{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:04:06Z","timestamp":1743073446949,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642035517"},{"type":"electronic","value":"9783642035524"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03552-4_34","type":"book-chapter","created":{"date-parts":[[2009,8,28]],"date-time":"2009-08-28T21:36:51Z","timestamp":1251495411000},"page":"352-359","source":"Crossref","is-referenced-by-count":2,"title":["An Ontology-Based Approach to Blind Spot Revelation in Critical Infrastructure Protection Planning"],"prefix":"10.1007","author":[{"given":"Joshua","family":"Blackwell","sequence":"first","affiliation":[]},{"given":"William J.","family":"Tolone","sequence":"additional","affiliation":[]},{"given":"Seok-Won","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Wei-Ning","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Lydia","family":"Marsh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Blind Spot, \n                  \n                    http:\/\/en.wikipedia.org\/wiki\/File:Blind_spot.JPG","key":"34_CR1"},{"issue":"4","key":"34_CR2","first-page":"307","volume":"6","author":"F. Fonseca","year":"2001","unstructured":"Fonseca, F., Camara, G., Monteiro, A.: A Framework for Measuring the Interoperability of Geo-Ontologies. Spatial Cognition and Computation\u00a06(4), 307\u2013329 (2001)","journal-title":"Spatial Cognition and Computation"},{"issue":"3","key":"34_CR3","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1111\/0272-4332.00052","volume":"22","author":"J. Garrick","year":"2002","unstructured":"Garrick, J.: Perspectives on the use of risk assessment to address terrorism. Risk Analysis\u00a022(3), 421\u2013423 (2002)","journal-title":"Risk Analysis"},{"unstructured":"The Naitonal Strategy for Homeland Security. The office of Homeland Security (July 2002), \n                  \n                    http:\/\/www.whitehouse.gov\/homeland\/book\/nat_strat_hls.pdf\n                  \n                  \n                 (accesed May 30, 2008)","key":"34_CR4"},{"issue":"7","key":"34_CR5","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1080\/13658810110061144","volume":"15","author":"A.U. Frank","year":"2001","unstructured":"Frank, A.U.: Tiers of Ontology and Consistency Constraints in Geographic Information Systems. International Journal of Geographical Information Science\u00a015(7), 667\u2013678 (2001)","journal-title":"International Journal of Geographical Information Science"},{"unstructured":"ICF Consulting. The Economic Cost of the Blackout: An issue paper on the Northeast Blackout (August 14, 2003), \n                  \n                    http:\/\/www.solarstorms.org\/ICFBlackout2003.pdf\n                  \n                  \n                 (accessed May 31, 2008)","key":"34_CR6"},{"unstructured":"IWS. NERC Welcomes U.S.-Canada Power System Task Force Final Report. Published April 6, 2004 by the North American Electric Reliability Council (accessed May 30, 2008)","key":"34_CR7"},{"issue":"4","key":"34_CR8","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/1232743.1232745","volume":"50","author":"J. Kramer","year":"2007","unstructured":"Kramer, J.: Is Abstraction the Key to Computing? Communications of the ACM\u00a050(4), 37\u201342 (2007)","journal-title":"Communications of the ACM"},{"key":"34_CR9","doi-asserted-by":"publisher","first-page":"1103","DOI":"10.1068\/b32078","volume":"34","author":"R.K. McNally","year":"2007","unstructured":"McNally, R.K., Lee, S.-W., Yavagal, D., Xiang, W.-N.: Learning the Critical Infrastructure Interdependencies Through an Ontology-Based Information System. Environment and Planning B: Planning and Design\u00a034, 1103\u20131124 (2007)","journal-title":"Environment and Planning B: Planning and Design"},{"unstructured":"Terner, M., Sutton, R., Hebert, B., Bailey, J., Gilbert, H., Jacqz, C.: Protecting Critical Infrastructure. GeoIntelligence (March 1, 2004), \n                  \n                    http:\/\/www.geointelmag.com\/geointelligence\/article\/articleDetail.jsp?id=90043","key":"34_CR10"},{"key":"34_CR11","first-page":"310","volume-title":"Emerging Spatial Information Systems and Applications","author":"W.J. Tolone","year":"2006","unstructured":"Tolone, W.J., Xiang, W.-N., Raja, A., Wilson, D., Tang, Q., McWilliams, K., McNally, R.: Mining critical infrastructure information from municipality data sets: a knowledge-driven approach and its applications. In: Hilton, B.N. (ed.) Emerging Spatial Information Systems and Applications, pp. 310\u2013325. Idea Group Publishing, Hershey (2006)"},{"unstructured":"Sandoz, J.F.: Red Teaming: A means to Military Transformation. Report by the Institute for Defense Analyses, Alexandria Va, Advanced Warfighting Program (2001), \n                  \n                    http:\/\/handle.dtic.mil\/100.2\/ADA388176","key":"34_CR12"},{"key":"34_CR13","doi-asserted-by":"publisher","first-page":"1124","DOI":"10.1126\/science.185.4157.1124","volume":"185","author":"A. Tversky","year":"1974","unstructured":"Tversky, A., Kahneman, D.: Judgment Under Uncertainty: Heuristics an Bias: Bias in Judgments Reveal Some Heuristics of Thinking Under Uncertainty. Science\u00a0185, 1124\u20131131 (1974)","journal-title":"Science"},{"key":"34_CR14","volume-title":"Decision Support Systems and Intelligent Systems","author":"E. Turban","year":"2001","unstructured":"Turban, E., Aronson, J.E.: Decision Support Systems and Intelligent Systems. Prentice Hall, Upper Saddle River (2001)"},{"unstructured":"Weeks, A.: A Delphi-Case Design Method for Model Validation in Critical Infrastructure Protection Modeling and Simulation, Masters Thesis, Dept of Geography and Earth Sciences, Univ. of North Carolina at Charlotte (May 2006)","key":"34_CR15"},{"issue":"3","key":"34_CR16","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/1118178.1118215","volume":"49","author":"J. Wing","year":"2006","unstructured":"Wing, J.: Viewpoint: Computational Thinking. CACM\u00a049(3), 33\u201335 (2006)","journal-title":"CACM"},{"issue":"6","key":"34_CR17","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1068\/b2945","volume":"30","author":"W.-N. Xiang","year":"2003","unstructured":"Xiang, W.-N., Clarke, K.C.: The use of scenarios in land-use planning. Environment and Planning B: Planning and Design\u00a030(6), 885\u2013909 (2003)","journal-title":"Environment and Planning B: Planning and Design"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructure Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03552-4_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T12:26:50Z","timestamp":1558268810000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03552-4_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642035517","9783642035524"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03552-4_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}