{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T11:28:29Z","timestamp":1769858909123,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642315183","type":"print"},{"value":"9783642315190","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-31519-0_13","type":"book-chapter","created":{"date-parts":[[2012,8,13]],"date-time":"2012-08-13T14:30:13Z","timestamp":1344868213000},"page":"207-218","source":"Crossref","is-referenced-by-count":5,"title":["A Bayesian Network Based Critical Infrastructure Risk Model"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Schaberreiter","sequence":"first","affiliation":[]},{"given":"Pascal","family":"Bouvry","sequence":"additional","affiliation":[]},{"given":"Juha","family":"R\u00f6ning","sequence":"additional","affiliation":[]},{"given":"Djamel","family":"Khadraoui","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Aubert, J., Schaberreiter, T., Incoul, C., Khadraoui, D.: Real-time security monitoring of interdependent services in critical infrastructures. case study of a risk-based approach. In: 21th European Safety and Reliability Conference, ESREL 2010 (2010)","DOI":"10.1109\/ARES.2010.102"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Aubert, J., Schaberreiter, T., Incoul, C., Khadraoui, D., Gateau, B.: Risk-based methodology for real-time security monitoring of interdependent services in critical infrastructures. In: ARES 2010 International Conference on Availability, Reliability, and Security, pp. 262\u2013267 (2010), doi:10.1109\/ARES.2010.102","DOI":"10.1109\/ARES.2010.102"},{"issue":"9","key":"13_CR3","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.1016\/j.ress.2009.02.001","volume":"94","author":"F. Baiardi","year":"2009","unstructured":"Baiardi, F., Telmon, C., Sgandurra, D.: Hierarchical, Model-based Risk Management of Critical Infrastructures. Reliability Engineering & System Safety\u00a094(9), 1403\u20131415 (2009), doi:10.1016\/j.ress.2009.02.001; The 18th European Safety and Reliability Conference ESREL 2007","journal-title":"Reliability Engineering & System Safety"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Caldeira, F., Schaberreiter, T., Monteiro, E., Aubert, J., Simoes, P., Khadraoui, D.: Trust based interdependency weighting for on-line risk monitoring in interdependent critical infrastructures. In: 2011 6th International Conference on Risk and Security of Internet and Systems, CRiSIS, pp. 1\u20137 (2011)","DOI":"10.1109\/CRiSIS.2011.6061545"},{"issue":"4","key":"13_CR5","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1023\/A:1022649401552","volume":"9","author":"G.F. Cooper","year":"1992","unstructured":"Cooper, G.F., Herskovits, E.: A bayesian method for the induction of probabilistic networks from data. Mach. Learn.\u00a09(4), 309\u2013347 (1992), http:\/\/dx.doi.org\/10.1023\/A:1022649401552 , doi:10.1023\/A:1022649401552","journal-title":"Mach. Learn."},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Eronen, J., Laakso, M.: A case for protocol dependency. IEEE International Workshop on Critical Infrastructure Protection, 22\u201332 (2005)","DOI":"10.1109\/IWCIP.2005.1"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Haimes, Y.Y., Kaplan, S., Lambert, J.H.: Risk filtering, ranking, and management framework using hierarchical holographic modeling. In: Risk Analysis, vol.\u00a022(2), Society for Risk Analysis (2002)","DOI":"10.1111\/0272-4332.00020"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Haslum, K., Arnes, A.: Multisensor real-time risk assessment using continuous-time hidden markov models. In: 2006 International Conference on Computational Intelligence and Security, vol.\u00a02, pp. 1536\u20131540 (2006), doi:10.1109\/ICCIAS.2006.295318","DOI":"10.1109\/ICCIAS.2006.295318"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Panzieri, S., Setola, R., Ulivi, G.: An approach to model complex interdependent infrastructures. In: 16th IFAC World Congress (2005); CISIA, Critical Infrastructures","DOI":"10.3182\/20050703-6-CZ-1902.00068"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Pietikiinen, P., Karjalainen, K., Eronen, J., Rning, J.: Socio-technical security assessment of a voip system. In: The Fourth International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2010 (2010)","DOI":"10.1109\/SECURWARE.2010.31"},{"key":"13_CR11","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/37.969131","volume":"21","author":"S.M. Rinaldi","year":"2001","unstructured":"Rinaldi, S.M., Peerenboom, J.P., Kelly, T.K.: Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Systems Magazine\u00a021, 11\u201325 (2001)","journal-title":"IEEE Control Systems Magazine"},{"key":"13_CR12","unstructured":"Schaberreiter, T., Aubert, J., Khadraoui, D.: Critical infrastructure security modelling and resci-monitor: A risk based critical infrastructure model. In: IST-Africa Conference Proceedings, pp. 1\u20138 (2011)"},{"key":"13_CR13","unstructured":"Schaberreiter, T., Caldeira, F., Aubert, J., Monteiro, E., Khadraoui, D., Simones, P.: Assurance and trust indicators to evaluate accuracy of on-line risk in critical infrastructures. In: 6th International Conference on Critical Information Infrastructure Security, CRITIS 2011 (2011)"},{"key":"13_CR14","unstructured":"Schaberreiter, T., Kittil, K., Halunen, K., Rning, J., Khadraoui, D.: Risk assessment in critical infrastructure security modelling based on dependency analysis (short paper). In: 6th International Conference on Critical Information Infrastructure Security, CRITIS 2011 (2011)"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Sokolowski, J., Turnitsa, C., Diallo, S.: A conceptual modeling method for critical infrastructure modeling. In: 41st Annual Simulation Symposium, ANSS 2008, pp. 203\u2013211 (2008), doi:10.1109\/ANSS-41.2008.31","DOI":"10.1109\/ANSS-41.2008.31"}],"container-title":["Advances in Intelligent Systems and Computing","EVOLVE - A Bridge between Probability, Set Oriented Numerics, and Evolutionary Computation II"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31519-0_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T21:07:22Z","timestamp":1743973642000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31519-0_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642315183","9783642315190"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31519-0_13","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}