix":"10.1007","author":[{"given":"Jonas","family":"W\u00e4fler","sequence":"first","affiliation":[]},{"given":"Poul E.","family":"Heegaard","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,9]]},"reference":[{"key":"29_CR1","unstructured":"International Energy Agency (IEA), Technology roadmap: Smart grids (2011)"},{"issue":"6","key":"29_CR2","doi-asserted-by":"publisher","first-page":"928","DOI":"10.1109\/JPROC.2011.2116110","volume":"99","author":"DE Bakken","year":"2011","unstructured":"Bakken, D.E., Bose, A., Hauser, C.H., Whitehead, D.E., Zweigle, G.C.: Smart generation and transmission with coherent, real-time data. Proc. IEEE 99(6), 928\u2013951 (2011)","journal-title":"Proc. IEEE"},{"key":"29_CR3","unstructured":"Electric Power Research Institute (EPRI), The integrated energy and communication systems architechture, vol. IV, Technical analysis, Technical Report (2004)"},{"issue":"1","key":"29_CR4","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/TPWRD.2008.917693","volume":"24","author":"H Gjermundrod","year":"2009","unstructured":"Gjermundrod, H., Bakken, D.E., Hauser, C.H., Bose, A.: GridStat: a flexible QoS-managed data dissemination framework for the power grid. IEEE Trans. Power Deliv. 24(1), 136\u2013143 (2009)","journal-title":"IEEE Trans. Power Deliv."},{"key":"29_CR5","unstructured":"Forskrift om prioritet i mobilnett, [Regulation about Priorities in Mobile Networks], FOR-2013-10-21-1241, NKOM, Norwegian Communication Authority (2013)"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"F\u00f8lstad, E.L., Helvik, B.E.: Failures and changes in cellular access networks: a study of field data. In: Proceedings of DRCN, pp. 132\u2013139 (2011)","DOI":"10.1109\/DRCN.2011.6076895"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Matz, S.M., Votta, L.G., Malkawi, M.: Analysis of failure and recovery rates in a wireless telecommunications system.: In: Proceedings of Dependable Systems and Networks (DSN), pp. 687\u2013693 (2002)","DOI":"10.1109\/DSN.2002.1029014"},{"key":"29_CR8","unstructured":"Kvalbein, A.: Robusthet i norske mobilnett, [Robustness in Norwegian mobile networks], simula research laboratory, Technical Report (2013)"},{"issue":"1","key":"29_CR9","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A Avizienis","year":"2004","unstructured":"Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable Secure Comput. 1(1), 11\u201333 (2004)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"29_CR10","unstructured":"Avbrotsstatistikk 2013, [Outage statistics 2013], NVE, Norwegian Water Resources and Energy Directorate (2014)"},{"key":"29_CR11","unstructured":"Sikkerhet og beredskap mot ekstremv\u00e6r i telesektoren, [Security and preparedness for extreme weather situations in the telecommunication sector], Working Group Energi Norge and Telenor, Technical Report (2013)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24249-1_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T13:23:08Z","timestamp":1748611388000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24249-1_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319242484","9783319242491"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24249-1_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}