{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:11:30Z","timestamp":1725538290868},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642047978"},{"type":"electronic","value":"9783642047985"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04798-5_4","type":"book-chapter","created":{"date-parts":[[2009,10,1]],"date-time":"2009-10-01T08:17:52Z","timestamp":1254385072000},"page":"51-64","source":"Crossref","is-referenced-by-count":0,"title":["Modeling and Managing Risk in Billing Infrastructures"],"prefix":"10.1007","author":[{"given":"Fabrizio","family":"Baiardi","sequence":"first","affiliation":[]},{"given":"Claudio","family":"Telmon","sequence":"additional","affiliation":[]},{"given":"Daniele","family":"Sgandurra","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1038\/35019019","volume":"406","author":"R. Albert","year":"2002","unstructured":"R. Albert, H. Jeong and A. Barabasi, Error and attack tolerance of complex networks, Nature, vol. 406, pp. 378\u2013382, 2002.","journal-title":"Nature"},{"issue":"9","key":"4_CR2","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.1016\/j.ress.2009.02.001","volume":"94","author":"F. Baiardi","year":"2009","unstructured":"F. Baiardi, C. Telmon and D. Sgandurra, Hierarchical, model-based risk management of critical infrastructures, Reliability Engineering and System Safety, vol. 94(9), pp. 1403\u20131415, 2009.","journal-title":"Reliability Engineering and System Safety"},{"key":"4_CR3","volume-title":"Against the Gods: The Remarkable Story of Risk","author":"P. Bernstein","year":"1996","unstructured":"P. Bernstein, Against the Gods: The Remarkable Story of Risk, Wiley, New York, 1996."},{"issue":"2","key":"4_CR4","doi-asserted-by":"publisher","first-page":"1412","DOI":"10.1103\/PhysRevE.60.1412","volume":"60","author":"J. Carlson","year":"1999","unstructured":"J. Carlson and J. Doyle, HOT: A mechanism for power laws in designed systems, Physical Review E, vol. 60(2), pp. 1412\u20131427, 1999.","journal-title":"Physical Review E"},{"key":"4_CR5","volume-title":"Power-law distributions in empirical data, arXiv:0706.1062v2, arXiv","author":"A. Clauset","year":"2007","unstructured":"A. Clauset, C. Shalizi and M. Newman, Power-law distributions in empirical data, arXiv:0706.1062v2, arXiv, Cornell University, Ithaca, New York (arxiv.org\/PS_cache\/arxiv\/pdf\/0706\/0706.1062v2.pdf), 2007."},{"issue":"15","key":"4_CR6","doi-asserted-by":"publisher","first-page":"6112","DOI":"10.1073\/pnas.0606779104","volume":"104","author":"R. D\u2019Souza","year":"2007","unstructured":"R. D\u2019Souza, C. Borgs, J. Chayes, N. Berger and R. Kleinberg, Emergence of tempered preferential attachment from optimization, Proceedings of the National Academy of Sciences, vol. 104(15), pp. 6112\u20136117, 2007.","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"4_CR7","first-page":"435","volume-title":"A Practical Guide to Heavy Tails: Statistical Techniques and Applications","author":"C. Goldie","year":"1998","unstructured":"C. Goldie and C. Kluppelberg, Subexponential distributions, in A Practical Guide to Heavy Tails: Statistical Techniques and Applications, R. Adler, R. Feldman and M. Taqqu (Eds.), Birkhauser, Boston, Massachusetts, pp. 435\u2013459, 1998."},{"issue":"3","key":"4_CR8","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L. Lamport","year":"1982","unstructured":"L. Lamport, R. Shostak and M. Pease, The Byzantine generals problem, ACM Transactions on Programming Languages and Systems, vol. 4(3), pp. 382\u2013401, 1982.","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"L. LeMay, R. Nelli, G. Gross and C. Gunter, An integrated architecture for demand response communication and control, Proceedings of the Forty-First Annual Hawaii International Conference on System Sciences, p. 174, 2008.","DOI":"10.1109\/HICSS.2008.60"},{"key":"4_CR10","volume-title":"Heavy-tailed distribution of cyber-risks, arXiv:0803.2256v2, arXiv","author":"T. Maillart","year":"2008","unstructured":"T. Maillart and D. Sornette, Heavy-tailed distribution of cyber-risks, arXiv:0803.2256v2, arXiv, Cornell University, Ithaca, New York (arxiv.org \/PS_cache\/arxiv\/pdf\/0803\/0803.2256v2.pdf), 2008."},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"D. Maluf, Y. Gawdiak and G. Bell, On space exploration and human error: A paper on reliability and safety, Proceedings of the Thirty-Eighth Annual Hawaii International Conference on System Sciences, p. 79, 2005.","DOI":"10.1109\/HICSS.2005.466"},{"key":"4_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2763-0","volume-title":"Fractals and Scaling in Finance: Discontinuity, Concentration, Risk","author":"B. Mandelbrot","year":"1997","unstructured":"B. Mandelbrot, Fractals and Scaling in Finance: Discontinuity, Concentration, Risk, Springer, New York, 1997."},{"issue":"3","key":"4_CR13","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1002\/cplx.20264","volume":"14","author":"B. Mandelbrot","year":"2009","unstructured":"B. Mandelbrot, New methods of statistical economics revisited: Short versus long tails and Gaussian versus power law distributions, Complexity, vol. 14(3), pp. 55\u201365, 2009.","journal-title":"Complexity"},{"issue":"2","key":"4_CR14","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1080\/15427951.2004.10129088","volume":"1","author":"M. Mitzenmacher","year":"2003","unstructured":"M. Mitzenmacher, A brief history of generative models for power law and log-normal distributions, Internet Mathematics, vol. 1(2), pp. 226\u2013251, 2003.","journal-title":"Internet Mathematics"},{"key":"4_CR15","unstructured":"National Infrastructure Protection Center, Risk Management: An Essential Guide to Protecting Critical Assets, Washington, DC, 2002."},{"issue":"2","key":"4_CR16","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1137\/S003614450342480","volume":"45","author":"M. Newman","year":"2003","unstructured":"M. Newman, The structure and function of complex networks, SIAM Review, vol. 45(2), pp. 167\u2013256, 2003.","journal-title":"SIAM Review"},{"key":"4_CR17","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1080\/00107510500052444","volume":"46","author":"M. Newman","year":"2005","unstructured":"M. Newman, Power laws, Pareto distributions and Zipf\u2019s law, Contemporary Physics, vol. 46, pp. 323\u2013351, 2005.","journal-title":"Contemporary Physics"},{"issue":"2","key":"4_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1103\/PhysRevLett.89.028301","volume":"89","author":"M. Newman","year":"2002","unstructured":"M. Newman, M. Girvan and J. Doyne Farmer, Optimal design, robustness and risk aversion, Physical Review Letters, vol. 89(2), pp. 028301.1\u2013028301.4, 2002.","journal-title":"Physical Review Letters"},{"issue":"2","key":"4_CR19","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/322186.322188","volume":"27","author":"M. Pease","year":"1980","unstructured":"M. Pease, R. Shostak and L. Lamport, Reaching agreement in the presence of faults, Journal of the ACM, vol. 27(2), pp. 228\u2013234, 1980.","journal-title":"Journal of the ACM"},{"key":"4_CR20","volume-title":"Heavy-Tail Phenomena: Probabilistic and Statistical Modeling","author":"S. Resnick","year":"2007","unstructured":"S. Resnick, Heavy-Tail Phenomena: Probabilistic and Statistical Modeling, Springer, New York, 2007."},{"key":"4_CR21","volume-title":"Critical Phenomena in Natural Sciences: Chaos, Fractals, Self-Organization and Disorder: Concepts and Tools","author":"D. Sornette","year":"2006","unstructured":"D. Sornette, Critical Phenomena in Natural Sciences: Chaos, Fractals, Self-Organization and Disorder: Concepts and Tools, Springer, Berlin-Heidelberg, Germany, 2006."},{"issue":"3","key":"4_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1198\/000313007X219996","volume":"61","author":"N. Taleb","year":"2007","unstructured":"N. Taleb, Black swans and the domains of statistics, The American Statistician, vol. 61(3), pp. 1\u20133, 2007.","journal-title":"The American Statistician"},{"key":"4_CR23","volume-title":"The Black Swan: The Impact of the Highly Improbable","author":"N. Taleb","year":"2007","unstructured":"N. Taleb, The Black Swan: The Impact of the Highly Improbable, Random House, New York, 2007."},{"key":"4_CR24","unstructured":"C. Wilke, S. Altmeyer and T. Martinetz, Large-scale evolution and extinction in a hierarchically structured environment, Proceedings of the Sixth International Conference on Artificial Life, pp. 266\u2013272, 1998."}],"container-title":["IFIP Advances in Information and Communication Technology","Critical Infrastructure Protection III"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04798-5_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,10]],"date-time":"2019-03-10T03:04:18Z","timestamp":1552187058000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04798-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642047978","9783642047985"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04798-5_4","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}