{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T21:07:03Z","timestamp":1769375223672,"version":"3.49.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/crisis.2009.5411974","type":"proceedings-article","created":{"date-parts":[[2010,2,17]],"date-time":"2010-02-17T13:30:04Z","timestamp":1266413404000},"page":"90-97","source":"Crossref","is-referenced-by-count":8,"title":["Risk analysis via heterogeneous models of SCADA interconnecting Power Grids and Telco networks"],"prefix":"10.1109","author":[{"given":"A.","family":"Bobbio","sequence":"first","affiliation":[]},{"given":"E.","family":"Ciancamerla","sequence":"additional","affiliation":[]},{"given":"S.","family":"Di Blasi","sequence":"additional","affiliation":[]},{"given":"A.","family":"Iacomini","sequence":"additional","affiliation":[]},{"given":"F.","family":"Mari","sequence":"additional","affiliation":[]},{"given":"I.","family":"Melatti","sequence":"additional","affiliation":[]},{"given":"M.","family":"Minichino","sequence":"additional","affiliation":[]},{"given":"A.","family":"Scarlatti","sequence":"additional","affiliation":[]},{"given":"E.","family":"Tronci","sequence":"additional","affiliation":[]},{"given":"R.","family":"Terruggia","sequence":"additional","affiliation":[]},{"given":"E.","family":"Zendri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","year":"0"},{"key":"ref11","article-title":"Exploiting stochastic indicators of interdependent infrastructures: the service availability of interconnected networks-Safety, Reliability and Risk Analysis: Theory, Methods and Applications","volume":"3","author":"bonanni","year":"2009"},{"key":"ref12","year":"0","journal-title":"Guidelines"},{"key":"ref13","year":"0"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WTS.2007.4563316"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/RAMS.2009.4914643"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008699807402"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/310889.310919"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/167088.167286"},{"key":"ref8","article-title":"Theory of Linear and Integer Programming","author":"schrijver","year":"1998"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/0895-7177(93)90236-R"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2007.898572"},{"key":"ref1","article-title":"Network Flows: Theory, Algorithms and Applications","author":"ahuja","year":"1993"},{"key":"ref9","year":"0"}],"event":{"name":"2009 Fourth International Conference on Risks and Security of Internet and Systems (CRiSIS 2009)","location":"Toulouse, France","start":{"date-parts":[[2009,10,19]]},"end":{"date-parts":[[2009,10,22]]}},"container-title":["2009 Fourth International Conference on Risks and Security of Internet and Systems (CRiSIS 2009)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5405769\/5411964\/05411974.pdf?arnumber=5411974","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T16:16:38Z","timestamp":1614269798000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5411974\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/crisis.2009.5411974","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}