{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:51:53Z","timestamp":1742939513123,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319487366"},{"type":"electronic","value":"9783319487373"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48737-3_9","type":"book-chapter","created":{"date-parts":[[2016,11,2]],"date-time":"2016-11-02T01:02:29Z","timestamp":1478048549000},"page":"149-167","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Multigraph Critical Infrastructure Model"],"prefix":"10.1007","author":[{"given":"Bernhard","family":"Schneidhofer","sequence":"first","affiliation":[]},{"given":"Stephen","family":"Wolthusen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,3]]},"reference":[{"key":"9_CR1","unstructured":"Abdalla, R., Niall, K.: Location-Based Critical Infrastructure Interdependency (LBCII), Technical Report, DRDC Toronto TR 2009\u2013130, Defence R&D Canada, Toronto, Canada (2010). \n                    cradpdf.drdc-rddc.gc.ca\/PDFS\/unc100\/p.533788_A1b.pdf"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Arnold, F., Hermanns, H., Pulungan, R., Stoelinga, M.: Time-dependent analysis of attacks, in Principles of Security and Trust, M. Abadi and S. Kremer (Eds.), Springer-Verlag, Berlin Heidelberg, Germany, pp. 285\u2013305 (2014)","DOI":"10.1007\/978-3-642-54792-8_16"},{"issue":"2","key":"9_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/jsse.2012040101","volume":"3","author":"Alessandra Bagnato","year":"2012","unstructured":"Bagnato, A., Kordy, B., Meland, P., Schweitzer, P.: Attribute decoration of attack-defense trees, International Journal of Secure Software Engineering, vol. 3(2), pp. 1\u201335 (2012)","journal-title":"International Journal of Secure Software Engineering"},{"issue":"10","key":"9_CR4","doi-asserted-by":"crossref","first-page":"667","DOI":"10.1038\/nphys2727","volume":"9","author":"Amir Bashan","year":"2013","unstructured":"Bashan, A., Berezin, Y., Buldyrev, S., Havlin, S.: The extreme vulnerability of interdependent spatially embedded networks, Nature Physics, vol. 9(10), pp. 667\u2013672 (2013)","journal-title":"Nature Physics"},{"key":"9_CR5","first-page":"48","volume-title":"Lecture Notes in Computer Science","author":"Marco Beccuti","year":"2009","unstructured":"Beccuti, M., Franceschinis, G., Kaaniche, M., Kanoun, K.: Multilevel dependability modeling of interdependencies between the electricity and information infrastructures, in Critical Information Infrastructure Security, R. Setola and S. Geretshuber (Eds.), Springer-Verlag, Berlin Heidelberg, Germany, pp. 48\u201359 (2009)"},{"key":"9_CR6","first-page":"155","volume-title":"Lecture Notes in Computer Science","author":"Francesco Cadini","year":"2009","unstructured":"Cadini, F., Zio, E., Petrescu, C.: Using centrality measures to rank the importance of the components of a complex network infrastructure, in Critical Information Infrastructure Security, R. Setola and S. Geretshuber (Eds.), Springer-Verlag, Berlin Heidelberg, Germany, pp. 155\u2013167 (2009)"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Dong, G., Du, R., Tian, L., Liu, R.: Robustness of network of networks with interdependent and interconnected links, Physica A: Statistical Mechanics and its Applications, vol. 424, pp. 11\u201318 (2015)","DOI":"10.1016\/j.physa.2014.12.019"},{"key":"9_CR8","unstructured":"European Council, Directive 2007\/2\/EC of the European Parliament and of the Council of 14 March 2007 Establishing an Infrastructure for Spatial Information in the European Community (INSPIRE), Brussels, Belgium (2007)"},{"key":"9_CR9","unstructured":"Grigsby, L.: The Electric Power Engineering Handbook, CRC Press, Boca Raton, Florida (2012)"},{"issue":"4","key":"9_CR10","doi-asserted-by":"crossref","first-page":"e59613","DOI":"10.1371\/journal.pone.0059613","volume":"8","author":"Swami Iyer","year":"2013","unstructured":"Iyer, S., Killingback, T., Sundaram, B., Wang, Z.: Attack robustness and centrality of computer networks, PLOS ONE, vol. 8(4), 2013","journal-title":"PLoS ONE"},{"key":"9_CR11","first-page":"67","volume-title":"Springer Series in Reliability Engineering","author":"Jonas Johansson","year":"2012","unstructured":"Johansson, J., Hassel, H.: Vulnerability analyses of interdependent technical infrastructures, in Risk and Interdependencies in Critical Infrastructures, P. Hokstad, I. Utne and J. Vatn (Eds.), Springer-Verlag, London, United Kingdom, pp. 67\u201394 (2012)"},{"key":"9_CR12","unstructured":"Kelic, A., Warren, D., Philips, L.: Cyber and Physical Infrastructure Interdependencies, Sandia Report SAND2008-6192, Sandia National Laboratories, Albuquerque, New Mexico (2008)"},{"key":"9_CR13","unstructured":"Knapp, E.: Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA and Other Industrial Control Systems, Syngress, Waltham, Massachusetts (2011)"},{"key":"9_CR14","first-page":"80","volume-title":"Lecture Notes in Computer Science","author":"Barbara Kordy","year":"2011","unstructured":"Kordy, B., Mauw, S., Radomirovic, S., Schweitzer, P.: Foundations of attack- defense trees, in Formal Aspects of Security and Trust, P. Degano, S. Etalle and J. Guttman (Eds.), Springer-Verlag, Berlin Heidelberg, Germany, pp. 80\u201395 (2011)"},{"issue":"1\/2","key":"9_CR15","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1504\/IJCIS.2013.051606","volume":"9","author":"Panayiotis Kotzanikolaou","year":"2013","unstructured":"Kotzanikolaou, P., Theoharidou, M., Gritzalis, D.: Assessing n-order dependencies between critical infrastructures, International Journal of Critical Infrastructures, vol. 9(1\u20132), pp. 93\u2013110 (2013)","journal-title":"International Journal of Critical Infrastructures"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Semerow, A., Hohn, S., Luther, M., Sattinger, W., Abildgaard, H., Diaz Garcia, A., Giannuzzi, G.: Dynamic study model for the interconnected power system of Continental Europe in different simulation tools, Proceedings of the IEEE PowerTech Conference (2015)","DOI":"10.1109\/PTC.2015.7232578"},{"key":"9_CR17","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1016\/j.ijcip.2015.05.003","volume":"10","author":"George Stergiopoulos","year":"2015","unstructured":"Stergiopoulos, G., Kotzanikolaou, P., Theocharidou, M., Gritzalis, D.: Risk mitigation strategies for critical infrastructures based on graph centrality analysis, International Journal of Critical Infrastructure Protection, vol. 10, pp. 34\u201344 (2015)","journal-title":"International Journal of Critical Infrastructure Protection"},{"key":"9_CR18","unstructured":"Steyrer, A.: Threat of Austrian Energy Supply through Smart Metering and Smart Grid (Bedrohung der Osterreichischen Energieversorgung durch Smart Metering und Smart Grid), M.S. Thesis, Vienna University of Technology, Vienna, Austria (2013)"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Svendsen, N., Wolthusen, S.: Multigraph dependency models for heterogeneous infrastructures, in Critical Infrastructure Protection, E. Goetz and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 337\u2013350 (2008)","DOI":"10.1007\/978-0-387-75462-8_24"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Svendsen, N., Wolthusen, S.: Modeling approaches, in Critical Infrastructure Protection, J. Lopez, R. Setola and S. Wolthusen (Eds.), Springer-Verlag, Berlin Heidelberg, Germany, pp. 68\u201397 (2012)","DOI":"10.1007\/978-3-642-28920-0_5"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Weldehawaryat, G., Wolthusen, S.: Modeling interdependencies over incomplete join structures of power law networks, Proceedings of the Eleventh International Conference on the Design of Reliable Communication Networks, pp. 173\u2013178 (2015)","DOI":"10.1109\/DRCN.2015.7149009"}],"container-title":["IFIP Advances in Information and Communication Technology","Critical Infrastructure Protection X"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48737-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,7]],"date-time":"2020-11-07T01:08:35Z","timestamp":1604711315000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48737-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319487366","9783319487373"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48737-3_9","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"3 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Critical Infrastructure Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Arlington","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 March 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 March 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccip2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}