{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T14:18:27Z","timestamp":1761488307335},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642035517"},{"type":"electronic","value":"9783642035524"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03552-4_3","type":"book-chapter","created":{"date-parts":[[2009,8,29]],"date-time":"2009-08-29T01:36:51Z","timestamp":1251509811000},"page":"24-35","source":"Crossref","is-referenced-by-count":11,"title":["Enabling System of Systems Analysis of Critical Infrastructure Behaviors"],"prefix":"10.1007","author":[{"given":"William J.","family":"Tolone","sequence":"first","affiliation":[]},{"given":"E. Wray","family":"Johnson","sequence":"additional","affiliation":[]},{"given":"Seok-Won","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Wei-Ning","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Lydia","family":"Marsh","sequence":"additional","affiliation":[]},{"given":"Cody","family":"Yeager","sequence":"additional","affiliation":[]},{"given":"Josh","family":"Blackwell","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"ArcGIS Network Analyst, http:\/\/www.esri.com\/software\/arcgis\/extensions\/networkanalyst"},{"key":"3_CR2","volume-title":"11th IEEE Symp. on Distributed Simulation & Real-Time App.","author":"E. Casalicchio","year":"2007","unstructured":"Casalicchio, E., Galli, E., Tucci, S.: Federated agent-based modeling and simulation approach to study interdependencies in IT critical infrastructures. In: 11th IEEE Symp. on Distributed Simulation & Real-Time App. IEEE Computer Society, Los Alamitos (2007)"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Chaturvedi, A.: A society of simulation approach to dynamic integration of simulations. In: Proc. Winter Simulation Conference (2006)","DOI":"10.1109\/WSC.2006.323012"},{"key":"3_CR4","unstructured":"Craven, P., Oman, P.: Modeling advanced train control system networks. To appear in: Goetz, E., Shenoi, S. (eds.) Critical Infrastructure Protection, 2nd edn. (2008)"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Dudenhoeffer, D.D., Permann, M.R., Manic, M.: CIMS: a framework for infrastructure interdependency modeling and analysis. In: Winter Simulation Conf. (2006)","DOI":"10.1109\/WSC.2006.323119"},{"key":"3_CR6","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/978-0-387-75462-8_23","volume-title":"Critical Infrastructure Protection","author":"F. Flentge","year":"2007","unstructured":"Flentge, F., Beyer, U.: The ISE metamodel for critical infrastructures. In: Goetz, E., Shenoi, S. (eds.) Critical Infrastructure Protection, pp. 323\u2013336. Springer, Heidelberg (2007)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Gursesli, O., Desrochers, A.A.: Modeling infrastructure interdependencies using petri nets. In: IEEE Int\u2019l Conference on Systems, Man and Cybernetics (2003)","DOI":"10.1109\/ICSMC.2003.1244625"},{"key":"3_CR8","unstructured":"Marti, J.R., Hollman, J.A., Ventrua, C., Jatskevich, J.: Design for survival real-time infrastructures coordination. In: Int\u2019l Workshop Complex Network & Infrastructure Protection (2006)"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"National Strategy for Homeland Security, U.S. Dept. of Homeland Security (2002)","DOI":"10.1016\/S1353-4858(02)08004-2"},{"key":"3_CR10","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/944217.944233","volume":"46","author":"M.P. Papazoglou","year":"2003","unstructured":"Papazoglou, M.P., Georgakopoulos, D.: Service-oriented computing. Communications of the ACM\u00a046, 10 (2003)","journal-title":"Communications of the ACM"},{"key":"3_CR11","unstructured":"Pederson, P., Dudenhoeffer, D., Hartley, S., Permann, M.: Critical infrastructure interdependency modeling: a survey of U.S. and international research. Rep. No. INL\/EXT-06-11464, Critical Infrastructure Protection Division, INEEL (2006)"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Perrey, R., Lycett, M.: Service-oriented architecture. In: Proc. of Symp. on Applications and the Internet Workshops, pp. 116\u2013119 (2003)","DOI":"10.1109\/SAINTW.2003.1210138"},{"key":"3_CR13","unstructured":"PowerWorld Simulator, http:\/\/www.powerworld.com\/products\/simulator.asp"},{"key":"3_CR14","unstructured":"Rinaldi, S.M., Peerenboom, J.P., Kelly, T.K.: Identifying,understanding, and analyzing critical infrastructure interdependencies. In: IEEE Control Sys. Mag. (2001)"},{"key":"3_CR15","first-page":"155","volume-title":"Policy Sciences","author":"H. Rittel","year":"1973","unstructured":"Rittel, H., Webber, M.: Dilemmas in a general theory of planning. In: Policy Sciences, pp. 155\u2013159. Elsevier Scientific Publishing, Amsterdam (1973)"},{"key":"3_CR16","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-0-387-75462-8_24","volume-title":"Critical Infrastructure Protection","author":"N. Svendsen","year":"2007","unstructured":"Svendsen, N., Wolthusen, S.: Multigraph dependency models for heterogeneous critical infrastructures. In: Goetz, E., Shenoi, S. (eds.) Critical Infrastructure Protection, pp. 337\u2013350. Springer, Heidelberg (2007)"},{"key":"3_CR17","volume-title":"Critical Infrastructure Protection II","author":"W.J. Tolone","year":"2008","unstructured":"Tolone, W.J., Lee, S.W., Xiang, W.N., Blackwell, J., Yeager, C., Schumpert, A., Johnson, E.W.: An integrated methodology for critical infrastructure modeling and simulation. In: Goetz, E., Shenoi, S. (eds.) Critical Infrastructure Protection II, 2nd edn. Springer, Heidelberg (2008)","edition":"2"},{"key":"3_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-540-25952-7_16","volume-title":"Intelligence and Security Informatics","author":"W.J. Tolone","year":"2004","unstructured":"Tolone, W.J., Wilson, D., Raja, A., Xiang, W.N., Hao, H., Phelps, S., Johnson, E.W.: Critical infrastructure integration modeling and simulation. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) ISI 2004. LNCS, vol.\u00a03073, pp. 214\u2013225. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructure Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03552-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T08:18:28Z","timestamp":1558513108000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03552-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642035517","9783642035524"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03552-4_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}