{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T09:24:57Z","timestamp":1758273897683,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319713670"},{"type":"electronic","value":"9783319713687"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71368-7_27","type":"book-chapter","created":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T07:22:30Z","timestamp":1511248950000},"page":"308-320","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An Operator-Driven Approach for Modeling Interdependencies in Critical Infrastructures Based on Critical Services and Sectors"],"prefix":"10.1007","author":[{"given":"Elisa","family":"Canzani","sequence":"first","affiliation":[]},{"given":"Helmut","family":"Kaufmann","sequence":"additional","affiliation":[]},{"given":"Ulrike","family":"Lechner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,22]]},"reference":[{"key":"27_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-41476-3_1","volume-title":"Critical Information Infrastructure Security","author":"HAM Luiijf","year":"2013","unstructured":"Luiijf, H.A.M., Besseling, K., Spoelstra, M., de Graaf, P.: Ten national cyber security strategies: a comparison. In: Bologna, S., H\u00e4mmerli, B., Gritzalis, D., Wolthusen, S. (eds.) CRITIS 2011. LNCS, vol. 6983, pp. 1\u201317. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-41476-3_1"},{"key":"27_CR2","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1038\/nature08932","volume":"464","author":"SV Buldyrev","year":"2010","unstructured":"Buldyrev, S.V., Parshani, R., Paul, G., Stanley, H.E., Havlin, S.: Catastrophic cascade of failures in interdependent networks. Nature 464, 1025\u20131028 (2010)","journal-title":"Nature"},{"key":"27_CR3","unstructured":"Juuso, A., Takanen, A.: Proactive Cyber Security: Stay Ahead of Advanced Persistent Threats (APTs). Codenomicon WP (2012)"},{"key":"27_CR4","unstructured":"Mattioli, R., Levy-Benchton, C.: Methodologies for the identification of Critical Information Infrastructure assets and services (2014)"},{"key":"27_CR5","unstructured":"Canzani, E.: Modeling dynamics of disruptive events for impact analysis in networked critical infrastructures. In: 13th International Conference on Information Systems for Crisis Response and Management, ISCRAM (2016)"},{"key":"27_CR6","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1016\/j.ress.2010.12.010","volume":"96","author":"I Eusgeld","year":"2011","unstructured":"Eusgeld, I., Nan, C., Dietz, S.: System-of-systems approach for interdependent critical infrastructures. Reliab. Eng. Syst. Saf. 96, 679\u2013686 (2011)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Settanni, G., Skopik, F., Shovgenya, Y., Fiedler, R., Kaufmann, H., Gebhardt, T., Ponchel, C.: A blueprint for a pan-European cyber incident analysis system. In: 3rd International Symposium for ICS and SCADA Cyber Security Research 2015, pp. 84\u201388 (2015)","DOI":"10.14236\/ewic\/ICS2015.9"},{"key":"27_CR8","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1111\/j.1936-704X.2004.mp129001007.x","volume":"129","author":"J Hasan","year":"2004","unstructured":"Hasan, J., States, S., Deininger, R.: Safeguarding the security of public water supplies using early warning systems: a brief review. J. Contemp. Water Res. Educ. 129, 27\u201333 (2004)","journal-title":"J. Contemp. Water Res. Educ."},{"key":"27_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/11962977_9","volume-title":"Critical Information Infrastructures Security","author":"K Bsufka","year":"2006","unstructured":"Bsufka, K., Kroll-Peters, O., Albayrak, S.: Intelligent network-based early warning systems. In: Lopez, J. (ed.) CRITIS 2006. LNCS, vol. 4347, pp. 103\u2013111. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11962977_9"},{"key":"27_CR10","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/s00502-015-0286-5","volume":"132","author":"H Kaufmann","year":"2014","unstructured":"Kaufmann, H., Hutter, R., Skopik, F., Mantere, M.: A structural design for a pan-European early warning system for critical infrastructures. Elektrotechnik und Informationstechnik 132, 117\u2013121 (2014). Springer, Vienna","journal-title":"Elektrotechnik und Informationstechnik"},{"key":"27_CR11","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/37.969131","volume":"21","author":"SM Rinaldi","year":"2001","unstructured":"Rinaldi, S.M., Peerenboom, J.P., Kelly, T.K.: Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Syst. Mag. 21, 11\u201325 (2001)","journal-title":"IEEE Control Syst. Mag."},{"key":"27_CR12","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1093\/nsr\/nwu020","volume":"1","author":"J Gao","year":"2014","unstructured":"Gao, J., Li, D., Havlin, S.: From a single network to a network of networks. Natl. Sci. Rev. 1, 346\u2013356 (2014)","journal-title":"Natl. Sci. Rev."},{"key":"27_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-642-41476-3_2","volume-title":"Critical Information Infrastructure Security","author":"Adedayo O Adetoye","year":"2013","unstructured":"Adetoye, Adedayo O., Goldsmith, M., Creese, S.: Analysis of dependencies in critical infrastructures. In: Bologna, S., H\u00e4mmerli, B., Gritzalis, D., Wolthusen, S. (eds.) CRITIS 2011. LNCS, vol. 6983, pp. 18\u201329. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-41476-3_2"},{"key":"27_CR14","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.ress.2013.06.040","volume":"121","author":"M Ouyang","year":"2014","unstructured":"Ouyang, M.: Review on modeling and simulation of interdependent critical infrastructure systems. Reliab. Eng. Syst. Saf. 121, 43\u201360 (2014)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"27_CR15","first-page":"75","volume":"51","author":"2008\/114\/EC-Council Directive","year":"2008","unstructured":"2008\/114\/EC-Council Directive: Identification and designation of European Critical Infrastructures and the assessment of the need to improve their protection. Off. J. Eur. Union 51, 75\u201382 (2008)","journal-title":"Off. J. Eur. Union"},{"key":"27_CR16","volume-title":"Business Dynamics: Systems Thinking and Modeling for a Complex World","author":"JD Sterman","year":"2000","unstructured":"Sterman, J.D.: Business Dynamics: Systems Thinking and Modeling for a Complex World. Irwin\/McGraw-Hill, Boston (2000)"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Canzani, E., Kaufmann, H., Lechner, U.: Characterizing disruptive events to model cascade failures in critical infrastructures. In: 4th International Symposium for ICS and SCADA Cyber Security Research 2016 (2016)","DOI":"10.14236\/ewic\/ICS2016.11"},{"key":"27_CR18","unstructured":"Canzani, E., Lechner, U.: Insights from modeling epidemics of infectious diseases \u2013 a literature review. In: 12th International Conference on Information Systems for Crisis Response and Management, ISCRAM (2015)"},{"key":"27_CR19","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.ijcip.2014.12.004","volume":"8","author":"A Laug\u00e9","year":"2015","unstructured":"Laug\u00e9, A., Hernantes, J., Sarriegi, J.M.: Critical infrastructure dependencies: a holistic, dynamic and quantitative approach. Int. J. Crit. Infrastruct. Prot. 8, 16\u201323 (2015)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Canzani, E., Pickl, S.: Cyber epidemics: modeling attacker-defender dynamics in critical infrastructure systems. In: 7th International Conference on Applied Human Factors and Ergonomics, AHFE (2016)","DOI":"10.1007\/978-3-319-41932-9_31"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71368-7_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,6]],"date-time":"2019-10-06T07:50:56Z","timestamp":1570348256000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71368-7_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319713670","9783319713687"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71368-7_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"22 November 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CRITIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Critical Information Infrastructures Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"critis2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/critis2016.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}