{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T15:06:35Z","timestamp":1764601595830,"version":"3.41.2"},"reference-count":25,"publisher":"Emerald","issue":"10","license":[{"start":{"date-parts":[[2012,10,12]],"date-time":"2012-10-12T00:00:00Z","timestamp":1350000000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.emeraldinsight.com\/page\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Kybernetes"],"published-print":{"date-parts":[[2012,10,12]]},"DOI":"10.1108\/03684921211276666","type":"journal-article","created":{"date-parts":[[2013,3,25]],"date-time":"2013-03-25T12:36:54Z","timestamp":1364215014000},"page":"1440-1461","source":"Crossref","is-referenced-by-count":5,"title":["Reliable facility location problem considering facility failure scenarios"],"prefix":"10.1108","volume":"41","author":[{"given":"Min","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jun","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Jian\u2010ming","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"b17","doi-asserted-by":"publisher","DOI":"10.1287\/opre.1060.0348"},{"key":"b19","doi-asserted-by":"publisher","DOI":"10.1111\/j.1475-3995.2009.00660.x"},{"key":"b23","doi-asserted-by":"publisher","DOI":"10.1111\/j.1538-4632.2007.00698.x"},{"key":"b16","doi-asserted-by":"publisher","DOI":"10.1287\/opre.1090.0801"},{"key":"b14","doi-asserted-by":"publisher","DOI":"10.1057\/jors.1987.88"},{"key":"b22","doi-asserted-by":"publisher","DOI":"10.1137\/0913069"},{"key":"b1","unstructured":"He, W.J. (2004), \u201cThe anthrax events of deliberate spreading in the US postal system\u201d,Journal of Environmental & Occupational Medicine, Vol. 21 No. 4, pp. 269\u201070."},{"key":"b2","unstructured":"Li, D., Yan, X.T. and Kuang, X.H. (2010), \u201cLocation model for military logistics distribution centres considering facilities failure\u201d,Computer Engineering and Applications, Vol. 46 No. 11, pp. 3\u20106."},{"key":"b21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2010.06.002"},{"key":"b20","doi-asserted-by":"publisher","DOI":"10.1108\/03684920410514139"},{"key":"b29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2006.09.029"},{"key":"b18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2010.08.030"},{"key":"b26","doi-asserted-by":"publisher","DOI":"10.1016\/S0098-1354(98)00267-1"},{"key":"b24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2006.09.019"},{"key":"b30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2007.05.027"},{"key":"b11","doi-asserted-by":"publisher","DOI":"10.1108\/09574090110806262"},{"key":"b10","unstructured":"Simchi\u2010Levi, D., Snyder, L.V. and Watson, M. (2002), \u201cStrategies for uncertain times\u201d,Supply Chain Management Rev., Vol. 6 No. 1, pp. 11\u201012."},{"key":"b15","doi-asserted-by":"publisher","DOI":"10.1287\/trsc.1040.0107"},{"key":"b28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2007.04.003"},{"key":"b12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2008.02.013"},{"key":"b7","doi-asserted-by":"crossref","unstructured":"Wu, D. and Olson, D.L. (2009a), \u201cEnterprise risk management: small business scorecard analysis\u201d,Production Planning & Control, Vol. 120 No. 4, pp. 269\u2010362.","DOI":"10.1080\/09537280902843706"},{"key":"b8","doi-asserted-by":"publisher","DOI":"10.1080\/10807030902760967"},{"key":"b6","doi-asserted-by":"publisher","DOI":"10.1057\/jors.2008.144"},{"key":"b13","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2010.01432.x"},{"key":"b3","doi-asserted-by":"publisher","DOI":"10.1504\/IJSSCI.2009.024940"}],"container-title":["Kybernetes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/03684921211276666","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full\/10.1108\/03684921211276666","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:27:43Z","timestamp":1753399663000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/k\/article\/41\/10\/1440-1461\/273265"}},"subtitle":[],"editor":[{"given":"Desheng","family":"Dash Wu","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2012,10,12]]},"references-count":25,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2012,10,12]]}},"alternative-id":["10.1108\/03684921211276666"],"URL":"https:\/\/doi.org\/10.1108\/03684921211276666","relation":{},"ISSN":["0368-492X"],"issn-type":[{"type":"print","value":"0368-492X"}],"subject":[],"published":{"date-parts":[[2012,10,12]]}}}