{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:49:11Z","timestamp":1755838151589},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642047978"},{"type":"electronic","value":"9783642047985"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04798-5_16","type":"book-chapter","created":{"date-parts":[[2009,10,1]],"date-time":"2009-10-01T04:17:52Z","timestamp":1254370672000},"page":"229-242","source":"Crossref","is-referenced-by-count":8,"title":["Ontology-Based Critical Infrastructure Modeling and Simulation"],"prefix":"10.1007","author":[{"given":"Vincenzo","family":"Masucci","sequence":"first","affiliation":[]},{"given":"Francesco","family":"Adinolfi","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Servillo","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Dipoppa","sequence":"additional","affiliation":[]},{"given":"Alberto","family":"Tofani","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","first-page":"23","volume-title":"Computational Models of Risks to Infrastructure","author":"T. Brown","year":"2006","unstructured":"T. Brown, Multiple modeling approaches and insights for critical infrastructure protection, in Computational Models of Risks to Infrastructure, D. Skanata and D. Byrd (Eds.), IOS Press, Amsterdam, The Netherlands, pp. 23\u201333, 2006."},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"E. Casalicchio, E. Galli and S. Tucci, Federated agent-based modeling and simulation approach to study interdependencies in IT critical infrastructures, Proceedings of the Eleventh IEEE International Symposium on Distributed Simulation and Real-Time Applications, pp. 182\u2013189, 2007.","DOI":"10.1109\/DS-RT.2007.11"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"A. Chaturvedi, A society of simulation approach to dynamic integration of simulations, Proceedings of the Thirty-Eighth Winter Simulation Conference, pp. 2125\u20132131, 2006.","DOI":"10.1109\/WSC.2006.323012"},{"issue":"1\/2","key":"16_CR4","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1504\/IJCIS.2008.016095","volume":"4","author":"S. Porcellinis De","year":"2008","unstructured":"S. De Porcellinis, R. Setola, S. Panzieri and G. Ulivi, Simulation of heterogeneous and interdependent critical infrastructures, International Journal of Critical Infrastructures, vol. 4(1\/2), pp. 110\u2013128, 2008.","journal-title":"International Journal of Critical Infrastructures"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"D. Dudenhoeffer, M. Permann and M. Manic, CIMS: A framework for infrastructure interdependency modeling and analysis, Proceedings of the Thirty-Eighth Winter Simulation Conference, pp. 478\u2013485, 2006.","DOI":"10.1109\/WSC.2006.323119"},{"key":"16_CR6","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/978-0-387-75462-8_23","volume-title":"Critical Infrastructure Protection","author":"F. Flentge","year":"2007","unstructured":"F. Flentge and U. Beyer, The ISE metamodel for critical infrastructures, in Critical Infrastructure Protection, E. Goetz and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 323\u2013336, 2007."},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"O. Gursesli and A. Desrochers, Modeling infrastructure interdependencies using Petri nets, Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, vol. 2, pp. 1506\u20131512, 2003.","DOI":"10.1109\/ICSMC.2003.1244625"},{"key":"16_CR8","unstructured":"International Electrotechnical Commission, IEC 61970 Energy Management System Application Program Interface (EMS-API) \u2013 Part 301: Common Information Model (CIM) Base, Edition 1.0, Geneva, Switzerland, 2003."},{"key":"16_CR9","unstructured":"Italian National Agency for New Technologies, Energy and the Environment (ENEA), The CRESCO Project, Rome, Italy (www.cresco.enea.it)."},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"R. Klein, E. Rome, C. Beyel, R. Linnemann, W. Reinhardt and A. Usov, Information modeling and simulation in large interdependent critical infrastructures, presented at the Third International Workshop on Critical Information Infrastructure Security, 2008.","DOI":"10.1007\/978-3-642-03552-4_4"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"E. Luiijf, A. Nieuwenhuijs, M. Klaver, M. van Eeten and E. Cruz, Empirical findings on critical infrastructure dependencies in Europe, presented at the Third International Workshop on Critical Information Infrastructure Security, 2008.","DOI":"10.1007\/978-3-642-03552-4_28"},{"key":"16_CR12","unstructured":"M. Maier, Architecting principles for systems-of-systems (www.infoed.com \/Open\/PAPERS\/systems.htm), 2008."},{"key":"16_CR13","unstructured":"J. Marti, J. Hollman, C. Ventura and J. Jatskevich, Design for survival real-time infrastructures coordination, presented at the International Workshop on Complex Network and Infrastructure Protection, 2006."},{"issue":"1\/2","key":"16_CR14","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1504\/IJCIS.2008.016089","volume":"4","author":"J. Marti","year":"2008","unstructured":"J. Marti, J. Hollman, C. Ventura and J. Jatskevich, Design recovery of critical infrastructures: Real-time temporal coordination, International Journal of Critical Infrastructures, vol. 4(1\/2), pp. 17\u201331, 2008.","journal-title":"International Journal of Critical Infrastructures"},{"key":"16_CR15","unstructured":"A. McMorran, An Introduction to IEC 61970-301 61968-11: The Common Information Model, Technical Report, Institute for Energy and Environment, Department of Electronic and Electrical Engineering, University of Strathclyde, Glasgow, United Kingdom, 2007."},{"key":"16_CR16","unstructured":"P. Pederson, D. Dudenhoeffer, S. Hartley and M. Permann, Critical Infrastructure Interdependency Modeling: A Survey of U.S. and International Research, Report No. INL\/EXT-06-11464, Critical Infrastructure Protection Division, Idaho National Laboratory, Idaho Falls, Idaho, 2006."},{"key":"16_CR17","unstructured":"T. Rathnam, Using Ontologies to Support Interoperability in Federated Simulation, M.S. Thesis, School of Mechanical Engineering, Georgia Institute of Technology, Atlanta, Georgia, 2004."},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"T. Rathnam and C. Paredis, Developing federation object models using ontologies, Proceedings of the Thirty-Sixth Winter Simulation Conference, pp. 1054\u20131062, 2004.","DOI":"10.1109\/WSC.2004.1371429"},{"issue":"6","key":"16_CR19","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/37.969131","volume":"21","author":"S. Rinaldi","year":"2001","unstructured":"S. Rinaldi, J. Peerenboom and T. Kelly, Identifying, understanding and analyzing critical infrastructure interdependencies, IEEE Control Systems, vol. 21(6), pp. 11\u201325, 2001.","journal-title":"IEEE Control Systems"},{"key":"16_CR20","unstructured":"Sandia National Laboratories, National Infrastructure Simulation and Analysis Center (NISAC), Albuquerque, New Mexico (www.sandia.gov \/mission\/homeland\/programs\/critical\/nisac.html)."},{"key":"16_CR21","unstructured":"Scalable Network Technologies, QualNet, Los Angeles, California (www .scalable-networks.com\/products\/developer.php)."},{"key":"16_CR22","first-page":"229","volume-title":"Critical Infrastructure Protection II","author":"R. Setola","year":"2008","unstructured":"R. Setola, S. Bologna, E. Casalicchio and V. Masucci, An integrated approach for simulating interdependencies, in Critical Infrastructure Protection II, M. Papa and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 229\u2013239, 2008."},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"W. Tolone, E. Johnson, S. Lee, W. Xiang, L. Marsh, C. Yeager and J. Blackwell, Enabling system of systems analysis of critical infrastructure behaviors, presented at the Third International Workshop on Critical Information Infrastructure Security, 2008.","DOI":"10.1007\/978-3-642-03552-4_3"}],"container-title":["IFIP Advances in Information and Communication Technology","Critical Infrastructure Protection III"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04798-5_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T19:47:12Z","timestamp":1558554432000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04798-5_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642047978","9783642047985"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04798-5_16","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}