{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:05:21Z","timestamp":1729631121104,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1109\/crisis.2011.6061545","type":"proceedings-article","created":{"date-parts":[[2011,11,1]],"date-time":"2011-11-01T16:59:49Z","timestamp":1320166789000},"page":"1-7","source":"Crossref","is-referenced-by-count":5,"title":["Trust based interdependency weighting for on-line risk monitoring in interdependent critical infrastructures"],"prefix":"10.1109","author":[{"given":"Filipe","family":"Caldeira","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Schaberreiter","sequence":"additional","affiliation":[]},{"given":"Edmundo","family":"Monteiro","sequence":"additional","affiliation":[]},{"given":"Jocelyn","family":"Aubert","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Simoes","sequence":"additional","affiliation":[]},{"given":"Djamel","family":"Khadraoui","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2009.17"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-007-0049-9"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-004-0041-5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/EBISS.2009.5137931"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CNMT.2009.5374739"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1362542.1362546"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1109\/MICCCA.2008.4669859","article-title":"Bnwsn: Bayesian network trust model for wireless sensor networks","author":"momani","year":"2008","journal-title":"Communications Computers and Applications 2008 MIC-CCA 2008 Mosharaka International Conference on"},{"key":"ref18","first-page":"511","article-title":"Trust models for sensor networks","volume":"2","author":"zahariadis","year":"2008","journal-title":"ELMAR 2008 50th International Symposium"},{"key":"ref19","article-title":"Trust and reputation for information exchange in critical infrastructures","author":"caldeira","year":"2010","journal-title":"5th Int Conf on Critical Infrastructures Information Security (CRITIS 2010)"},{"key":"ref4","article-title":"An approach to model complex interdependent infrastructures","author":"panzieri","year":"2005","journal-title":"cISIA Critical Infrastructures"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ANSS-41.2008.31"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2009.02.001"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIAS.2006.295318"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2007.03.002"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1111\/0272-4332.00020"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2004.1265180"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/37.969131"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCEE.2009.77"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2010.038282"},{"key":"ref22","article-title":"Real-time security monitoring of interdependent services in critical infrastructures. case study of a risk-based approach","author":"aubert","year":"2010","journal-title":"21th European Safety and Reliability Conference (ESREL2010)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2010.102"},{"key":"ref24","article-title":"Micie - tool for systemic risk analysis and secure mediation of data ex-changed across linked ci information infrastructures","author":"micie","year":"2008","journal-title":"FP7-ICT-SEC-2007 1 7&#x2013;225353&#x2013; Annex I &#x2013; &#x201C;Descrition of Work&#x201D;"},{"key":"ref23","article-title":"Support tool development for real-time risk prediction in interdependent critical infrastructures","author":"schaberreiter","year":"2010","journal-title":"Risk and Trust in Extended Enterprises (RTEE2010) Workshop ISSRE Wksp 2010 IEEE International Symposium on Sofware Reliability Engineering"}],"event":{"name":"2011 6th International Conference on Risks and Security of Internet and Systems (CRiSIS)","start":{"date-parts":[[2011,9,26]]},"location":"Timisoara, Romania","end":{"date-parts":[[2011,9,28]]}},"container-title":["2011 6th International Conference on Risks and Security of Internet and Systems (CRiSIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6051620\/6061543\/06061545.pdf?arnumber=6061545","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T04:56:14Z","timestamp":1497934574000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6061545\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/crisis.2011.6061545","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]}}}