{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T22:50:18Z","timestamp":1725749418584},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642414756"},{"type":"electronic","value":"9783642414763"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41476-3_3","type":"book-chapter","created":{"date-parts":[[2013,9,23]],"date-time":"2013-09-23T01:30:06Z","timestamp":1379899806000},"page":"30-41","source":"Crossref","is-referenced-by-count":1,"title":["Assurance and Trust Indicators to Evaluate Accuracy of On-line Risk in Critical Infrastructures"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Schaberreiter","sequence":"first","affiliation":[]},{"given":"Filipe","family":"Caldeira","sequence":"additional","affiliation":[]},{"given":"Jocelyn","family":"Aubert","sequence":"additional","affiliation":[]},{"given":"Edmundo","family":"Monteiro","sequence":"additional","affiliation":[]},{"given":"Djamel","family":"Khadraoui","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Sim\u00f5es","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Artz, D., Gil, Y.: A survey of trust in computer science and the semantic web. In: Web Semantics: Science (January 2007)","DOI":"10.2139\/ssrn.3199355"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Aubert, J., Schaberreiter, T., Incoul, C., Khadraoui, D.: Real-time security monitoring of interdependent services in critical infrastructures. Case study of a risk-based approach. In: 21st European Safety and Reliability Conference, ESREL 2010 (September 2010)","DOI":"10.1109\/ARES.2010.102"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Aubert, J., Schaberreiter, T., Incoul, C., Khadraoui, D., Gateau, B.: Risk-based methodology for real-time security monitoring of interdependent services in critical infrastructures. In: International Conference on Availability, Reliability, and Security (ARES 2010), pp. 262\u2013267 (February 2010)","DOI":"10.1109\/ARES.2010.102"},{"issue":"9","key":"3_CR4","doi-asserted-by":"crossref","first-page":"1403","DOI":"10.1016\/j.ress.2009.02.001","volume":"94","author":"F. Baiardi","year":"2009","unstructured":"Baiardi, F., Telmon, C., Sgandurra, D.: Hierarchical, Model-based Risk Management of Critical Infrastructures. In: The 18th European Safety and Reliability Conference, ESREL, vol.\u00a094, pp. 1403\u20131415 (2009)","journal-title":"Reliability Engineering & System Safety"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-642-21694-7_12","volume-title":"Critical Information Infrastructures Security","author":"F. Caldeira","year":"2011","unstructured":"Caldeira, F., Monteiro, E., Sim\u00f5es, P.: Trust and reputation for information exchange in critical infrastructures. In: Xenakis, C., Wolthusen, S. (eds.) CRITIS 2010. LNCS, vol.\u00a06712, pp. 140\u2013152. Springer, Heidelberg (2011)"},{"issue":"3","key":"3_CR6","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1504\/IJESDF.2010.038282","volume":"3","author":"F. Caldeira","year":"2010","unstructured":"Caldeira, F., Monteiro, E., Simoes, P.: Trust and reputation management for critical infrastructure protection. Int. J. Electronic Security and Digital Forensics\u00a03(3), 187\u2013203 (2010)","journal-title":"Int. J. Electronic Security and Digital Forensics"},{"issue":"2","key":"3_CR7","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1111\/0272-4332.00020","volume":"22","author":"Yacov Y. Haimes","year":"2002","unstructured":"Haimes, Y.Y., Kaplan, S., Lambert, J.H.: Risk filtering, ranking, and management framework using hierarchical holographic modeling. Risk Analysis\u00a022(2) (2002)","journal-title":"Risk Analysis"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Haslum, K., Arnes, A.: Multisensor real-time risk assessment using continuous-time hidden markov models. In: International Conference on Computational Intelligence and Security, vol.\u00a02, pp. 1536\u20131540 (2006)","DOI":"10.1109\/ICCIAS.2006.295318"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Ouedraogo, M., Khadraoui, D., De Remont, B., Dubois, E., Mouratidis, H.: Deployment of a security assurance monitoring framework for telecommunication service infrastructures on a voip service. In: New Technologies, Mobility and Security (NTMS 2008), pp. 1\u20135 (November 2008)","DOI":"10.1109\/NTMS.2008.ECP.38"},{"issue":"1","key":"3_CR10","doi-asserted-by":"crossref","first-page":"404","DOI":"10.3182\/20050703-6-CZ-1902.00068","volume":"38","author":"Stefano Panzieri","year":"2005","unstructured":"Panzieri, S., Setola, R., Ulivi, G.: An approach to model complex interdependent infrastructures. In: 16th IFAC World Congress (2005)","journal-title":"IFAC Proceedings Volumes"},{"key":"3_CR11","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/37.969131","volume":"21","author":"S.M. Rinaldi","year":"2001","unstructured":"Rinaldi, S.M., Peerenboom, J.P., Kelly, T.K.: Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Systems Magazine\u00a021, 11\u201325 (2001)","journal-title":"IEEE Control Systems Magazine"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Savola, R.M., Pentikainen, H., Ouedraogo, M.: Towards security effectiveness measurement utilizing risk-based security assurance. In: Information Security for South Africa (ISSA), pp. 1\u20138 (August 2010)","DOI":"10.1109\/ISSA.2010.5588322"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Sokolowski, J., Turnitsa, C., Diallo, S.: A conceptual modeling method for critical infrastructure modeling. In: 41st Annual Simulation Symposium (ANSS 2008), pp. 203\u2013211 (April 2008)","DOI":"10.1109\/ANSS-41.2008.31"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructure Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41476-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,24]],"date-time":"2019-07-24T11:45:25Z","timestamp":1563968725000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41476-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642414756","9783642414763"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41476-3_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}