{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T23:40:02Z","timestamp":1749685202332,"version":"3.41.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319487366"},{"type":"electronic","value":"9783319487373"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48737-3_13","type":"book-chapter","created":{"date-parts":[[2016,11,2]],"date-time":"2016-11-02T01:02:29Z","timestamp":1478048549000},"page":"221-237","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Towards a Comparable Cross-Sector Risk Analysis: RAMCAP Revisited"],"prefix":"10.1007","author":[{"given":"Richard","family":"White","sequence":"first","affiliation":[]},{"given":"Aaron","family":"Burkhart","sequence":"additional","affiliation":[]},{"given":"Terrance","family":"Boult","sequence":"additional","affiliation":[]},{"given":"Edward","family":"Chow","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,3]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Adar, E., Wuchner, A.: Risk management for critical infrastructure protection challenges, best practices and tools, Proceedings of the First IEEE International Workshop on Critical Infrastructure Protection, pp. 90\u2013100 (2005)","DOI":"10.1109\/IWCIP.2005.18"},{"key":"13_CR2","unstructured":"American Water Works Association, Risk and Resilience Management of Water and Wastewater Systems. Denver, Colorado (2010)"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Carreras, B., Newman, D., Gradney, P., Lynch, V., Dobson, I.: Interdependent risk in interacting infrastructure systems, Proceedings of the Fortieth Annual Hawaii International Conference on System Sciences (2007)","DOI":"10.1109\/HICSS.2007.285"},{"issue":"6","key":"13_CR4","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1080\/1366987042000192237","volume":"7","author":"R. M. Cooke","year":"2004","unstructured":"Cooke, R., Goossens, L.: Expert judgment elicitation for risk assessments of critical infrastructures, Journal of Risk Research, vol. 7(6), pp. 643\u2013656 (2004)","journal-title":"Journal of Risk Research"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Cox, L.: What\u2019s wrong with risk matrices? Risk Analysis, vol. 28(2), pp. 497\u2013512 (2008)","DOI":"10.1111\/j.1539-6924.2008.01030.x"},{"issue":"3","key":"13_CR6","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1111\/j.1539-6924.2005.00615.x","volume":"25","author":"Louis Anthony (Tony) Cox","year":"2005","unstructured":"Cox, L., Babayev, D., Huber, W.: Some limitations of qualitative risk rating systems, Risk Analysis, vol. 25(3), pp. 651\u2013662 (2005)","journal-title":"Risk Analysis"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Creese, S., Goldsmith, M., Adetoye, A.: A logical high-level framework for critical infrastructure resilience and risk assessment, Proceedings of the Third Workshop on Cyberspace Safety and Security, pp. 7\u201314 (2011)","DOI":"10.1109\/CSS.2011.6058564"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Daniels, D., Ware, B.: State\/local CIP risk analysis: First results and emerging trends in the data, Proceedings of the IEEE Conference on Technologies for Homeland Security, pp. 393\u2013400 (2009)","DOI":"10.1109\/THS.2009.5168064"},{"issue":"4","key":"13_CR9","doi-asserted-by":"crossref","first-page":"668","DOI":"10.1109\/TITS.2009.2026310","volume":"10","author":"M. Ghazel","year":"2009","unstructured":"Ghazel, M.: Using stochastic Petri nets for level-crossing collision risk assessment, IEEE Transactions on Intelligent Transportation Systems, vol. 10(4), pp. 668\u2013677 (2009)","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"13_CR10","unstructured":"Giannopoulos, G., Filippini, R., Schimmer, M.: Risk AssessmentMethodologies for Critical Infrastructure Protection, Part 1: A State of the Art, JRC 70046, European Commission Joint Research Centre, Ispra, Italy (2012)"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Lee, S.: Probabilistic risk assessment for security requirements: A preliminary study, Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, pp. 11\u201320 (2011)","DOI":"10.1109\/SSIRI.2011.12"},{"key":"13_CR12","doi-asserted-by":"crossref","first-page":"3","DOI":"10.2495\/978-1-84564-562-5\/01","volume-title":"Critical Infrastructure Security","author":"Ted G. Lewis","year":"2012","unstructured":"Lewis, T., Darken, R., Mackin, T., Dudenhoeffer, D.: Model-based risk analysis for critical infrastructures, WIT Transactions on State-of-the-Art in Science and Engineering, vol. 54, pp. 3\u201319 (2012)"},{"key":"13_CR13","unstructured":"Masse, T., O\u2019Neil, S., Rollins, J.: The Department of Homeland Security\u2019s Risk Assessment Methodology: Evolution, Issues and Options for Congress, CRS Report for Congress, RL33858, Congressional Research Service, Washington, DC (2007)"},{"issue":"5","key":"13_CR14","doi-asserted-by":"crossref","first-page":"1265","DOI":"10.1111\/j.1539-6924.2007.00955.x","volume":"27","author":"William L. McGill","year":"2007","unstructured":"McGill, W., Ayyub, B., Kaminskiy, M.: Risk analysis for critical asset protection, Risk Analysis, vol. 27(5), pp. 1265\u20131281 (2007)","journal-title":"Risk Analysis"},{"key":"13_CR15","unstructured":"Moteff, J.: Critical Infrastructures: Background, Policy and Implementation, CRS Report for Congress, RL30153, Congressional Research Service, Washington, DC (2015)"},{"key":"13_CR16","unstructured":"National Research Council, Review of the Department of Homeland Security\u2019s Approach to Risk Analysis, National Academies Press, Washington, DC (2010)"},{"key":"13_CR17","unstructured":"Newman, D., Nkei, B., Carreras, B., Dobson, I., Lynch, V., Gradney, P.: Risk assessment in complex interacting infrastructure systems, Proceedings of the Thirty-Eighth Annual Hawaii International Conference on System Sciences (2005)"},{"key":"13_CR18","unstructured":"Pederson, P., Dudenhoeffer, D., Hartley, S., Permann, M.: Critical Infrastructure Interdependency Modeling: A Survey of U.S. and International Research, INL\/EXT-06-11464, Idaho National Laboratory, Idaho Falls, Idaho (2006)"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Resurreccion, J., Santos, J.: Stochastic modeling of manufacturing-based interdependent inventory for formulating sector prioritization strategies in reinforcing disaster preparedness, Proceedings of the IEEE Systems and Information Engineering Design Symposium, pp. 134\u2013139 (2012)","DOI":"10.1109\/SIEDS.2012.6215127"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Schechtman, E.: Odds ratio, relative risk, absolute risk reduction and the number needed to treat - Which of these should we use? Value in Health, vol. 5(5), pp. 431\u2013436 (2002)","DOI":"10.1046\/J.1524-4733.2002.55150.x"},{"key":"13_CR21","unstructured":"Stamatelatos, M.: Probabilistic Risk Assessment: What is it and Why is it Worth Performing it? NASA Office of Safety and Mission Assurance, National Aeronautics and Space Administration, Washington, DC (2000)"},{"key":"13_CR22","unstructured":"U.S. Department of Homeland Security, National Infrastructure Protection Plan, Washington, DC (2006)"},{"key":"13_CR23","unstructured":"U.S. Department of Homeland Security, National Infrastructure Protection Plan: Partnering for Critical Infrastructure Security and Resilience, Washington, DC (2013)"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Volkanovski, A., Cepin, M., Mavko, B.: Application of fault tree analysis for assessment of power system reliability, Reliability Engineering and System Safety, vol. 94(6), pp. 1116\u20131127 (2009)","DOI":"10.1016\/j.ress.2009.01.004"},{"key":"13_CR25","unstructured":"Woo, G.: The evolution of terrorism risk modeling, Journal of Reinsurance, vol. 10(3), pp. 1\u20139 (2003)"}],"container-title":["IFIP Advances in Information and Communication Technology","Critical Infrastructure Protection X"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48737-3_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T23:12:50Z","timestamp":1749683570000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48737-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319487366","9783319487373"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48737-3_13","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"3 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Critical Infrastructure Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Arlington","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 March 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 March 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccip2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}