{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:20:19Z","timestamp":1742973619470,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319713670"},{"type":"electronic","value":"9783319713687"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71368-7_7","type":"book-chapter","created":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T07:22:30Z","timestamp":1511248950000},"page":"75-87","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Synthesis of Optimization Approaches for Tackling Critical Information Infrastructure Survivability"],"prefix":"10.1007","author":[{"given":"Annunziata","family":"Esposito Amideo","sequence":"first","affiliation":[]},{"given":"Maria Paola","family":"Scaparra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,22]]},"reference":[{"issue":"3","key":"7_CR1","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/s10100-009-0110-6","volume":"18","author":"D Aksen","year":"2010","unstructured":"Aksen, D., Piyade, N., Aras, N.: The budget constrained r-interdiction median problem with capacity expansion. Cent. Eur. J. Oper. Res. 18(3), 269\u2013291 (2010)","journal-title":"Cent. Eur. J. Oper. Res."},{"issue":"1","key":"7_CR2","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1287\/trsc.1100.0340","volume":"45","author":"P Cappanera","year":"2011","unstructured":"Cappanera, P., Scaparra, M.P.: Optimal allocation of protective resources in shortest-path networks. Transp. Sci. 45(1), 64\u201380 (2011)","journal-title":"Transp. Sci."},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Chen, R.L., Cohn, A., Pinar, A.: An implicit optimization approach for survivable network design. In: Network Science Workshop (NSW), pp. 180\u2013187. IEEE (2011)","DOI":"10.1109\/NSW.2011.6004644"},{"issue":"3","key":"7_CR4","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1111\/j.1467-8306.2004.00410.x","volume":"94","author":"RL Church","year":"2004","unstructured":"Church, R.L., Scaparra, M.P., Middleton, R.S.: Identifying critical infrastructure: the median and covering facility interdiction problems. Ann. Assoc. Am. Geogr. 94(3), 491\u2013502 (2004)","journal-title":"Ann. Assoc. Am. Geogr."},{"key":"7_CR5","series-title":"Advances in Spatial Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-540-68056-7_11","volume-title":"Critical Infrastructure","author":"RL Church","year":"2007","unstructured":"Church, R.L., Scaparra, M.P.: Analysis of facility systems\u2019 reliability when subject to attack or a natural disaster. In: Murray, A.T., Grubesic, T.H. (eds.) Critical Infrastructure. ADVSPATIAL, pp. 221\u2013241. Springer, Heidelberg (2007). \nhttps:\/\/doi.org\/10.1007\/978-3-540-68056-7_11"},{"issue":"2","key":"7_CR6","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1111\/j.1538-4632.2007.00698.x","volume":"39","author":"RL Church","year":"2007","unstructured":"Church, R.L., Scaparra, M.P.: Protecting critical assets: the r-interdiction median problem with fortification. Geogr. Anal. 39(2), 129\u2013146 (2007)","journal-title":"Geogr. Anal."},{"issue":"4","key":"7_CR7","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1016\/0167-6377(82)90020-7","volume":"1","author":"H Corley","year":"1982","unstructured":"Corley, H., David, Y.S.: Most vital links and nodes in weighted networks. Oper. Res. Lett. 1(4), 157\u2013160 (1982)","journal-title":"Oper. Res. Lett."},{"key":"7_CR8","volume-title":"Foundations of Bilevel Programming","author":"S Dempe","year":"2002","unstructured":"Dempe, S.: Foundations of Bilevel Programming. Springer Science & Business Media, Heidelberg (2002)"},{"key":"7_CR9","unstructured":"Fang, Y.: Critical infrastructure protection by advanced modelling, simulation and optimization for cascading failure mitigation and resilience. Dissertation. Ecole Centrale Paris (2015)"},{"issue":"1","key":"7_CR10","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/S0736-5853(02)00003-5","volume":"20","author":"TH Grubesic","year":"2003","unstructured":"Grubesic, T.H., O\u2019Kelly, M.E., Murray, A.T.: A geographic perspective on commercial internet survivability. Telematics Inform. 20(1), 51\u201369 (2003)","journal-title":"Telematics Inform."},{"issue":"1","key":"7_CR11","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.cor.2010.06.002","volume":"38","author":"F Liberatore","year":"2011","unstructured":"Liberatore, F., Scaparra, M.P., Daskin, M.S.: Analysis of facility protection strategies against an uncertain number of attacks: the stochastic r-interdiction median problem with fortification. Comput. Oper. Res. 38(1), 357\u2013366 (2011)","journal-title":"Comput. Oper. Res."},{"issue":"1","key":"7_CR12","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.omega.2011.03.003","volume":"40","author":"F Liberatore","year":"2012","unstructured":"Liberatore, F., Scaparra, M.P., Daskin, M.S.: Hedging against disruptions with ripple effects in location analysis. Omega 40(1), 21\u201330 (2012)","journal-title":"Omega"},{"key":"7_CR13","volume-title":"Information Technology for Counterterrorism: Immediate Actions and Future Possibilities","author":"HS Lin","year":"2003","unstructured":"Lin, H.S., Patterson, D.A., Hennessy, J.L.: Information Technology for Counterterrorism: Immediate Actions and Future Possibilities. National Academies Press, Washington, D.C. (2003)"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-642-21219-2_8","volume-title":"Hybrid Artificial Intelligent Systems","author":"FY-S Lin","year":"2011","unstructured":"Lin, F.Y.-S., Yen, H.-H., Chen, P.-Y., Wen, Y.-F.: Evaluation of network survivability considering degree of disconnectivity. In: Corchado, E., Kurzy\u0144ski, M., Wo\u017aniak, M. (eds.) HAIS 2011. LNCS, vol. 6678, pp. 51\u201358. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-21219-2_8"},{"issue":"1","key":"7_CR15","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1007\/s10479-012-1170-x","volume":"201","author":"C Losada","year":"2012","unstructured":"Losada, C., Scaparra, M.P., Church, R.L., Daskin, M.S.: The stochastic interdiction median problem with disruption intensity levels. Ann. Oper. Res. 201(1), 345\u2013365 (2012)","journal-title":"Ann. Oper. Res."},{"issue":"3","key":"7_CR16","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1007\/s11067-009-9123-x","volume":"10","author":"TC Matisziw","year":"2010","unstructured":"Matisziw, T.C., Murray, A.T., Grubesic, T.H.: Strategic network restoration. Netw. Spat. Econ. 10(3), 345\u2013361 (2010)","journal-title":"Netw. Spat. Econ."},{"issue":"2","key":"7_CR17","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/s10109-006-0039-4","volume":"9","author":"AT Murray","year":"2007","unstructured":"Murray, A.T., Matisziw, T.C., Grubesic, T.H.: Critical network infrastructure analysis: interdiction and system flow. J. Geogr. Syst. 9(2), 103\u2013117 (2007)","journal-title":"J. Geogr. Syst."},{"issue":"2","key":"7_CR18","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/s10708-011-9412-z","volume":"78","author":"AT Murray","year":"2013","unstructured":"Murray, A.T.: An overview of network vulnerability modeling approaches. GeoJournal 78(2), 209\u2013221 (2013)","journal-title":"GeoJournal"},{"issue":"3","key":"7_CR19","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1016\/S0377-2217(03)00135-8","volume":"156","author":"Y Myung","year":"2004","unstructured":"Myung, Y., Kim, H.: A cutting plane algorithm for computing k-edge survivability of a network. Eur. J. Oper. Res. 156(3), 579\u2013589 (2004)","journal-title":"Eur. J. Oper. Res."},{"key":"7_CR20","first-page":"105","volume":"17","author":"E Nickolov","year":"2006","unstructured":"Nickolov, E.: Critical information infrastructure protection: analysis, evaluation and expectations. Inf. Secur. 17, 105\u2013119 (2006)","journal-title":"Inf. Secur."},{"issue":"3","key":"7_CR21","doi-asserted-by":"crossref","first-page":"794","DOI":"10.1016\/j.ejor.2012.07.010","volume":"223","author":"SG Nurre","year":"2012","unstructured":"Nurre, S.G., Cavdaroglu, B., Mitchell, J.E., Sharkey, T.C., Wallace, W.A.: Restoring infrastructure systems: an integrated network design and scheduling (INDS) problem. Eur. J. Oper. Res. 223(3), 794\u2013806 (2012)","journal-title":"Eur. J. Oper. Res."},{"key":"7_CR22","series-title":"Advances in Spatial Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-540-68056-7_6","volume-title":"Critical Infrastructure","author":"ME O\u2019Kelly","year":"2007","unstructured":"O\u2019Kelly, M.E., Kim, H.: Survivability of commercial backbones with peering: a case study of Korean networks. In: Murray, A.T., Grubesic, T.H. (eds.) Critical Infrastructure. ADVSPATIAL, pp. 107\u2013128. Springer, Heidelberg (2007). \nhttps:\/\/doi.org\/10.1007\/978-3-540-68056-7_6"},{"issue":"1","key":"7_CR23","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/s10922-005-1864-3","volume":"13","author":"S Orlowski","year":"2005","unstructured":"Orlowski, S., Wess\u00e4ly, R.: Comparing restoration concepts using optimal network configurations with integrated hardware and routing decisions. J. Netw. Syst. Manag. 13(1), 99\u2013118 (2005)","journal-title":"J. Netw. Syst. Manag."},{"key":"7_CR24","series-title":"Operations Research\/Computer Science Interfaces Series","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/0-387-29234-9_8","volume-title":"Telecommunications Planning: Innovations in Pricing, Network Design and Management","author":"S Orlowski","year":"2006","unstructured":"Orlowski, S., Wess\u00e4ly, R.: The effect of hop limits on optimal cost in survivable network design. In: Raghavan, S., Anandalingam, G. (eds.) Telecommunications Planning: Innovations in Pricing, Network Design and Management. ORCS, vol. 33, pp. 151\u2013166. Springer, Boston (2006). \nhttps:\/\/doi.org\/10.1007\/0-387-29234-9_8"},{"key":"7_CR25","volume-title":"Critical Information Infrastructure Protection and the Law: An Overview of Key Issues","author":"CA Patterson","year":"2003","unstructured":"Patterson, C.A., Personick, S.D.: Critical Information Infrastructure Protection and the Law: An Overview of Key Issues. National Academies Press, Washington, D.C. (2003)"},{"issue":"8","key":"7_CR26","doi-asserted-by":"crossref","first-page":"1190","DOI":"10.1016\/j.trb.2011.05.022","volume":"45","author":"P Peng","year":"2011","unstructured":"Peng, P., Snyder, L.V., Lim, A., Liu, Z.: Reliable logistics networks design with facility disruptions. Transp. Res. B Methodol. 45(8), 1190\u20131211 (2011)","journal-title":"Transp. Res. B Methodol."},{"issue":"1","key":"7_CR27","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/j.dss.2013.01.001","volume":"55","author":"T Sawik","year":"2013","unstructured":"Sawik, T.: Selection of optimal countermeasure portfolio in IT security planning. Decis. Support Syst. 55(1), 156\u2013164 (2013)","journal-title":"Decis. Support Syst."},{"key":"7_CR28","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1007\/978-3-319-13111-5_24","volume-title":"Location Science","author":"MP Scaparra","year":"2015","unstructured":"Scaparra, M.P., Church, R.L.: Location problems under disaster events. In: Laporte, G., Nickel, S., da Gama, F.S. (eds.) Location Science, pp. 623\u2013642. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-13111-5_24"},{"issue":"1","key":"7_CR29","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1016\/j.ejor.2014.12.051","volume":"244","author":"TC Sharkey","year":"2015","unstructured":"Sharkey, T.C., Cavdaroglu, B., Nguyen, H., Holman, J., Mitchell, J.E., Wallace, W.A.: Interdependent network restoration: on the value of information-sharing. Eur. J. Oper. Res. 244(1), 309\u2013321 (2015)","journal-title":"Eur. J. Oper. Res."},{"issue":"2","key":"7_CR30","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s10898-006-9067-3","volume":"38","author":"JC Smith","year":"2007","unstructured":"Smith, J.C., Lim, C., Sudargho, F.: Survivable network design under optimal and heuristic interdiction scenarios. J. Global Optim. 38(2), 181\u2013199 (2007)","journal-title":"J. Global Optim."},{"issue":"3","key":"7_CR31","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1023\/A:1010058513558","volume":"1","author":"S Soni","year":"1999","unstructured":"Soni, S., Gupta, R., Pirkul, H.: Survivable network design: the state of the art. Inf. Syst. Front. 1(3), 303\u2013315 (1999)","journal-title":"Inf. Syst. Front."},{"issue":"1\u20132","key":"7_CR32","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1023\/A:1015445501694","volume":"20","author":"S Soni","year":"2002","unstructured":"Soni, S., Pirkul, H.: Design of survivable networks with connectivity requirements. Telecommun. Syst. 20(1\u20132), 133\u2013149 (2002)","journal-title":"Telecommun. Syst."},{"issue":"2","key":"7_CR33","doi-asserted-by":"crossref","first-page":"543","DOI":"10.1016\/j.ejor.2015.07.025","volume":"248","author":"S Starita","year":"2016","unstructured":"Starita, S., Scaparra, M.P.: Optimizing dynamic investment decisions for railway systems protection. Eur. J. Oper. Res. 248(2), 543\u2013557 (2016)","journal-title":"Eur. J. Oper. Res."},{"issue":"8","key":"7_CR34","doi-asserted-by":"crossref","first-page":"1245","DOI":"10.1016\/j.comnet.2010.03.005","volume":"54","author":"JP Sterbenz","year":"2010","unstructured":"Sterbenz, J.P., Hutchison, D., \u00c7etinkaya, E.K., Jabbar, A., Rohrer, J.P., Sch\u00f6ller, M., Smith, P.: Resilience and survivability in communication networks: strategies, principles, and survey of disciplines. Comput. Netw. 54(8), 1245\u20131265 (2010)","journal-title":"Comput. Netw."},{"key":"7_CR35","unstructured":"Brunner, E., Suter, M.: International CIIP Handbook 2008\/2009: An Inventory of 25 National and 7 International Critical Infrastructure Protection Policies. Center for Security Studies, ETH Zurich (2008)"},{"key":"7_CR36","doi-asserted-by":"crossref","DOI":"10.4018\/978-1-4666-2964-6","volume-title":"Critical Information Infrastructure Protection and Resilience in the ICT Sector","author":"P Theron","year":"2013","unstructured":"Theron, P.: Critical Information Infrastructure Protection and Resilience in the ICT Sector. IGI Global, Hershey (2013)"},{"issue":"3","key":"7_CR37","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1016\/j.dss.2012.04.001","volume":"53","author":"V Viduto","year":"2012","unstructured":"Viduto, V., Maple, C., Huang, W., L\u00f3pez-Per\u00e9z, D.: A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem. Decis. Support Syst. 53(3), 599\u2013610 (2012)","journal-title":"Decis. Support Syst."},{"issue":"6","key":"7_CR38","doi-asserted-by":"crossref","first-page":"934","DOI":"10.1287\/opre.12.6.934","volume":"12","author":"R Wollmer","year":"1964","unstructured":"Wollmer, R.: Removing arcs from a network. Oper. Res. 12(6), 934\u2013940 (1964)","journal-title":"Oper. Res."}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71368-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,31]],"date-time":"2018-01-31T22:30:07Z","timestamp":1517437807000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71368-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319713670","9783319713687"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71368-7_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}