{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T22:50:18Z","timestamp":1725749418425},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642414756"},{"type":"electronic","value":"9783642414763"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41476-3_10","type":"book-chapter","created":{"date-parts":[[2013,9,23]],"date-time":"2013-09-23T01:30:06Z","timestamp":1379899806000},"page":"116-127","source":"Crossref","is-referenced-by-count":0,"title":["How to Perform Verification and Validation of Critical Infrastructure Modeling Tools"],"prefix":"10.1007","author":[{"given":"Alfonso","family":"Farina","sequence":"first","affiliation":[]},{"given":"Antonio","family":"Graziano","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Panzieri","sequence":"additional","affiliation":[]},{"given":"Federica","family":"Pascucci","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Setola","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Brunner, E., Suter, M.: International CIIP Handbook 2008\/2009, CRN Handbooks series, Center for Security Studies (CSS), ETH Zurich (2008)"},{"key":"10_CR2","unstructured":"Bologna, S., Setola, R.: The Need to Improve Local Self-Awareness in CIP\/CIIP. In: Proc. of First IEEE International Workshop on Critical Infrastructure Protection (IWCIP 2005), Darmstadt, Germany, pp. 84\u201389 (2005)"},{"issue":"1\/2","key":"10_CR3","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1504\/IJCIS.2008.016095","volume":"4","author":"S. Porcellinis De","year":"2008","unstructured":"De Porcellinis, S., Panzieri, S., Setola, R., Ulivi, G.: Simulation of Heterogeneous and Interdependent Critical Infrastructures. Int. J. Critical Infrastructures (IJCIS)\u00a04(1\/2), 110\u2013128 (2008)","journal-title":"Int. J. Critical Infrastructures (IJCIS)"},{"key":"10_CR4","unstructured":"EU Project IRRIIS: Integrated Risk Reduction of Information-based Infrastructure Systems, http:\/\/www.irriis.org\/"},{"key":"10_CR5","unstructured":"Critical Infrastructure Resiliency Simulation (CIPR\/Sim), http:\/\/www.inl.gov\/research\/critical-infrastructure-resiliency-simulation\/"},{"key":"10_CR6","unstructured":"National Infrastructure Simulation and Analysis Center (NISAC), http:\/\/www.sandia.gov\/nisac\/"},{"key":"10_CR7","unstructured":"Pederson, P., Dudenhoeffer, D., Hartley, S., Permann, M.: Critical Infrastructure Interdependency Modelling: A Survey of U.S. and International Research, Idaho National Lab (2006)"},{"key":"10_CR8","unstructured":"EU project DIESIS (Design of an Interoperable European federated Simulation network for critical InfraStructures), Deliverable, D2.3 Report on available infrastructure simulators, http:\/\/www.diesis-project.eu\/"},{"issue":"1","key":"10_CR9","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1504\/IJSSE.2010.035380","volume":"2","author":"R. Setola","year":"2010","unstructured":"Setola, R.: How to Measure the Degree of Interdependencies among Critical Infrastructures. Int. J. of System of Systems Engineering (IJSSE)\u00a02(1), 38\u201359 (2010)","journal-title":"Int. J. of System of Systems Engineering, (IJSSE)"},{"key":"10_CR10","unstructured":"Topcu, O.: Review of Verification and Validation Methods in Simulation, Defence R&D Canada (2003)"},{"key":"10_CR11","volume-title":"Proc. of Workshop Foundations for Verification and Validation in the 21st Century","author":"W.L. Oberkampf","year":"2002","unstructured":"Oberkampf, W.L., Trucano, T.G., Hirsch, C.: Verification, Validation and Predictive Capability in Computational Engineering and Physics. In: Proc. of Workshop Foundations for Verification and Validation in the 21st Century, October 22-23. Johns Hopkins University, Laurel (2002)"},{"key":"10_CR12","unstructured":"ANSI\/IEEE, Standard Glossary for Software Engineering Terminology (1983)"},{"key":"10_CR13","unstructured":"DoD Instruction (DoDI), 5000.61 DoD Modeling and Simulation (M&S) Verification, Validation, Accreditation (VV&A) (1996)"},{"issue":"2","key":"10_CR14","first-page":"163","volume":"25","author":"D.K. Pace","year":"2004","unstructured":"Pace, D.K.: Modeling and Simulation Verification and Validation Challenges. Johns Hopkins APL Technical Digest\u00a025(2), 163\u2013172 (2004)","journal-title":"Johns Hopkins APL Technical Digest"},{"key":"10_CR15","unstructured":"EU Project, Vital Infrastructure Threats and Assurance (VITA), http:\/\/vita.iabg.eu\/"},{"key":"10_CR16","volume-title":"Design and Use of Computer Simulation Models","author":"J.R. Emshoff","year":"1970","unstructured":"Emshoff, J.R., Sisson, R.L.: Design and Use of Computer Simulation Models. MacMillan, New York (1970)"},{"issue":"3","key":"10_CR17","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1002\/bs.3830120306","volume":"12","author":"C.F. Hermann","year":"1967","unstructured":"Hermann, C.F.: Validation Problems in Games and Simulations with Special Reference to Models of International Politics. Behavioral Science\u00a012(3), 216\u2013231 (1967)","journal-title":"Behavioral Science"},{"key":"10_CR18","first-page":"11","volume-title":"Computers and Thought","author":"A.M. Turing","year":"1963","unstructured":"Turing, A.M.: Computing Machinery and Intelligence. In: Feigenbaum, E.A., Feldman, J. (eds.) Computers and Thought, pp. 11\u201315. McGraw-Hill, New York (1963)"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Caldarelli, G., Vespignani, A.: Large Scale Structure and Dynamics of Complex Networks. World Scientific Publisher (2007)","DOI":"10.1142\/6455"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Haimes, Y.Y.: Risk Modeling, Assessment, and Management. Wiley (2009)","DOI":"10.1002\/9780470422489"},{"key":"10_CR21","unstructured":"Bigelow, J.H., Davis, P.K.: Implications for Model Validation of Multiresolution, Multiperspective Modeling. RAND (2003)"},{"key":"10_CR22","volume-title":"The Handbook of Simulation","author":"O. Balci","year":"1997","unstructured":"Balci, O.: Verification, validation and testing. In: Banks, J. (ed.) The Handbook of Simulation. John Wiley & Sons, New York (1997)"},{"key":"10_CR23","unstructured":"IEEE, 1516.4 Recommended Practice for Verification, Validation, and Accreditation of a Federationan Overlay to the High Level Architecture Federation Development and Execution Process (2007)"},{"key":"10_CR24","unstructured":"Panzieri, S., Oliva, G., Setola, R.: Modelling and Simulation of Critical Infrastructures. In: Flammini, F. (ed.) Critical Infrastructure Security: Assessment, Prevention, Detection, Response. WIT Press (2011)"},{"key":"10_CR25","volume-title":"Sustainable and Resilient Critical Infrastructure Systems","author":"G. Satumitara","year":"2010","unstructured":"Satumitara, G., Duenas-Osorio, L.: Synthesis of Modelling and Simulation Methods on Critical Infrastructure Interdependencies Research. In: Gopalakrishnan, K., Peeta, S. (eds.) Sustainable and Resilient Critical Infrastructure Systems. Springer, Berlin (2010)"},{"key":"10_CR26","unstructured":"Sargent, R.G.: Verification and Validation of Simulation Models. In: Proc. of Winter Simulation Conf., pp. 121\u2013130 (1998)"},{"key":"10_CR27","unstructured":"Hone, G.N.: Application Domain Modeling to support the Verification and Validation of Synthetic Environments. In: Simulation Interoperability Workshop (1998)"},{"issue":"4","key":"10_CR28","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1177\/154851290500200402","volume":"2","author":"S.Y. Harmon","year":"2005","unstructured":"Harmon, S.Y., Youngblood, S.M.: A Proposed Model for Simulation Validation Process Maturity. Journal of Defense Modeling and Simulation (JDMS)\u00a02(4), 179\u2013190 (2005)","journal-title":"Journal of Defense Modeling and Simulation (JDMS)"},{"issue":"1","key":"10_CR29","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/229493.229511","volume":"6","author":"L.G. Birta","year":"1996","unstructured":"Birta, L.G., Zmizrak, F.N.: A Knowledge-Based Approach for the Validation of Simulation Models: The Foundation. ACM Transactions on Modeling and Computer Simulation\u00a06(1), 76\u201398 (1996)","journal-title":"ACM Transactions on Modeling and Computer Simulation"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructure Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41476-3_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,4]],"date-time":"2020-08-04T15:15:36Z","timestamp":1596554136000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41476-3_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642414756","9783642414763"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41476-3_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}