{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T16:40:02Z","timestamp":1746376802939,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":71,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662441596"},{"type":"electronic","value":"9783662441602"}],"license":[{"start":{"date-parts":[[2014,9,14]],"date-time":"2014-09-14T00:00:00Z","timestamp":1410652800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,9,14]],"date-time":"2014-09-14T00:00:00Z","timestamp":1410652800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-44160-2_3","type":"book-chapter","created":{"date-parts":[[2014,9,13]],"date-time":"2014-09-13T08:00:12Z","timestamp":1410595212000},"page":"67-100","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Telecommunication Networks"],"prefix":"10.1007","author":[{"given":"Rasmus L.","family":"Olsen","sequence":"first","affiliation":[]},{"given":"Kartheepan","family":"Balachandran","sequence":"additional","affiliation":[]},{"given":"Sara","family":"Hald","sequence":"additional","affiliation":[]},{"given":"Jose Gutierrez","family":"Lopez","sequence":"additional","affiliation":[]},{"given":"Jens Myrup","family":"Pedersen","sequence":"additional","affiliation":[]},{"given":"Matija","family":"Stevanovic","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,14]]},"reference":[{"doi-asserted-by":"publisher","unstructured":"Future Internet 2020: Visions of an Industry Expert Group, DG Information Society and Media Directorate for Converged Networks and Service\u2014\u201cThe Internet People\u201d, May 2009, European Commission, Information Society and Media. ISBN: 978-92-79-11320-8, doi:10.2759\/4425","key":"3_CR1","DOI":"10.2759\/4425"},{"unstructured":"Tannenbaum, A.S.: Computer Networks, 4th edn. Prentice Hall, Upper Saddle River, Internation Edition, ISBN: 0-13-038488-7","key":"3_CR2"},{"unstructured":"http:\/\/www.netvalley.com\/history_of_internet.html","key":"3_CR3"},{"unstructured":"Prasad, R., Mihovska, A.: New Horizons in Mobile and Wireless Communications: Reconfigurability, ISBN: 978-1-60783-971-2, New Horizons in Mobile and Wireless Communications series, Artech House (2009)","key":"3_CR4"},{"doi-asserted-by":"crossref","unstructured":"Wang, W., Xu, Y., Khanna, M.: A survey on the communication architectures in smart grid. Comput. Netw. 55(15), 3604\u20133629","key":"3_CR5","DOI":"10.1016\/j.comnet.2011.07.010"},{"unstructured":"http:\/\/www.ipv6vsipv4.com\/","key":"3_CR6"},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1186\/1748-5908-6-6","volume":"6","author":"Murray","year":"2011","unstructured":"Murray, et al.: Why is it difficult to implement ehealth initiatives? A qualitative study. Implementation Sci. 6, 6 (2011)","journal-title":"Implementation Sci."},{"doi-asserted-by":"crossref","unstructured":"Strobla, R.O., Robillardb, P.D.: Network design for water quality monitoring of surface freshwaters: a review. J. Environ. Manag. 87(4), 639\u2013648 2008. http:\/\/dx.doi.org\/10.1016\/j.jenvman.2007.03.001","key":"3_CR8","DOI":"10.1016\/j.jenvman.2007.03.001"},{"doi-asserted-by":"crossref","unstructured":"Mattern, F., Staake, T., Weiss, M.: ICT for green\u2014how computers can help us to conserve energy. In: Proceedings of the 1st International Conference on Energy-Efficient Computing and Networking (e-Energy 2010), ACM, pp. 1\u201310. Passau (2010)","key":"3_CR9","DOI":"10.1145\/1791314.1791316"},{"doi-asserted-by":"crossref","unstructured":"Lim, H.-T., Volker, L., Herrscher, D.: Challenges in a future IP\/ethernet-based in-car network for real-time applications. In: Design Automation Conference (DAC), 2011 48th ACM\/EDAC\/IEEE, pp. 7\u201312, 5\u20139 June 2011","key":"3_CR10","DOI":"10.1145\/2024724.2024727"},{"doi-asserted-by":"publisher","unstructured":"Karjalainen, S.: Consumer preferences for feedback on household electricity consumption. Energy Build. 43(23), 458\u2013467 (2011). ISSN 0378-7788, doi:10.1016\/j.enbuild.2010.10.010","key":"3_CR11","DOI":"10.1016\/j.enbuild.2010.10.010"},{"unstructured":"Ye, Y.; Yi, Q., Sharif, H.: A secure and reliable in-network collaborative communication scheme for advanced metering infrastructure in smart grid. In: Wireless Communications and Networking Conference (WCNC), 2011 IEEE, pp. 909\u2013914, 28\u201331 March 2011","key":"3_CR12"},{"doi-asserted-by":"crossref","unstructured":"Bliek, F., van den Noort, A., Roossien, B., Kamphuis, R., de Wit, J., van der Velde, J., Eijgelaar, M.: PowerMatching City, a living lab smart grid demonstration. In: Innovative Smart Grid Technologies Conference Europe (ISGT Europe), 2010 IEEE PES, pp. 1\u20138, 11\u201313 Oct 2010","key":"3_CR13","DOI":"10.1109\/ISGTEUROPE.2010.5638863"},{"issue":"10","key":"3_CR14","doi-asserted-by":"publisher","first-page":"4487","DOI":"10.1109\/TIE.2011.2107713","volume":"58","author":"F Benzi","year":"2011","unstructured":"Benzi, F., Anglani, N., Bassi, E., Frosini, L.: Electricity smart meters interfacing the households. IEEE Trans. Ind. Electron. 58(10), 4487\u20134494 (2011)","journal-title":"IEEE Trans. Ind. Electron."},{"doi-asserted-by":"crossref","unstructured":"Depuru, S.S.S.R., Wang, L., Devabhaktuni, V., Gudi, N.: Smart meters for power grid\u2014challenges, issues, advantages and status. In: Power Systems Conference and Exposition (PSCE), 2011 IEEE\/PES, pp. 1\u20137, 20\u201323 Mar 2011","key":"3_CR15","DOI":"10.1109\/PSCE.2011.5772451"},{"issue":"2","key":"3_CR16","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1109\/TCE.2011.5955177","volume":"57","author":"J Byun","year":"2011","unstructured":"Byun, J., Hong, I., Kang, B., Park, S.: A smart energy distribution and management system for renewable energy distribution and context-aware services based on user patterns and load forecasting. IEEE Trans. Consum. Electron. 57(2), 436\u2013444 (2011)","journal-title":"IEEE Trans. Consum. Electron."},{"doi-asserted-by":"crossref","unstructured":"LeMay, M., Nelli, R., Gross, G., Gunter, C.A.: An integrated architecture for demand response communications and control. In: Proceedings of the 41st Annual Hawaii International Conference on System Sciences, pp. 174, 7\u201310 Jan 2008","key":"3_CR17","DOI":"10.1109\/HICSS.2008.60"},{"issue":"15","key":"3_CR18","doi-asserted-by":"publisher","first-page":"3604","DOI":"10.1016\/j.comnet.2011.07.010","volume":"55","author":"W Wang","year":"2011","unstructured":"Wang, W., Xu, Y., Khanna, M.: A survey on the communication architectures in smart grid. J. Comput. Netw. 55(15), 3604\u20133629 (2011)","journal-title":"J. Comput. Netw."},{"issue":"3","key":"3_CR19","doi-asserted-by":"publisher","first-page":"1482","DOI":"10.1109\/TPWRD.2006.886788","volume":"22","author":"TS Sidhu","year":"2007","unstructured":"Sidhu, T.S., Yin, Y.: Modelling and simulation for performance evaluation of IEC61850-based substation communication systems. IEEE Trans. Power Delivery 22(3), 1482\u20131489 (2007)","journal-title":"IEEE Trans. Power Delivery"},{"doi-asserted-by":"crossref","unstructured":"Kanabar, M.G., Sidhu, T.S.: Reliability and availability analysis of IEC 61850 based substation communication architectures. In: Power & Energy Society General Meeting, 2009. PES \u201809. IEEE, pp. 1\u20138, 26\u201330 July 2009","key":"3_CR20","DOI":"10.1109\/PES.2009.5276001"},{"issue":"4","key":"3_CR21","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1109\/TII.2011.2166794","volume":"7","author":"VC Gungor","year":"2011","unstructured":"Gungor, V.C., Sahin, D., Kocak, T., Ergut, S., Buccella, C., Cecati, C., Hancke, G.P.: Smart grid technologies: communication technologies and standards. IEEE Trans. Ind. Inf. 7(4), 529\u2013539 (2011)","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"5","key":"3_CR22","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MNET.2011.6033033","volume":"25","author":"A Zaballos","year":"2011","unstructured":"Zaballos, A., Vallejo, A., Selga, J.M.: Heterogeneous communication architecture for the smart grid. IEEE Netw. 25(5), 30\u201337 (2011)","journal-title":"IEEE Netw."},{"doi-asserted-by":"crossref","unstructured":"Zhang, R., Zhao, Z., Chen, X.: An overall reliability and security assessment architecture for electric power communication network in smart grid. In: 2010 International Conference on Power System Technology (POWERCON), pp. 1\u20136, 24\u201328 Oct 2010","key":"3_CR23","DOI":"10.1109\/POWERCON.2010.5666414"},{"issue":"1","key":"3_CR24","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/TSG.2010.2046346","volume":"1","author":"K Moslehi","year":"2010","unstructured":"Moslehi, K., Kumar, R.: A reliability perspective of the smart grid. IEEE Trans. Smart Grid 1(1), 57\u201364 (2010)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"3","key":"3_CR25","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MSP.2009.76","volume":"7","author":"P McDaniel","year":"2009","unstructured":"McDaniel, P., McLaughlin, S.: Security and privacy challenges in the smart grid. IEEE Secur. Priv. 7(3), 75\u201377 (2009)","journal-title":"IEEE Secur. Priv."},{"doi-asserted-by":"crossref","unstructured":"Venkitasubramaniam, P., Tong, L.: Anonymous networking with minimum latency in multihop networks. IEEE Symposium on Security and Privacy, 2008. SP 2008, pp. 18\u201332, 18\u201322 May 2008","key":"3_CR26","DOI":"10.1109\/SP.2008.18"},{"key":"3_CR27","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/35.667959","volume":"36","author":"B Doshi","year":"1998","unstructured":"Doshi, B., Harshavardhana, P.: Broadband network infrastructure of the future: roles of network design tools in technology deployment strategies. IEEE Commun. Mag. 36, 60\u201371 (1998)","journal-title":"IEEE Commun. Mag."},{"doi-asserted-by":"crossref","unstructured":"To, M., Neusy, P.: Unavailability analysis of long-haul networks. IEEE J. Sel. Areas Commun. 12, 100\u2013109 (1994)","key":"3_CR28","DOI":"10.1109\/49.265709"},{"unstructured":"Singel, R.: Fiber optic cable cuts isolate millions from internet, future cuts likely wired. http:\/\/www.wired.com\/threatlevel\/2008\/01\/fiber-optic-cab\/ (2008). Accessed January 2008","key":"3_CR29"},{"unstructured":"Hachman, M.: Sabotage suspected in silicon valley cable cut PCMag. http:\/\/www.pcmag.com\/article2\/0,2817,2344762,00.asp (2009) . Accessed 9 April 2009","key":"3_CR30"},{"unstructured":"Farley, J.: Bremerton fiber optic cable cut knocks out service for wave broadband customers. http:\/\/www.kitsapsun.com\/news\/2011\/jul\/06\/bremerton-fiber-optic-cable-cut-knocks-out-for\/#axzz36lWFNBmE(2011).","key":"3_CR31"},{"key":"3_CR32","first-page":"178","volume":"2005","author":"R Zhang-shen","year":"2005","unstructured":"Zhang-shen, R., Mckeown, N.: Designing a predictable internet backbone with valiant load-balancing. IWQoS 2005, 178\u2013192 (2005)","journal-title":"IWQoS"},{"key":"3_CR33","volume-title":"CCIE Professional Development Large-Scale IP Network Solutions","author":"K Raza","year":"1999","unstructured":"Raza, K., Turner, M.: CCIE Professional Development Large-Scale IP Network Solutions. Cisco Press, Indianapolis (1999)"},{"key":"3_CR34","doi-asserted-by":"publisher","DOI":"10.1002\/9780470253526","volume-title":"Network Infrastructure and Architecture: Designing High-Availability Networks","author":"K Iniewski","year":"2008","unstructured":"Iniewski, K., McCrosky, C., Minoli, D.: Network Infrastructure and Architecture: Designing High-Availability Networks. Wiley, New York (2008)"},{"unstructured":"Riaz, T.: SQoS based planning for network infrastructures. Ph.D. thesis (2008)","key":"3_CR35"},{"key":"3_CR36","volume-title":"Mesh-Based Survivable Networks, Options and Strategies for Optical, MPLS, SONET and ATM Network","author":"WD Grover","year":"2003","unstructured":"Grover, W.D.: Mesh-Based Survivable Networks, Options and Strategies for Optical, MPLS, SONET and ATM Network, vol. 1. Prentice Hall PTR, Upper Saddle River (2003)"},{"unstructured":"Ecobilan: FTTH solutions for a sustainable development (2008)","key":"3_CR37"},{"unstructured":"Madsen, O.B., Knudsen, T.P., Pedersen, J.M.: SQOS as the base for next generation global infrastructure. In: Proceedings of IT&T 2003, Information Technology and Telecommunications Annual Conference 2003, pp. 127\u2013136 (2003)","key":"3_CR38"},{"key":"3_CR39","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1109\/49.725185","volume":"16","author":"BV Caenegem","year":"1998","unstructured":"Caenegem, B.V., Parys, W.V., Turck, F.D., Demeester, P.: Dimensioning of survivable wdm networks. IEEE J. Sel. Areas in Commun. 16, 1146\u20131157 (1998)","journal-title":"IEEE J. Sel. Areas in Commun."},{"doi-asserted-by":"crossref","unstructured":"Gutierrez, J.M., Katrinis, K., Georgakilas, K., Tzanakaki, A., Madsen, O.B.: Increasing the cost-constrained availability of WDM networks with degree-3 structured topologies. In: 12th International Conference on Transparent Optical Networks (ICTON), 2010, pp. 1\u20134 (2010)","key":"3_CR40","DOI":"10.1109\/ICTON.2010.5548956"},{"key":"3_CR41","first-page":"114","volume":"1","author":"I Rados","year":"2007","unstructured":"Rados, I.: Availability analysis and comparison of different wdm systems. J. Telecommun. Inf. Technol. 1, 114\u2013119 (2007)","journal-title":"J. Telecommun. Inf. Technol."},{"key":"3_CR42","doi-asserted-by":"publisher","first-page":"1111","DOI":"10.1109\/JLT.2007.893037","volume":"25","author":"L Zhou","year":"2007","unstructured":"Zhou, L., Held, M., Sennhauser, U.: Connection availability analysis of shared backup path-protected mesh networks. J. Lightwave Technol. 25, 1111\u20131119 (2007)","journal-title":"J. Lightwave Technol."},{"key":"3_CR43","doi-asserted-by":"publisher","first-page":"1683","DOI":"10.1016\/j.comnet.2010.01.008","volume":"54","author":"G Booker","year":"2010","unstructured":"Booker, G., Sprintson, A., Zechman, E., Singh, C., Guikema, S.: Efficient traffic loss evaluation for transport backbone networks. Comput. Netw. 54, 1683\u20131691 (2010)","journal-title":"Comput. Netw."},{"doi-asserted-by":"crossref","unstructured":"He, W., Somani, A.K.: Path-based protection for surviving double-link failures in mesh-restorable optical networks. In: Proceedings of IEEE Globecom 2003 (2003)","key":"3_CR44","DOI":"10.1117\/12.475299"},{"doi-asserted-by":"crossref","unstructured":"Gutierrez, J.M., Riaz, T., Pedersen, J.M.: Cost and availability analysis of 2- and 3-connected WDM networks physical interconnection. In: Proceedings in ICNC 2012 (2012)","key":"3_CR45","DOI":"10.1109\/ICCNC.2012.6167420"},{"doi-asserted-by":"crossref","unstructured":"Hansen, M.B., Olsen, R.L., Schwefel, H.-P.: Probabilistic models for access strategies to dynamic information elements. Perform. Eval. 67(1), 43 (2010)","key":"3_CR46","DOI":"10.1016\/j.peva.2009.08.015"},{"doi-asserted-by":"crossref","unstructured":"Schwefel, H.-P., Hansen, M.B., Olsen, R.L.: Adaptive Caching strategies for Context Management systems, PIMRC07, Athens, Sept 2007","key":"3_CR47","DOI":"10.1109\/PIMRC.2007.4394813"},{"doi-asserted-by":"crossref","unstructured":"Shawky, A., Olsen, R., Pedersen, J., Schwefel, H.: Network Aware Dynamic Context Subscription Management, Computer Networks, vol. 58, pp. 239\u2013253. 15 January 2014, ISSN 1389-1286. http:\/\/dx.doi.org\/10.1016\/j.comnet.2013.10.006.","key":"3_CR48","DOI":"10.1016\/j.comnet.2013.10.006"},{"unstructured":"Hald, S.L.N., Pedersen, J.M.: The Threat of Digital Hacker Sabotage to Critical Infrastructure. Submitted for GIIS 2012 (2012)","key":"3_CR49"},{"unstructured":"Hald, S.L.N., Pedersen, J.M.: An updated taxonomy for characterizing hackers according to their threat properties. In: 14th International Conference on Advanced Communication Technology (ICACT) 2012, IEEE (2011). ISBN 978-8955191639","key":"3_CR50"},{"key":"3_CR51","volume-title":"Risk Management and Critical Infra-structure Protection: Assessing, Integrating, and Managing Threats, Vulnerabilities and Consequences","author":"J Moteff","year":"2005","unstructured":"Moteff, J.: Risk Management and Critical Infra-structure Protection: Assessing, Integrating, and Managing Threats, Vulnerabilities and Consequences. Congressional Research Service, Washington D.C. (2005)"},{"unstructured":"Devost, M.G.: Current and emerging threats to information technology systems and critical infra-structures. Glob. Bus. Brief. (2000)","key":"3_CR52"},{"unstructured":"The White House: The National Strategy to Secure Cyberspace, p. 5. The White House, Washington D.C. (2003)","key":"3_CR53"},{"key":"3_CR54","doi-asserted-by":"crossref","DOI":"10.21236\/ADA386280","volume-title":"Cyber Attacks During the War on Terrorism: A Predictive Analysis","author":"MA Vatis","year":"2001","unstructured":"Vatis, M.A.: Cyber Attacks During the War on Terrorism: A Predictive Analysis. Institute for Security, Dartmouth College, Hanover (2001)"},{"key":"3_CR55","volume-title":"Critical Infrastructure: Control Systems and the Terrorist Threat","author":"Dana A Shea","year":"2004","unstructured":"Shea, Dana A.: Critical Infrastructure: Control Systems and the Terrorist Threat. Congressional Research Service, Washington D.C. (2004).http:\/\/fas.org\/irp\/crs\/RL31534.pdf"},{"key":"3_CR56","doi-asserted-by":"publisher","DOI":"10.1002\/0471789542","volume-title":"Cybersecurity and Critical Infrastructure Protection","author":"James A Lewis","year":"2006","unstructured":"Lewis, James A.: Cybersecurity and Critical Infrastructure Protection. Center for Strategic and International Studies, Washington D.C. (2006)"},{"issue":"97\u2013102","key":"3_CR57","first-page":"2006","volume":"3","author":"M Rogers","year":"2006","unstructured":"Rogers, M.: A two-dimensional circumplex approach to the development of a hacker taxonomy. Digit. Investig. 3(97\u2013102), 2006 (2006)","journal-title":"Digit. Investig."},{"key":"3_CR58","volume-title":"Terrorist Capabilities for Cyberattack: Overview and Policy Issues","author":"J Rollins","year":"2007","unstructured":"Rollins, J., Wilson, C.: Terrorist Capabilities for Cyberattack: Overview and Policy Issues. Congressional Research Service, Washington D.C. (2007)"},{"unstructured":"Hunt, J.: Stuxnet, Security, and Taking Charge, Industrial Ethernet Book Issue 62\/53, IEB Media GbR, Germany (2011). ISSN 1470-5745","key":"3_CR59"},{"unstructured":"Eronen, J., Karjalainen, K., et al.: Software vulnerability vs. critical infrastructure\u2014a case study of antivirus software. Int. J. Adv. Secur. 2(1) (2009). ISSN 1942-2636 (International Academy, Research, and Industry Association)","key":"3_CR60"},{"key":"3_CR61","volume-title":"National Cybersecurity and Communications Integration Center Bulletin: Assessment of Anonymous Threat to Control Systems","author":"Department of Homeland Security","year":"2011","unstructured":"Department of Homeland Security: National Cybersecurity and Communications Integration Center Bulletin: Assessment of Anonymous Threat to Control Systems. Department of Homeland Security, Washington D.C. (2011)"},{"unstructured":"Anonymous, youranonnews: Available at https:\/\/twitter.com\/youranonnews\/status\/171941104860672000 (2012)","key":"3_CR62"},{"unstructured":"Antonatos, S., Akriditis, P., et al.: Defending Against Hitlist Worms Using Network Address Space Randomization, WORM \u201805, ACM 1-59593-229-1\/05\/0011, USA (2005)","key":"3_CR63"},{"unstructured":"Lai, S.-C., Kuo, W.-C., et al.: Defending against Internet worm-like infestations. In: Proceedings of the 18th International Conference on Advanced Information Networking and Application (AINA\u201904), ISSN 0-7695-2051-0\/04, IEEE (2004)","key":"3_CR64"},{"key":"3_CR65","volume-title":"Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors","author":"M Keeney","year":"2005","unstructured":"Keeney, M., Cappelli, D., et al.: Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors. United States Secret Service and Carnegie Mellon Software Engineering Institute, Washington D.C. (2005)"},{"unstructured":"Capelli, D., Moore, A., et al.: Common Sense Guide to Prevention and Detection of Insider Threats, 3rd edn. Version 3.1, Software Engineering Institute, Carnegie Mellon University (2009)","key":"3_CR66"},{"doi-asserted-by":"publisher","unstructured":"Hernandez, J.A., Phillips, I.W.: Weibull mixture model to characterise end-to-end Internet delay at coarse time-scales. IEE Proc. Commun. 153(2), 295\u2013304 (2006). doi:10.1049\/ip-com:20050335","key":"3_CR67","DOI":"10.1049\/ip-com:20050335"},{"doi-asserted-by":"crossref","unstructured":"Bolot, J.-C.: Characterizing end-to-end packet delay and loss in the Internet. J. High Speed Netw. IOS Press. ISSN 0926-6801 (Print), 1875-8940 (Online), Comput. Sci. Netw. Secur. 2(3), 305\u2013323 (1993)","key":"3_CR68","DOI":"10.3233\/JHS-1993-2307"},{"unstructured":"Bovy, C.J., Mertodimedjo, H.T., Hooghiemstra, G., Uijterwaal, H., Van Mieghem, P.: Analysis of end-to-end delay measurements in Internet. In: Proceedings of the Passive and Active Measurement Workshop-PAM 2002 (2002)","key":"3_CR69"},{"unstructured":"Klima-, Energi- og Bygningsministeriet, HOVEDRAPPORT for Smart Grid Netv\u00e6rkets arbejde, available online at http:\/\/www.kebmin.dk\/en","key":"3_CR70"},{"unstructured":"ECOGRID Bornholm: Official websitehttp:\/\/ecogridbornholm.dk\/","key":"3_CR71"}],"container-title":["Studies in Computational Intelligence","Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44160-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T16:25:11Z","timestamp":1746375911000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-44160-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,14]]},"ISBN":["9783662441596","9783662441602"],"references-count":71,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44160-2_3","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2014,9,14]]},"assertion":[{"value":"14 September 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}