{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:16:57Z","timestamp":1743117417249,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":46,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662448595"},{"type":"electronic","value":"9783662448601"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44860-1_8","type":"book-chapter","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T15:10:05Z","timestamp":1412089805000},"page":"135-150","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Simulation-Based Cyber-Attack Assessment of Critical Infrastructures"],"prefix":"10.1007","author":[{"given":"Marlies","family":"Rybnicek","sequence":"first","affiliation":[]},{"given":"Simon","family":"Tjoa","sequence":"additional","affiliation":[]},{"given":"Rainer","family":"Poisel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,1]]},"reference":[{"key":"8_CR1","unstructured":"Mansfield, N.: Development of policies for protection of critical information infrastructures. Technical report, Organisation for Economic Co-operation and Development (OECD) (2007)"},{"key":"8_CR2","unstructured":"German Federal Office for Information Security: Recommendations for critical information infrastructure protection (2013)"},{"key":"8_CR3","unstructured":"Symantec: Symantec intelligence quarterly report: Q4 2010 - targeted attacks on critical infrastructure. Technical report, Symantec (2010)"},{"key":"8_CR4","unstructured":"Mandiant: Mandiant intelligence center report - apt1: Exposing one of china\u2019s cyber espionage units. Technical report, Mandiant (2013)"},{"key":"8_CR5","unstructured":"Public Safety Canada: Ontario-U.S. power outage - impacts on critical infrastructure (2006). http:\/\/www.publicsafety.gc.ca\/prg\/em\/ia06-002-eng.aspx. Accessed: 16 May 2012"},{"key":"8_CR6","unstructured":"Centre for Natural Hazard Research: Types of hazards. http:\/\/www.sfu.ca\/cnhr\/types.html. Accessed: 16 May 2012"},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1016\/j.ssci.2006.07.007","volume":"45","author":"T Hellstr\u00f6m","year":"2007","unstructured":"Hellstr\u00f6m, T.: Critical infrastructure and systemic vulnerability: towards a planning frame. Saf. Sci. 45, 415\u2013430 (2007)","journal-title":"Saf. Sci."},{"issue":"1","key":"8_CR8","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1080\/07408170600940005","volume":"39","author":"H Min","year":"2007","unstructured":"Min, H., Beyeler, W., Brown, T., Son, Y., Jones, A.: Toward modeling and simulation of critical national infrastructure interdependencies. IIE Trans. 39(1), 57\u201371 (2007)","journal-title":"IIE Trans."},{"key":"8_CR9","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/37.969131","volume":"21","author":"SM Rinaldi","year":"2001","unstructured":"Rinaldi, S.M., Peerenboom, J.P., Kelly, T.K.: Identifying, understanding and analyzing critical infrastructure inderdependencies. IEEE Control Syst. Mag. 21, 11\u201325 (2001)","journal-title":"IEEE Control Syst. Mag."},{"key":"8_CR10","unstructured":"Potter, C., Waterfall, G.: Information security breaches survey 2012. Technical report, PwC (2012)"},{"key":"8_CR11","unstructured":"Cornish, P., Livingstone, D., Clemente, D., Yorke, C.: Cyber security and the uk\u2019s critical national infrastructure. Technical report, Chatham House (2011)"},{"key":"8_CR12","unstructured":"Baker, S., Filipiak, N., Timlin, K.: In the dark - crucial industries confront cyberattacks. Technical report, McAfee - Center for Strategic International Studies (2011)"},{"key":"8_CR13","unstructured":"Obama, B.: Taking the cyberattack threat seriously (July 2012)"},{"key":"8_CR14","unstructured":"Hackmageddon.com (2013). http:\/\/hackmageddon.com\/2012-cyber-attacks-statistics-master-index\/. Accessed: 20 February 2013"},{"key":"8_CR15","unstructured":"CERT CC: Denial of Service Attacks (1999). http:\/\/www.cert.org\/tech_tips\/denial_of_service.html. Accessed: 20 February 2013"},{"key":"8_CR16","unstructured":"George Mason University: The CIP Report, August 2010. http:\/\/cip.gmu.edu\/archive\/CIPHS_TheCIPReport_August2010_CIPHSUpdate.pdf. Accessed: 16 May 2012"},{"issue":"1","key":"8_CR17","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1111\/j.1468-5973.2007.00504.x","volume":"15","author":"A Boin","year":"2007","unstructured":"Boin, A., McConnell, A.: Preparing for critical infrastructure breakdowns: the limits of crisis management and the need for resilience. J. Contingencies Crisis Manage. 15(1), 50\u201359 (2007)","journal-title":"J. Contingencies Crisis Manage."},{"key":"8_CR18","unstructured":"Moteff, J., Parfomak, P.: CRS Report for Congress - Critical Infrastructure and Key Assets: Definition and Identification. Technical report, Congressional Research Service (2004). Accessed: 16 May 2012"},{"key":"8_CR19","volume-title":"CISSP All-in-One Exam Guide","author":"S Harris","year":"2010","unstructured":"Harris, S.: CISSP All-in-One Exam Guide, 5th edn. Mcgraw-Hill Professional, New York (2010)","edition":"5"},{"key":"8_CR20","unstructured":"ISO\/IEC: ISO\/IEC 27002:2005 Information technology - Security techniques - Code of practice for information security management (2005)"},{"key":"8_CR21","unstructured":"Laprie, J.C.: Dependable computing: concepts, limits, challenges. In: 25th IEEE International Symposium on Fault-Tolerant Computing, Pasadena, CA, USA, pp. 42\u201354. IEEE (1995)"},{"key":"8_CR22","first-page":"7","volume":"1145","author":"A Avizienis","year":"2001","unstructured":"Avizienis, A., Laprie, J.C., Randell, B.: Fundamental concepts of dependability. Seven 1145, 7\u201312 (2001)","journal-title":"Seven"},{"issue":"1","key":"8_CR23","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A Avizienis","year":"2004","unstructured":"Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable Secure Comput. 1(1), 11\u201333 (2004)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"8_CR24","unstructured":"Sherwood, J., Clark, A., Lynas, D.: Enterprise security architecture. Technical report, SABSA Institute (2009)"},{"key":"8_CR25","doi-asserted-by":"crossref","DOI":"10.1201\/b17776","volume-title":"Enterprise Security Architecture: A Business-Driven Approach","author":"J Sherwood","year":"2005","unstructured":"Sherwood, J., Clark, A., Lynas, D.: Enterprise Security Architecture: A Business-Driven Approach. CRC Press, San Francisco (2005)"},{"key":"8_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/978-3-540-88387-6_22","volume-title":"Automated Technology for Verification and Analysis","author":"E Bursztein","year":"2008","unstructured":"Bursztein, E.: NetQi: a model checker for anticipation game. In: Cha, S.S., Choi, J.-Y., Kim, M., Lee, I., Viswanathan, M. (eds.) ATVA 2008. LNCS, vol. 5311, pp. 246\u2013251. Springer, Heidelberg (2008)"},{"key":"8_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/978-3-642-01465-9_18","volume-title":"Formal Aspects in Security and Trust","author":"E Bursztein","year":"2009","unstructured":"Bursztein, E.: Extending anticipation games with location, penalty and timeline. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol. 5491, pp. 272\u2013286. Springer, Heidelberg (2009)"},{"key":"8_CR28","unstructured":"Bursztein, E.: Multiple-sites defense strategy. Technical report, LSV, ENS Cachan, CNRS (2009)"},{"key":"8_CR29","unstructured":"BSI-Standard 100\u20134: Business Continuity Management (2008)"},{"issue":"3","key":"8_CR30","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1057\/jos.2010.3","volume":"4","author":"CM Macal","year":"2010","unstructured":"Macal, C.M., North, M.J.: Tutorial on agent-based modelling and simulation. J. Simul. 4(3), 151\u2013162 (2010)","journal-title":"J. Simul."},{"key":"8_CR31","first-page":"57","volume":"501","author":"R Allan","year":"2009","unstructured":"Allan, R.: Survey of agent based modelling and simulation tools. Engineering 501, 57\u201372 (2009)","journal-title":"Engineering"},{"key":"8_CR32","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.ijcip.2008.08.001","volume":"1","author":"D Liu","year":"2008","unstructured":"Liu, D., Wang, X., Camp, L.J.: Game theoretic modeling and analysis of insider threats. Int. J. Crit. Infrastruct. Prot. 1, 75\u201380 (2008)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"8_CR33","doi-asserted-by":"crossref","unstructured":"Grossklags, J., Christin, N., Chuang, J.: Secure or insure?: a game-theoretic analysis of information security games. In: Proceedings of the 17th International Conference on World Wide Web, pp. 209\u2013218. ACM (2008)","DOI":"10.1145\/1367497.1367526"},{"key":"8_CR34","doi-asserted-by":"crossref","unstructured":"Boehmer, W.: Dynamic systems approach to analyzing event risks and behavioral risks with game theory. In: 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third International Conference on Social Computing (SocialCom), pp. 1231\u20131238 (2011)","DOI":"10.1109\/PASSAT\/SocialCom.2011.228"},{"key":"8_CR35","unstructured":"Specht, S., Lee, R.: Distributed denial of service: taxonomies of attacks, tools, and countermeasures. In: Proceedings of the 17th International Conference on Parallel and Distributed Computing Systems, pp. 543\u2013550 (2004)"},{"issue":"2","key":"8_CR36","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J Mirkovic","year":"2004","unstructured":"Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechanisms. SIGCOMM Comput. Commun. Rev. 34(2), 39\u201353 (2004)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"8_CR37","unstructured":"Gottwald, S.: Studyon critical dependencies of energy, finance and transportinfrastructures on ict infrastructure. Technical report, European Commission (2009)"},{"key":"8_CR38","unstructured":"OpenL Tablets: Business Friendly Rules (2013). http:\/\/openl-tablets.sourceforge.net\/. Accessed: 14 March 2013"},{"issue":"7","key":"8_CR39","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1177\/0037549705058073","volume":"82","author":"S Luke","year":"2005","unstructured":"Luke, S., Cioffi-Revilla, C., Panait, L., Sullivan, K., Balan, G.: MASON: a multi-agent simulation environment. Trans. Soc. Model. Simul. Int. 82(7), 517\u2013527 (2005)","journal-title":"Trans. Soc. Model. Simul. Int."},{"key":"8_CR40","unstructured":"George Mason University: MASON (2012). http:\/\/cs.gmu.edu\/eclab\/projects\/mason\/. Accessed: 26 July 2012"},{"key":"8_CR41","unstructured":"Luke, S.: Multiagent simulation and the MASON library, August 2011. http:\/\/cs.gmu.edu\/eclab\/projects\/mason\/manual.pdf"},{"key":"8_CR42","unstructured":"Naveh, B.: Contributors: JGraphT (2013). http:\/\/jgrapht.org\/. Accessed: 15 March 2013"},{"key":"8_CR43","unstructured":"Refractions Research: PostGIS, March 2013. http:\/\/www.postgis.org\/. Accessed: 15 March 2013"},{"key":"8_CR44","unstructured":"mcobject: Perst - an open source, object-oriented embedded database, March 2013. http:\/\/www.mcobject.com\/perst. Accessed: 15 March 2013"},{"key":"8_CR45","unstructured":"Object Refinery Limited: JFreeChart (2013). http:\/\/www.jfree.org\/. Accessed: 15 March 2013"},{"key":"8_CR46","unstructured":"JasperSoft: iReport Desinger (2013). http:\/\/community.jaspersoft.com\/project\/ireport-designer. Accessed: 15 March 2013"}],"container-title":["Lecture Notes in Business Information Processing","Enterprise and Organizational Modeling and Simulation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44860-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T08:48:00Z","timestamp":1674895680000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-44860-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662448595","9783662448601"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44860-1_8","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"1 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}