{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:33:40Z","timestamp":1725867220827},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319474120"},{"type":"electronic","value":"9783319474137"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47413-7_10","type":"book-chapter","created":{"date-parts":[[2016,10,4]],"date-time":"2016-10-04T20:20:15Z","timestamp":1475612415000},"page":"159-171","source":"Crossref","is-referenced-by-count":2,"title":["A Methodology to Apply a Game Theoretic Model of Security Risks Interdependencies Between ICT and Electric Infrastructures"],"prefix":"10.1007","author":[{"given":"Ziad","family":"Ismail","sequence":"first","affiliation":[]},{"given":"Jean","family":"Leneutre","sequence":"additional","affiliation":[]},{"given":"David","family":"Bateman","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,5]]},"reference":[{"key":"10_CR1","volume-title":"Risk Assessment of Power Systems: Models, Methods, and Applications","author":"W Li","year":"2005","unstructured":"Li, W.: Risk Assessment of Power Systems: Models, Methods, and Applications. Wiley-IEEE Press, New York (2005)"},{"key":"10_CR2","unstructured":"Agence Nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information. EBIOS Risk Management Method (2010). http:\/\/www.ssi.gouv.fr\/IMG\/pdf\/EBIOS-1-GuideMethodologique-2010-01-25.pdf"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Laprie, J., Kanoun, K., Kaniche, M.: Modeling interdependencies between the electricity and information infrastructures. In: SAFECOMP, pp. 54\u201367 (2007)","DOI":"10.1007\/978-3-540-75101-4_5"},{"key":"10_CR4","doi-asserted-by":"crossref","first-page":"1025","DOI":"10.1038\/nature08932","volume":"464","author":"S Buldyrev","year":"2010","unstructured":"Buldyrev, S., Parshani, R., Paul, G., Stanley, H.E., Havlin, S.: Catastrophic cascade of failures in interdependent networks. Nature 464, 1025\u20131028 (2010)","journal-title":"Nature"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Casalicchio, E., Galli, E., Tucci, S.: Federated agent-based modeling and simulation approach to study interdependencies in it critical infrastructures. In: IEEE 11th International Symposium on Distributed Simulation and Real-Time Applications, pp. 182\u2013189 (2007)","DOI":"10.1109\/DS-RT.2007.11"},{"issue":"4","key":"10_CR6","doi-asserted-by":"crossref","first-page":"741","DOI":"10.1109\/TSG.2011.2160000","volume":"2","author":"T Chen","year":"2011","unstructured":"Chen, T., Sanchez-Aarnoutse, J., Buford, J.: Petri net modeling of cyber-physical attacks on smart grid. IEEE Trans. Smart Grid 2(4), 741\u2013749 (2011)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"3","key":"10_CR7","doi-asserted-by":"crossref","first-page":"1444","DOI":"10.1109\/TSG.2012.2191805","volume":"3","author":"H Lin","year":"2012","unstructured":"Lin, H., Veda, S.S., Shukla, S.K., Mili, L., Thorp, J.S.: GECO: global event-driven co-simulation framework for interconnected power system and communication network. IEEE Trans. Smart Grid 3(3), 1444\u20131456 (2012)","journal-title":"IEEE Trans. Smart Grid"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Law, Y.W., Alpcan, T., Palaniswami, M.: Security games for voltage control in smart grid. In: 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp. 212\u2013219 (2012)","DOI":"10.1109\/Allerton.2012.6483220"},{"issue":"1","key":"10_CR9","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/MNET.2013.6423187","volume":"27","author":"S Amin","year":"2013","unstructured":"Amin, S., Schwartz, G., Hussain, A.: In quest of benchmarking security risks to cyber-physical systems. IEEE Netw. 27(1), 19\u201324 (2013)","journal-title":"IEEE Netw."},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Ismail, Z., Leneutre, J., Bateman, D., Chen, L.: A game-theoretical model for security risk management of interdependent ict and electrical infrastructures. In: IEEE 16th International Symposium on High Assurance Systems Engineering (HASE), pp. 101\u2013109 (2015)","DOI":"10.1109\/HASE.2015.24"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Alpcan, T., Bambos, N.: Modeling dependencies in security risk management. In: Proceedings of the 4th International Conference on Risks and Security of Internet and Systems (Crisis) (2009)","DOI":"10.1109\/CRISIS.2009.5411969"},{"key":"10_CR12","volume-title":"A Course in Game Theory","author":"MJ Osborne","year":"1994","unstructured":"Osborne, M.J., Rubinstein, A.: A Course in Game Theory. MIT Press, Cambridge (1994)"},{"key":"10_CR13","doi-asserted-by":"crossref","DOI":"10.1002\/9780470466971","volume-title":"Optimization of Power System Operation","author":"J Zhu","year":"2009","unstructured":"Zhu, J.: Optimization of Power System Operation. Wiley-IEEE Press, Hoboken (2009)"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Pfitzner, R., Turitsyn, K., Chertkov, M.: Statistical classification of cascading failures in power grids. In: 2011 IEEE Power and Energy Society General Meeting, pp. 1\u20138 (2011)","DOI":"10.1109\/PES.2011.6039412"},{"issue":"1","key":"10_CR15","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/TPWRS.2010.2051168","volume":"26","author":"R Zimmerman","year":"2011","unstructured":"Zimmerman, R., Murillo-Snchez, C., Thomas, R.: Matpower: steady-state operations, planning, and analysis tools for power systems research and education. IEEE Trans. Power Syst. 26(1), 12\u201319 (2011)","journal-title":"IEEE Trans. Power Syst."},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Ingols, K., Lippmann, R., Piwowarski, K.: Practical attack graph generation for network defense. In: 22nd Annual Computer Security Applications Conference (ACSAC), pp. 121\u2013130 (2006)","DOI":"10.1109\/ACSAC.2006.39"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Ismail, Z., Leneutre, J., Fourati, A.: An attack execution model for industrial control systems security assessment. In: Proceedings of the First Conference on Cybersecurity of Industrial Control Systems (CyberICS) (2015)","DOI":"10.1007\/978-3-319-40385-4_11"}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47413-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T07:56:26Z","timestamp":1568447786000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47413-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319474120","9783319474137"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47413-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}