{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T14:26:06Z","timestamp":1725978366289},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319916347"},{"type":"electronic","value":"9783319916354"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-91635-4_26","type":"book-chapter","created":{"date-parts":[[2018,5,18]],"date-time":"2018-05-18T09:04:46Z","timestamp":1526634286000},"page":"498-515","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Vulnerability Distribution Model of Critical Infrastructures Based on Topological System Simulation"],"prefix":"10.1007","author":[{"given":"Xiaobo","family":"Yao","sequence":"first","affiliation":[]},{"given":"Chuanfeng","family":"Han","sequence":"additional","affiliation":[]},{"given":"Qian","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Lingpeng","family":"Meng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,19]]},"reference":[{"key":"26_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03199-1","volume-title":"Modelling, Estimation and Control of Networked Complex Systems","year":"2009","unstructured":"Chiuso, A., Fortuna, L., Frasca, M., Rizzo, A., Schenato, L., Zampieri, S. (eds.): Modelling, Estimation and Control of Networked Complex Systems. Springer, Heidelberg (2009). \nhttps:\/\/doi.org\/10.1007\/978-3-642-03199-1"},{"key":"26_CR2","series-title":"Advanced Sciences and Technologies for Security Applications","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-319-27914-5_9","volume-title":"Exploring the Security Landscape: Non-traditional Security Challenges","author":"T Xu","year":"2016","unstructured":"Xu, T., Masys, A.J.: Critical infrastructure vulnerabilities: embracing a network mindset. In: Masys, A.J. (ed.) Exploring the Security Landscape: Non-traditional Security Challenges. ASTSA, pp. 177\u2013193. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-27914-5_9"},{"issue":"4","key":"26_CR3","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/j.ijcip.2009.09.002","volume":"2","author":"R Setola","year":"2009","unstructured":"Setola, R., De Porcellinis, S., Sforna, M.: Critical infrastructure dependency assessment using the input\u2013output inoperability model. Int. J. Crit. Infrastruct. Prot. 2(4), 170\u2013178 (2009)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"issue":"7","key":"26_CR4","doi-asserted-by":"publisher","first-page":"1317","DOI":"10.1111\/risa.12175","volume":"34","author":"H Baroud","year":"2014","unstructured":"Baroud, H., Ramirez-Marquez, J.E., Barker, K., Rocco, C.M.: Stochastic measures of network resilience: applications to waterway commodity flows. Risk Anal. 34(7), 1317\u20131335 (2014)","journal-title":"Risk Anal."},{"issue":"2","key":"26_CR5","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s11067-014-9259-1","volume":"15","author":"O Jonkeren","year":"2015","unstructured":"Jonkeren, O., Azzini, I., Galbusera, L., Ntalampiras, S., Giannopoulos, G.: Analysis of critical infrastructure network failure in the European Union: a combined systems engineering and economic model. Netw. Spat. Econ. 15(2), 253\u2013270 (2015)","journal-title":"Netw. Spat. Econ."},{"key":"26_CR6","unstructured":"Eidsvig, U., Uzielli, M., Vangelsten, B.V.: Approaches for assessment of vulnerability of critical infrastructures to weather-related hazards. In: EGU General Assembly Conference Abstracts, vol. 18, p. 7722 (2016)"},{"key":"26_CR7","first-page":"1494","volume":"162","author":"B Karabacak","year":"2016","unstructured":"Karabacak, B., Yildirim, S.O., Baykal, N.: A vulnerability-driven cyber security maturity model for measuring national critical infrastructure protection preparedness. Int. J. Crit. Infrastruct. Prot. 162, 1494\u20131504 (2016)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"26_CR8","unstructured":"Burton, C.: IFRC Vulnerability and Capacity Assessment Training Review: 13 November\u201320 December. International Federation of the Red Cross Red Crescent Societies, Geneva (2007)"},{"key":"26_CR9","unstructured":"Ellis, J., et al.: Report to the President\u2019s Commission on Critical Infrastructure Protection. No. CMU\/SEI-97-SR-00333. Software Engineering Institute, Carnegie-Mellon University, Pittsburgh (1997)"},{"key":"26_CR10","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.ress.2014.11.007","volume":"135","author":"H Lindbom","year":"2015","unstructured":"Lindbom, H., Tehler, H., Eriksson, K., Aven, T.: The capability concept\u2013on how to define and describe capability in relation to risk, vulnerability and resilience. Reliab. Eng. Syst. Saf. 135, 45\u201354 (2015)","journal-title":"Reliab. Eng. Syst. Saf."},{"issue":"3","key":"26_CR11","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1002\/bltj.20178","volume":"11","author":"SH Conrad","year":"2006","unstructured":"Conrad, S.H., LeClaire, R.J., O\u2019Reilly, G.P., Uzunalioglu, H.: Critical national infrastructure reliability modeling and analysis. Bell Labs Tech. J. 11(3), 57\u201371 (2006)","journal-title":"Bell Labs Tech. J."},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Case, M.P., Smith, W., Grobler, F.: Fort future: modeling and simulation for collaborative multi-criteria decision support. In: Computing in Civil Engineering, pp. 1\u201310 (2005)","DOI":"10.1061\/40794(179)22"},{"key":"26_CR13","volume-title":"Discrete Event Simulation: A Practical Approach","author":"UW Pooch","year":"1992","unstructured":"Pooch, U.W., Wall, J.A.: Discrete Event Simulation: A Practical Approach, vol. 4. CRC Press, Boca Raton (1992)"}],"container-title":["Lecture Notes in Computer Science","Advanced Computing Strategies for Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91635-4_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,18]],"date-time":"2018-05-18T09:13:10Z","timestamp":1526634790000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-91635-4_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319916347","9783319916354"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91635-4_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}