{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:29:11Z","timestamp":1742934551524,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319713670"},{"type":"electronic","value":"9783319713687"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71368-7_14","type":"book-chapter","created":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T07:22:30Z","timestamp":1511248950000},"page":"163-175","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Dynamic Risk Analyses and Dependency-Aware Root Cause Model for Critical Infrastructures"],"prefix":"10.1007","author":[{"given":"Steve","family":"Muller","sequence":"first","affiliation":[]},{"given":"Carlo","family":"Harpes","sequence":"additional","affiliation":[]},{"given":"Yves","family":"Le Traon","sequence":"additional","affiliation":[]},{"given":"Sylvain","family":"Gombault","sequence":"additional","affiliation":[]},{"given":"Jean-Marie","family":"Bonnin","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Hoffmann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,22]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Rinaldi, S.M.: Modeling and simulating critical infrastructures and their interdependencies. In: Proceedings of the 37th Annual Hawaii International Conference on System Sciences, p. 8. IEEE (2004)","DOI":"10.1109\/HICSS.2004.1265180"},{"key":"14_CR2","unstructured":"International Organization for Standardization: ISO\/IEC 27019 (2013)"},{"key":"14_CR3","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI): IT-Grundschutz (2005)"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-3-642-21694-7_14","volume-title":"Critical Information Infrastructures Security","author":"M Aubigny","year":"2011","unstructured":"Aubigny, M., Harpes, C., Castrucci, M.: Risk ontology and service quality descriptor shared among interdependent critical infrastructures. In: Xenakis, C., Wolthusen, S. (eds.) CRITIS 2010. LNCS, vol. 6712, pp. 157\u2013160. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-21694-7_14"},{"issue":"3\u20134","key":"14_CR5","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1504\/IJSSE.2013.057669","volume":"4","author":"C Foglietta","year":"2013","unstructured":"Foglietta, C., Panzieri, S., Macone, D., Liberati, F., Simeoni, A.: Detection and impact of cyber attacks in a critical infrastructures scenario: the CockpitCI approach. Int. J. Syst. Syst. Eng. 4(3\u20134), 211\u2013221 (2013)","journal-title":"Int. J. Syst. Syst. Eng."},{"issue":"2","key":"14_CR6","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/S0378-7206(03)00044-2","volume":"41","author":"B Suh","year":"2003","unstructured":"Suh, B., Han, I.: The IS risk analysis based on a business model. Inf. Manag. 41(2), 149\u2013158 (2003)","journal-title":"Inf. Manag."},{"issue":"6","key":"14_CR7","first-page":"81","volume":"8","author":"X Tong","year":"2014","unstructured":"Tong, X., Ban, X.: A hierarchical information system risk evaluation method based on asset dependence chain. Int. J. Secur. Appl. 8(6), 81\u201388 (2014)","journal-title":"Int. J. Secur. Appl."},{"issue":"3","key":"14_CR8","first-page":"72","volume":"4","author":"J Breier","year":"2014","unstructured":"Breier, J.: Asset valuation method for dependent entities. J. Internet Serv. Inf. Secur. (JISIS) 4(3), 72\u201381 (2014)","journal-title":"J. Internet Serv. Inf. Secur. (JISIS)"},{"key":"14_CR9","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.ijcip.2015.12.002","volume":"12","author":"G Stergiopoulos","year":"2016","unstructured":"Stergiopoulos, G., Kotzanikolaou, P., Theocharidou, M., Lykou, G., Gritzalis, D.: Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures. Int. J. Crit. Infrastruct. Prot. 12, 46\u201360 (2016)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"issue":"4","key":"14_CR10","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1007\/s10669-013-9463-4","volume":"33","author":"F Baiardi","year":"2013","unstructured":"Baiardi, F., Sgandurra, D.: Assessing ICT risk through a Monte Carlo method. Environ. Syst. Decis. 33(4), 486\u2013499 (2013)","journal-title":"Environ. Syst. Decis."},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-540-70567-3_22","volume-title":"Data and Applications Security XXII","author":"L Wang","year":"2008","unstructured":"Wang, L., Islam, T., Long, T., Singhal, A., Jajodia, S.: An attack graph-based probabilistic security metric. In: Atluri, V. (ed.) DBSec 2008. LNCS, vol. 5094, pp. 283\u2013296. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-70567-3_22"},{"key":"14_CR12","unstructured":"Homer, J., Ou, X., Schmidt, D.: A sound and practical approach to quantifying security risk in enterprise networks. Kansas State University Techn. Report (2009)"},{"key":"14_CR13","volume-title":"Causality: Models, Reasoning, and Inference","author":"J Pearl","year":"2000","unstructured":"Pearl, J.: Causality: Models, Reasoning, and Inference. Cambridge University Press, New York (2000)"},{"key":"14_CR14","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.cose.2016.09.008","volume":"64","author":"S Muller","year":"2017","unstructured":"Muller, S., Harpes, C., Le Traon, Y., Gombault, S., Bonnin, J.-M.: Efficiently computing the likelihoods of cyclically interdependent risk scenarios. Comput. Secur. 64, 59\u201368 (2017)","journal-title":"Comput. Secur."},{"key":"14_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-3-642-03552-4_12","volume-title":"Critical Information Infrastructure Security","author":"R Klein","year":"2009","unstructured":"Klein, R.: Information modelling and simulation in large dependent critical infrastructures \u2013 an overview on the european integrated project IRRIIS. In: Setola, R., Geretshuber, S. (eds.) CRITIS 2008. LNCS, vol. 5508, pp. 131\u2013143. Springer, Heidelberg (2009). \nhttps:\/\/doi.org\/10.1007\/978-3-642-03552-4_12"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Grochocki, D., Huh, J.H., Berthier, R., Bobba, R., Sanders, W.H., C\u00e1rdenas, A.A., Jetcheva, J.G.: AMI threats, intrusion detection requirements and deployment recommendations. In: 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm), pp. 395\u2013400. IEEE (2012)","DOI":"10.1109\/SmartGridComm.2012.6486016"},{"key":"14_CR17","unstructured":"ENISA: Communication network interdependencies in smart grids (2016)"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71368-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,31]],"date-time":"2018-01-31T22:32:41Z","timestamp":1517437961000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71368-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319713670","9783319713687"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71368-7_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}