{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,2]],"date-time":"2025-03-02T06:06:08Z","timestamp":1740895568435,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642130212"},{"type":"electronic","value":"9783642130229"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13022-9_67","type":"book-chapter","created":{"date-parts":[[2011,1,21]],"date-time":"2011-01-21T20:50:16Z","timestamp":1295643016000},"page":"671-680","source":"Crossref","is-referenced-by-count":10,"title":["Ontology Applied in Decision Support System for Critical Infrastructures Protection"],"prefix":"10.1007","author":[{"given":"Micha\u0142","family":"Chora\u015b","sequence":"first","affiliation":[]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[]},{"given":"Adam","family":"Flizikowski","sequence":"additional","affiliation":[]},{"given":"Witold","family":"Ho\u0142ubowicz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"67_CR1","unstructured":"European Parliament legislative resolution on the proposal for a Council directive on the identification and designation of European Critical Infrastructure and the assessment of the need to improve their protection (COM(2006)0787 C6-0053\/2007 2006\/0276(CNS)) (July 10, 2007)"},{"key":"67_CR2","doi-asserted-by":"crossref","unstructured":"Xiao Feng, D., Yu Jiong, G., Kun, Y.: Study on Intelligent Maintenance Decision Support System Using for Power Plant Equipment. In: Proc. of the IEEE International Conference on Automation and Logistics Qingdao, China, September 2008, pp. 96\u2013100 (2008)","DOI":"10.1109\/ICAL.2008.4636127"},{"key":"67_CR3","doi-asserted-by":"crossref","unstructured":"Lee, S.J., Mo, K., Seong, P.H.: Development of an Integrated Decision Support System to Aid the Cognitive Activities of Operators in Main Control Rooms of Nuclear Power Plants. In: Proc. of IEEE Symposium on Computational Intelligence in Multicriteria Decision Making (MCDM), pp. 146\u2013152 (2007)","DOI":"10.1109\/MCDM.2007.369429"},{"key":"67_CR4","doi-asserted-by":"crossref","unstructured":"Zhang, B., Wu, G., Shang, S.: Research on Decision Support System of Water Pollution Control Based On Immune Agent. In: Proc. of International Symposium on Computer Science and Computational Technology, ISCSCT, vol.\u00a01, pp. 114\u2013117 (2008)","DOI":"10.1109\/ISCSCT.2008.131"},{"key":"67_CR5","doi-asserted-by":"crossref","unstructured":"Xie, L., Wang, Z., Bian, L.: The Research of Oileld Flood Precaution Decision Support System. In: Proc. of International Seminar on Business and Information Management, ISBIM \u201908, December 2008, vol.\u00a02, pp. 236\u2013239 (2008)","DOI":"10.1109\/ISBIM.2008.125"},{"key":"67_CR6","unstructured":"ISO\/IEC 13335-1:2004, Information Technology Security Techniques Management of information and communications technology security Part 1: Concepts and models for information and communications technology security management"},{"key":"67_CR7","first-page":"35","volume":"11","author":"M. Choras","year":"2009","unstructured":"Choras, M., Stachowicz, A., Kozik, R., Flizikowski, A., Renk, R.: Ontology-based approach to SCADA systems vulnerabilities representation for CIP. Electronics\u00a011, 35\u201338 (2009)","journal-title":"Electronics"},{"key":"67_CR8","unstructured":"Choras, M., Flizikowski, A., Kozik, R., Renk, R., Holubowicz, W.: Ontology-Based Reasoning Combined with Inference Engine for SCADA-ICT Interdependencies, Vulnerabilities and Threats Analysis. In: Pre-Proc of 4th International Workshop on Critical Information Infrastructures Security, CRITIS\u201909, Bonn, Germany, pp. 203\u2013214, Fraunhofer IAIS (2009)"},{"key":"67_CR9","unstructured":"http:\/\/cve.mitre.org\/"},{"key":"67_CR10","unstructured":"http:\/\/scap.nist.gov\/"},{"key":"67_CR11","unstructured":"http:\/\/cpe.mitre.org\/"},{"key":"67_CR12","unstructured":"http:\/\/www.first.org\/cvss\/"},{"key":"67_CR13","unstructured":"http:\/\/cwe.mitre.org\/"},{"key":"67_CR14","unstructured":"http:\/\/nvd.nist.gov\/cce.cfm"},{"key":"67_CR15","unstructured":"http:\/\/www.jessrules.com\/"},{"key":"67_CR16","unstructured":"SWRL: A Semantic Web Rule Language Combning OWL and RuleML, W3C Member Submission, http:\/\/www.w3.org\/Submission\/SWRL\/"},{"key":"67_CR17","unstructured":"Deliverable D2.3, Ontological approach and inference engine, INSPIRE Project (2009)"},{"key":"67_CR18","doi-asserted-by":"crossref","unstructured":"Macaulay, T.: Critical infrastructure: Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdependencies (August 2008)","DOI":"10.1201\/9781420068368"},{"key":"67_CR19","doi-asserted-by":"publisher","DOI":"10.1002\/0471789542","volume-title":"Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation","author":"T.G. Lewis","year":"2006","unstructured":"Lewis, T.G.: Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation. Wiley-Interscience, Hoboken (2006)"},{"key":"67_CR20","volume-title":"The benefits of networked SCADA systems utilizing IP-enabled networks","author":"R.H. McClanahan","year":"2002","unstructured":"McClanahan, R.H.: The benefits of networked SCADA systems utilizing IP-enabled networks. IEEE, Los Alamitos (2002)"}],"container-title":["Lecture Notes in Computer Science","Trends in Applied Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13022-9_67","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,2]],"date-time":"2025-03-02T01:24:48Z","timestamp":1740878688000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13022-9_67"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642130212","9783642130229"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13022-9_67","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}