{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T05:04:36Z","timestamp":1761973476667,"version":"build-2065373602"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2013,2,27]],"date-time":"2013-02-27T00:00:00Z","timestamp":1361923200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1007\/s12652-013-0179-6","type":"journal-article","created":{"date-parts":[[2013,2,26]],"date-time":"2013-02-26T07:52:11Z","timestamp":1361865131000},"page":"187-204","source":"Crossref","is-referenced-by-count":17,"title":["Model-driven risk analysis of evolving critical infrastructures"],"prefix":"10.1007","volume":"5","author":[{"given":"Bj\u00f8rnar","family":"Solhaug","sequence":"first","affiliation":[]},{"given":"Fredrik","family":"Seehusen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,2,27]]},"reference":[{"key":"179_CR1","unstructured":"Alberts CJ, Davey J (2004) OCTAVE criteria version 2.0. Technical report CMU\/SEI-2001-TR-016. Mellon University, Carnegie"},{"key":"179_CR2","doi-asserted-by":"crossref","first-page":"681","DOI":"10.1016\/j.jhazmat.2006.03.049","volume":"137","author":"T Aven","year":"2006","unstructured":"Aven T, Sklet S, Vinnem JE (2006) Barrier and operational risk analysis of hydrocarbon releases (BORA-Release). Part I. Method description. J Hazard Mater A 137:681\u2013691","journal-title":"J Hazard Mater A"},{"key":"179_CR3","unstructured":"Barber B, Davey J (1992) The use of the CCTA risk analysis and management methodology CRAMM in health information systems. In: 7th international congress on medical informatics (MEDINFO\u201992), North-Holland, pp 1589\u20131593"},{"key":"179_CR4","doi-asserted-by":"crossref","unstructured":"Ben-Gal I (2007) Bayesian networks. In: Ruggeri F, Kenett RS, Faltin FW (eds) Encyclopedia of statistics in quality and reliability. Wiley, New York","DOI":"10.1002\/9780470061572.eqr089"},{"issue":"10","key":"179_CR5","doi-asserted-by":"crossref","first-page":"1995","DOI":"10.1016\/j.jss.2010.05.069","volume":"83","author":"G Br\u00e6ndeland","year":"2010","unstructured":"Br\u00e6ndeland G, Refsdal A, St\u00f8len K (2010) Modular analysis and modelling of risk scenarios with dependencies. J Syst Softw 83(10):1995\u20132013","journal-title":"J Syst Softw"},{"issue":"1\u20132","key":"179_CR6","first-page":"12","volume":"3","author":"M Breu","year":"2011","unstructured":"Breu M, Breu R, L\u00f6w S (2011) MoVEing forward: towards an architecture and processes for a living models infrastructure. Int J Adv Life Sci 3(1\u20132):12\u201322","journal-title":"Int J Adv Life Sci"},{"issue":"3","key":"179_CR7","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/s12652-011-0055-1","volume":"2","author":"M Buchmayr","year":"2011","unstructured":"Buchmayr M, Kurschl W (2011) A survey on situation-aware ambient intelligence systems. J Ambient Intell Human Comput 2(3):175\u2013183","journal-title":"J Ambient Intell Human Comput"},{"issue":"3","key":"179_CR8","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s12652-011-0057-z","volume":"2","author":"R De Amicis","year":"2011","unstructured":"De Amicis R, Conti G, Piffer S, Prandi F (2011) Service oriented computing for Ambient Intelligence to support management of transport infrastructures. J Ambient Intell Human Comput 2(3):201\u2013211","journal-title":"J Ambient Intell Human Comput"},{"issue":"8","key":"179_CR9","doi-asserted-by":"crossref","first-page":"1372","DOI":"10.1016\/j.knosys.2011.06.011","volume":"24","author":"C De Maio","year":"2011","unstructured":"De Maio C, Fenza G, Gaeta M, Loia V, Orciuoli F (2011) A knowledge-based framework for emergency DSS. Knowl Based Syst 24(8):1372\u20131379","journal-title":"Knowl Based Syst"},{"key":"179_CR10","unstructured":"EU (2006) Communication from the Commission on a European programme for critical infrastructure protection. The European Commission, COM (2006) 786 final"},{"key":"179_CR11","unstructured":"EUROCONTROL (2003) Air traffic management strategy for the years 2000+"},{"key":"179_CR12","unstructured":"EUROCONTROL (2006) Methodology report for the 2005\/2012 integrated risk picture for Air Traffic Management in Europe. EUROCONTROL, EEC Technical\/Scientific Report No. 2006-041"},{"key":"179_CR13","doi-asserted-by":"crossref","unstructured":"Felici M, Meduri V, Solhaug B, Tedeschi A (2011) Evolutionary risk analysis: Expert judgment. In: 30th international conference on computer safety, reliability, and security (SAFECOMP\u201911), Springer, LNCS, 6894, pp 99\u2013112","DOI":"10.1007\/978-3-642-24270-0_8"},{"key":"179_CR14","unstructured":"Howard RA (1971) Dynamic probabilistic systems, vol I. Markov models. Wiley, New York"},{"issue":"3","key":"179_CR15","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1287\/deca.1050.0020","volume":"2","author":"A Howard R","year":"2005","unstructured":"Howard RA, Matheson JE (2005) Influence diagrams. Decis Anal 2(3):127\u2013143","journal-title":"Decis Anal"},{"key":"179_CR16","unstructured":"IEC (1990) IEC 61025 Fault Tree Analysis (FTA). International Electrotechnical Commission"},{"key":"179_CR17","unstructured":"IEC (1995) IEC 61165 Application of Markov Techniques. International Electrotechnical Commission"},{"key":"179_CR18","unstructured":"Innerhofer-Oberperfler F, Breu R (2006) Using an enterprise architecture for IT risk management. In: Information Security South Africa conference (ISSA\u201906)"},{"key":"179_CR19","unstructured":"ISO (2009) ISO 31000 Risk management\u2014principles and guidelines. International Organization for Standardization"},{"key":"179_CR20","doi-asserted-by":"crossref","unstructured":"Ligaarden OS, Lund MS, Refsdal A, Seehusen F, St\u00f8len K (2011) An architectural pattern for enterprise level monitoring tools. In: Maintenance and evolution of service-oriented and cloud-based systems (MESOCA\u201911). IEEE Computer Society, pp 1\u201310","DOI":"10.1109\/MESOCA.2011.6049035"},{"key":"179_CR21","doi-asserted-by":"crossref","unstructured":"Ligaarden OS, Refsdal A, St\u00f8len K (2012) Using indicators to monitor security risk in systems of systems: How to capture and measure the impact of service dependencies on the security of provided services. In: IT Security Governance Innovations: Theory and Research, IGI Global, pp 256\u2013292","DOI":"10.4018\/978-1-4666-2083-4.ch010"},{"key":"179_CR22","unstructured":"Lund MS, Refsdal A (2013) BRIDGE risk analyzer: a collaborative tool for enhanced risk analysis in crisis situations. In: Proceedings of the international workshop on AmI for Crisis Management, CEUR Workshop Proceedings (to appear)"},{"issue":"5","key":"179_CR23","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MC.2010.134","volume":"43","author":"S Lund M","year":"2010","unstructured":"Lund MS, Solhaug B, St\u00f8len K (2010) Evolution in relation to risk and trust management. Computer 43(5):49\u201355","journal-title":"Computer"},{"key":"179_CR24","doi-asserted-by":"crossref","unstructured":"Lund MS, Solhaug B, St\u00f8len K (2011a) Model-driven risk analysis\u2014the CORAS approach. Springer, Berlin","DOI":"10.1007\/978-3-642-12323-8"},{"key":"179_CR25","doi-asserted-by":"crossref","unstructured":"Lund MS, Solhaug B, St\u00f8len K (2011b) Risk analysis of changing and evolving systems using CORAS. In: Foundations of Security Analysis and Design VI (FOSAD VI), Springer, LNCS 6858, pp 231\u2013274","DOI":"10.1007\/978-3-642-23082-0_9"},{"key":"179_CR26","doi-asserted-by":"crossref","unstructured":"Massacci F, Mylopoulos J, Zannone N (2010) Security requirements engineering: the SI* modeling language and the secure tropos methodology. In: Advances in intelligent information systems, studies in computational intelligence, vol 265, pp 147\u2013174","DOI":"10.1007\/978-3-642-05183-8_6"},{"key":"179_CR27","unstructured":"Microsoft (2006) The security risk management guide. Microsoft Solutions for Security and Compliance and Microsoft Security Center of Excellence"},{"key":"179_CR28","unstructured":"OMG (2009) OMG Unified Modeling Language (OMG UML), Superstructure. Version 2.2. Object Management Group, OMG Document: formal\/2009-02-02"},{"key":"179_CR29","unstructured":"OMG (2011a) Business process model and notation (BPMN). Version 2.0. Object Management Group, OMG Document: formal\/2011-01-03"},{"key":"179_CR30","unstructured":"OMG (2011b) Meta object facility (MOF) 2.0 Query\/View\/Transformation Specification. Version 1.1. Object Management Group, OMG Document: formal\/2011-01-01"},{"key":"179_CR31","doi-asserted-by":"crossref","unstructured":"Peltier TR (2005) Information security risk analysis, 2nd edn. Auerbach Publications","DOI":"10.1201\/9781420031195"},{"key":"179_CR32","doi-asserted-by":"crossref","unstructured":"Refsdal A, St\u00f8len K (2009) Employing key indicators to provide a dynamic risk picture with a notion of confidence. In: Trust management III. IFIP advances in information and communication technology, vol 300. Springer, Berlin, pp 215\u2013233","DOI":"10.1007\/978-3-642-02056-8_14"},{"key":"179_CR33","unstructured":"SecureChange (2011a) Assessment method. SecureChange project deliverable D5.3"},{"key":"179_CR34","unstructured":"SecureChange (2011b) Integrability of design modelling solution. SecureChange project deliverable D4.4b"},{"key":"179_CR35","unstructured":"SecureChange (2012) Report on the industrial validation of SecureChange solutions. SecureChange project deliverable D1.3"},{"key":"179_CR36","doi-asserted-by":"crossref","unstructured":"Seehusen F, Solhaug B (2012) Tool-supported risk modeling and analysis of evolving critical infrastructures. In: Multidisciplinary research and practice for information systems (CD-ARES 2012), Springer, LNCS 7465, pp 562\u2013577","DOI":"10.1007\/978-3-642-32498-7_43"},{"key":"179_CR37","doi-asserted-by":"crossref","unstructured":"Voirin JL (2008) Method and tools for constrained system architecting. In: 18th annual international symposium of the international council on systems engineering (INCOSE\u201908). Curran Associates, Inc., pp 775\u2013789","DOI":"10.1002\/j.2334-5837.2008.tb00857.x"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-013-0179-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-013-0179-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-013-0179-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T03:45:10Z","timestamp":1562730310000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-013-0179-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2,27]]},"references-count":37,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,4]]}},"alternative-id":["179"],"URL":"https:\/\/doi.org\/10.1007\/s12652-013-0179-6","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"type":"print","value":"1868-5137"},{"type":"electronic","value":"1868-5145"}],"subject":[],"published":{"date-parts":[[2013,2,27]]}}}