{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:45:29Z","timestamp":1743111929553,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":51,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642035517"},{"type":"electronic","value":"9783642035524"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03552-4_23","type":"book-chapter","created":{"date-parts":[[2009,8,29]],"date-time":"2009-08-29T01:36:51Z","timestamp":1251509811000},"page":"258-270","source":"Crossref","is-referenced-by-count":17,"title":["Emerging Information Infrastructures: Cooperation in Disasters"],"prefix":"10.1007","author":[{"given":"Mikael","family":"Asplund","sequence":"first","affiliation":[]},{"given":"Simin","family":"Nadjm-Tehrani","sequence":"additional","affiliation":[]},{"given":"Johan","family":"Sigholm","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"Adams, C.: Information sharing raises more questions than answers. AFCEA Signal Magazine (May 2008)"},{"issue":"1","key":"23_CR2","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/67.893351","volume":"14","author":"M. Amin","year":"2001","unstructured":"Amin, M.: Toward self-healing energy infrastructure systems. IEEE Comput. Appl. Power\u00a014(1), 20\u201328 (2001)","journal-title":"IEEE Comput. Appl. Power"},{"key":"23_CR3","unstructured":"Baddeley, A.: Sweden seeks military communications flexibility. AFCEA Signal Magazine (May 2006)"},{"issue":"4","key":"23_CR4","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1145\/1282427.1282422","volume":"37","author":"A. Balasubramanian","year":"2007","unstructured":"Balasubramanian, A., Levine, B., Venkataramani, A.: DTN routing as a resource allocation problem. SIGCOMM Comput. Commun. Rev.\u00a037(4), 373\u2013384 (2007)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"23_CR5","unstructured":"Becker, J.C.: The opportunities and limits of technology in non profit disaster response. Keynote speech at the ISCRAM conference, Washington (May 2008)"},{"key":"23_CR6","unstructured":"Bengtsson, A., Westerdahl, L.: Access control in a coalition system. Technical Report FOI-R\u20132393\u2013SE, Swedish Defence Research Agency (December 2007)"},{"issue":"4","key":"23_CR7","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1109\/3468.935049","volume":"31","author":"K. Birman","year":"2001","unstructured":"Birman, K.: Technology challenges for virtual overlay networks. IEEE Transactions on Systems, Man and Cybernetics, Part A\u00a031(4), 319\u2013327 (2001)","journal-title":"IEEE Transactions on Systems, Man and Cybernetics, Part A"},{"issue":"5","key":"23_CR8","doi-asserted-by":"publisher","first-page":"1028","DOI":"10.1109\/JPROC.2005.846339","volume":"93","author":"K. Birman","year":"2005","unstructured":"Birman, K., Chen, J., Hopkinson, E., Thomas, R., Thorp, J., Van Renesse, R., Vogels, W.: Overcoming communications challenges in software for monitoring and controlling power systems. Proc. IEEE\u00a093(5), 1028\u20131041 (2005)","journal-title":"Proc. IEEE"},{"key":"23_CR9","unstructured":"Bruno, R., Conti, M., Passarella, A.: Opportunistic networking overlays for ICT services in crisis management. In: Proc. 5th International ISCRAM Conference. ISCRAM (2008)"},{"issue":"7","key":"23_CR10","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/MCOM.2005.1470831","volume":"43","author":"S. Buchegger","year":"2005","unstructured":"Buchegger, S., Le Boudec, J.: Self-policing mobile ad hoc networks by reputation systems. IEEE Communications Magazine\u00a043(7), 101\u2013107 (2005)","journal-title":"IEEE Communications Magazine"},{"issue":"1","key":"23_CR11","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MIC.2008.18","volume":"12","author":"T. Catarci","year":"2008","unstructured":"Catarci, T., de Leoni, M., Marrella, A., Mecella, M., Salvatore, B., Vetere, G., Dustdar, S., Juszczyk, L., Manzoor, A., Truong, H.-L.: Pervasive software environments for supporting disaster responses. IEEE Internet Comput.\u00a012(1), 26\u201337 (2008)","journal-title":"IEEE Internet Comput."},{"key":"23_CR12","unstructured":"CRUTIAL. European FP6 project, http:\/\/crutial.cesiricerca.it\/"},{"issue":"4","key":"23_CR13","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1121949.1121966","volume":"49","author":"P.J. Denning","year":"2006","unstructured":"Denning, P.J.: Hastily formed networks. Commun. ACM\u00a049(4), 15\u201320 (2006)","journal-title":"Commun. ACM"},{"key":"23_CR14","unstructured":"DIESIS. European FP7 project, http:\/\/www.diesis-project.eu\/"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Dilmaghani, R., Rao, R.: A wireless mesh infrastructure deployment with application for emergency scenarios. In: Proc. 5th International ISCRAM Conference. ISCRAM (2008)","DOI":"10.4304\/jsw.3.2.52-60"},{"key":"23_CR16","volume-title":"Delay- and Disruption-Tolerant Networking","author":"S. Farrell","year":"2006","unstructured":"Farrell, S., Cahill, V.: Delay- and Disruption-Tolerant Networking. Artech House, Inc., Norwood (2006)"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Fiore, M., Harri, J., Filali, F., Bonnet, C.: Vehicular mobility simulation for VANETs. In: Proc. 40th Annual Simulation Symposium (ANSS) (2007)","DOI":"10.1109\/ANSS.2007.44"},{"key":"23_CR18","unstructured":"FORWARD. European FP7 project, http:\/\/www.ict-forward.eu\/"},{"key":"23_CR19","volume-title":"Proc. 2008 IEEE International Conference on Technologies for Homeland Security","author":"T. Gao","year":"2008","unstructured":"Gao, T., Pesto, C., Selavo, L., Chen, Y., Ko, J., Lim, J., Terzis, A., Watt, A., Jeng, J., Chen, B., Lorincz, K., Welsh, M.: Wireless medical sensor networks in emergency response: Implementation and pilot results. In: Proc. 2008 IEEE International Conference on Technologies for Homeland Security. IEEE, Los Alamitos (2008)"},{"key":"23_CR20","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1504\/IJCIS.2008.017438","volume":"4","author":"A.A. Ghorbani","year":"2008","unstructured":"Ghorbani, A.A., Bagheri, E.: The state of the art in critical infrastructure protection: a framework for convergence. International Journal of Critical Infrastructures\u00a04, 215\u2013244 (2008)","journal-title":"International Journal of Critical Infrastructures"},{"key":"23_CR21","first-page":"381","volume":"38","author":"R. Guimera","year":"2004","unstructured":"Guimera, R., Amaral, L.: Modeling the world-wide airport network. The European Physical Journal B - Condensed Matter\u00a038, 381\u2013385 (2004)","journal-title":"The European Physical Journal B - Condensed Matter"},{"key":"23_CR22","volume-title":"Proc. 2006 international conference on Wireless communications and mobile computing (IWCMC)","author":"Z.J. Haas","year":"2006","unstructured":"Haas, Z.J., Small, T.: Evaluating the capacity of resource-constrained DTNs. In: Proc. 2006 international conference on Wireless communications and mobile computing (IWCMC). ACM, New York (2006)"},{"key":"23_CR23","volume-title":"Replication Techniques in Distributed Systems","author":"A.A. Helal","year":"1996","unstructured":"Helal, A.A., Bhargava, B.K., Heddaya, A.A.: Replication Techniques in Distributed Systems. Kluwer Academic Publishers, Norwell (1996)"},{"key":"23_CR24","unstructured":"HIDENETS. European FP6 project, http:\/\/www.hidenets.aau.dk\/"},{"key":"23_CR25","unstructured":"IRRIIS. European FP6 project, http:\/\/www.irriis.org\/"},{"key":"23_CR26","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1108\/03055720610682933","volume":"36","author":"T.L. Jefferson","year":"2006","unstructured":"Jefferson, T.L.: Using the internet to communicate during a crisis. VINE\u00a036, 139\u2013142 (2006)","journal-title":"VINE"},{"issue":"1","key":"23_CR27","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.aei.2007.09.001","volume":"22","author":"D. Kostoulas","year":"2008","unstructured":"Kostoulas, D., Aldunate, R., Pena-Mora, F., Lakhera, S.: A nature-inspired decentralized trust model to reduce information unreliability in complex disaster relief operations. Advanced Engineering Informatics\u00a022(1), 45\u201358 (2008)","journal-title":"Advanced Engineering Informatics"},{"key":"23_CR28","unstructured":"Kr\u00fcgel, C., Robertson, W.K.: Alert verification: Determining the success of intrusion attempts. In: Workshop the Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA). German Informatics Society (2004)"},{"key":"23_CR29","doi-asserted-by":"crossref","unstructured":"Kuiper, E., Nadjm-Tehrani, S.: Mobility models for uav group reconnaissance applications. In: Proc. International Conference on Wireless and Mobile Communications (ICWMC) (2006)","DOI":"10.1109\/ICWMC.2006.63"},{"key":"23_CR30","unstructured":"Labovitz, C., Ahuja, A., Jahanian, F.: Experimental study of internet stability and backbone failures. In: Twenty-Ninth Annual International Symposium on Digest of Papers Fault-Tolerant Computing (1999)"},{"key":"23_CR31","unstructured":"Labovitz, C., Wattenhofer, R., Venkatachary, S., Ahuja, A.: Resilience characteristics of the internet backbone routing infrastructure. In: Proc. Third Information Survivability Workshop (2000)"},{"key":"23_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/978-3-540-75101-4_5","volume-title":"Computer Safety, Reliability, and Security","author":"J. Laprie","year":"2007","unstructured":"Laprie, J., Kanoun, K., Kaniche, M.: Modeling interdependencies between the electricity and information infrastructures. In: Saglietti, F., Oster, N. (eds.) SAFECOMP 2007. LNCS, vol.\u00a04680, pp. 54\u201367. Springer, Heidelberg (2007)"},{"issue":"5","key":"23_CR33","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/52.877859","volume":"17","author":"J. McHugh","year":"2000","unstructured":"McHugh, J., Christie, A., Allen, J.: Defending yourself: the role of intrusion detection systems. IEEE Softw.\u00a017(5), 42\u201351 (2000)","journal-title":"IEEE Softw."},{"key":"23_CR34","doi-asserted-by":"crossref","unstructured":"Mehrotra, S., Butts, C.T., Kalashnikov, D., Venkatasubramanian, N., Rao, R.R., Chockalingam, G., Eguchi, R., Adams, B.J., Huyck, C.: Project RESCUE: challenges in responding to the unexpected. In: Santini, S., Schettini, R. (eds.) Internet Imaging V, vol.\u00a05304, pp. 179\u2013192. SPIE (2003)","DOI":"10.1117\/12.537805"},{"key":"23_CR35","doi-asserted-by":"crossref","unstructured":"Melby, J.: Jtrs and the evolution toward software-defined radio. In: MILCOM 2002, October 2002, pp. 1286\u20131290 (2002)","DOI":"10.1109\/MILCOM.2002.1179664"},{"key":"23_CR36","volume-title":"Proc. second workshop on Challenged networks (CHANTS)","author":"S.C. Nelson","year":"2007","unstructured":"Nelson, S.C., Albert, I., Harris, F., Kravets, R.: Event-driven, role-based mobility in disaster recovery networks. In: Proc. second workshop on Challenged networks (CHANTS). ACM, New York (2007)"},{"key":"23_CR37","first-page":"349","volume-title":"Dependable Computing Systems","author":"S. Olariu","year":"2005","unstructured":"Olariu, S., Maly, K., Foutriat, E.C., Yamany, S.M., Luckenbach, T.: A Dependable Architecture for Telemedicine in Support of Diaster Relief. In: Dependable Computing Systems, pp. 349\u2013368. Wiley, Chichester (2005)"},{"key":"23_CR38","unstructured":"Plagemann, T., Skjelsvik, K., Puzar, M., Drugan, O., Goebel, V., Munthe-Kaas, E.: Cross-layer overlay synchronization in sparse manets. In: Proc. 5th International ISCRAM Conference (2008)"},{"key":"23_CR39","unstructured":"ReSIST. Deliverable D12 resilience-building technologies: State of knowledge, ch. 2 (September 2006), http:\/\/www.resist-noe.org\/Publications\/Deliverables\/D12-StateKnowledge.pdf"},{"issue":"6","key":"23_CR40","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/37.969131","volume":"21","author":"S. Rinaldi","year":"2001","unstructured":"Rinaldi, S., Peerenboom, J., Kelly, T.: Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Syst. Mag.\u00a021(6), 11\u201325 (2001)","journal-title":"IEEE Control Syst. Mag."},{"issue":"1","key":"23_CR41","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/1057977.1057980","volume":"37","author":"Y. Saito","year":"2005","unstructured":"Saito, Y., Shapiro, M.: Optimistic replication. ACM Comput. Surv.\u00a037(1), 42\u201381 (2005)","journal-title":"ACM Comput. Surv."},{"key":"23_CR42","doi-asserted-by":"crossref","unstructured":"Sandulescu, G., Nadjm-Tehrani, S.: Opportunistic dtn routing with windows-aware adaptive replication (2008) (submitted for publication)","DOI":"10.1145\/1503370.1503397"},{"key":"23_CR43","unstructured":"Shank, N., Sokol, B., Hayes, M., Vetrano, C.: Human services data standards: Current progress and future visions in crisis response. In: Proc. ISCRAM conference (May 2008)"},{"key":"23_CR44","volume-title":"Proc. International Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc)","author":"T. Small","year":"2003","unstructured":"Small, T., Haas, Z.J.: The shared wireless infostation model: a new ad hoc networking paradigm (or where there is a whale, there is a way). In: Proc. International Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc). ACM, New York (2003)"},{"key":"23_CR45","volume-title":"Proc. SIGCOMM Workshop on Delay-tolerant networking (WDTN)","author":"T. Spyropoulos","year":"2005","unstructured":"Spyropoulos, T., Psounis, K., Raghavendra, C.S.: Spray and wait: an efficient routing scheme for intermittently connected mobile networks. In: Proc. SIGCOMM Workshop on Delay-tolerant networking (WDTN). ACM, New York (2005)"},{"key":"23_CR46","unstructured":"Steckler, B., Bradford, B.L., Urrea, S.: Hastily formed networks for complex humanitarian disasters (September 2005), http:\/\/www.hfncenter.org\/cms\/KatrinaAAR"},{"key":"23_CR47","doi-asserted-by":"crossref","unstructured":"Svendsen, N., Wolthusen, S.: Analysis and statistical properties of critical infrastructure interdependency multiflow models. In: Proc. IEEE SMC Information Assurance and Security Workshop (IAW) (2007)","DOI":"10.1109\/IAW.2007.381940"},{"key":"23_CR48","doi-asserted-by":"crossref","unstructured":"Swanson, M., Hash, J., Bowen, P.: Guide for developing security plans for federal information systems. Technical Report 800-18, National Institute of Standards and Technology (February 2006)","DOI":"10.6028\/NIST.SP.800-18r1"},{"key":"23_CR49","volume-title":"Middleware for Communications","author":"D. Szentivanyi","year":"2004","unstructured":"Szentivanyi, D., Nadjm-Tehrani, S.: Middleware support for fault tolerance. In: Mahmoud, Q. (ed.) Middleware for Communications. John Wiley & Sons, Chichester (2004)"},{"issue":"2","key":"23_CR50","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/j.adhoc.2004.07.007","volume":"3","author":"C. Tschudin","year":"2005","unstructured":"Tschudin, C., Gunningberg, P., Lundgren, H., Nordstr\u00f6m, E.: Lessons from experimental MANET research. Ad Hoc Networks\u00a03(2), 221\u2013233 (2005)","journal-title":"Ad Hoc Networks"},{"key":"23_CR51","unstructured":"WOMBAT. European FP7 project, http:\/\/www.wombat-project.eu\/"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructure Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03552-4_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T22:31:55Z","timestamp":1739313115000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03552-4_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642035517","9783642035524"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03552-4_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}