{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:10:49Z","timestamp":1729613449997,"version":"3.28.0"},"reference-count":54,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/eurocon.2017.8011182","type":"proceedings-article","created":{"date-parts":[[2017,8,17]],"date-time":"2017-08-17T20:26:04Z","timestamp":1503001564000},"page":"599-604","source":"Crossref","is-referenced-by-count":5,"title":["Critical appraisal of tools and methodologies for studies of cascading failures in coupled critical infrastructure systems"],"prefix":"10.1109","author":[{"given":"Yushi","family":"Chen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jovica V.","family":"Milanovic","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"journal-title":"Comparative Evaluation of Modeling and Simulation Techniques for Interdependent Critical Infrastructures","year":"2008","author":"eusgeld","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/5.24143"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s11069-015-1814-7"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1111\/1746-692X.12081"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.trb.2010.10.001"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511975356.005"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(00)00292-7"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.trb.2014.04.008"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.2202\/1554-8597.1161"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1186\/s40551-015-0010-y"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1080\/09535310701328567"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/0954-349X(95)00018-I"},{"key":"ref29","volume":"1","author":"adams","year":"2013","journal-title":"Handbook of Computable General Equilibrium Modeling"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/106307301753430764"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2004.1265180"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2010.06.011"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)1076-0342(2005)11:2(67)"},{"key":"ref21","first-page":"1","volume":"7","author":"haimes","year":"2001","journal-title":"leontief-based model of risk in complex interconnected infrastructrues"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2011.09.003"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1080\/09535314.2013.872602"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/EnergyTech.2011.5948516"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2010.05.001"},{"journal-title":"Using dynamic Bayesian networks for investigating the mpacts of extreme events","year":"2012","author":"jha","key":"ref50"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2014.07.042"},{"journal-title":"Critical infrastructure protection and resilience literature survey modeling and simulation","year":"2014","author":"wiseman","key":"ref54"},{"key":"ref53","first-page":"1","author":"utne","year":"2013","journal-title":"A brief overview of some methods and approaches for investigating interdependencies in critical infrastructures"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.egypro.2015.11.757"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2013.66"},{"key":"ref11","first-page":"223","article-title":"Identifying critical infrastructure clusters via spectral analysis","author":"foglietta","year":"2015","journal-title":"Stud Comput In tell"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.07.137"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2013.06.040"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/en8099211"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1038\/nature08932"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2015.10.019"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.105.048701"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2011.06.002"},{"key":"ref18","first-page":"318","article-title":"An initial model for complex dynamics in electric power system blackouts","volume":"0","author":"dobson","year":"2003","journal-title":"36th Annu Hawaii Int Conf Syst Sci 2003 Proc"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"814","DOI":"10.1109\/TPWRS.2009.2016521","article-title":"An improved OPA model and blackout risk assessment","volume":"24","author":"mei","year":"2009","journal-title":"IEEE Trans Power Syst"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48737-3_14"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/PSC.2016.7462833"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2013.6632721"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1504\/IJCIS.2004.003800"},{"key":"ref8","article-title":"Vulnerability, interdependencies and risk analysis of coupled infrastructures: power distribution network and ICT","author":"libardo","year":"2013","journal-title":"Univ Grenoble Alpes"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2005.1574234"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/MED.2011.5983016"},{"key":"ref9","first-page":"31","article-title":"Federated agent-based modeling and simulation approach to study interdependencies in IT critical nfrastructures","author":"casalicchio","year":"2007","journal-title":"Proc -IEEE Int Symp Distrib Simul Real-Time Appl DS-RT"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2190695"},{"journal-title":"Bayesian Networks An Introduction","year":"2011","author":"koski","key":"ref45"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31519-0_13"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-01460-9_3"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2012.01.003"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2006.12.009"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11405-2_1"},{"journal-title":"Kendalls advanced theory of statistics-volume I distribution theory ew York Wiley","year":"2001","author":"stuard","key":"ref43"}],"event":{"name":"IEEE EUROCON 2017 -17th International Conference on Smart Technologies","start":{"date-parts":[[2017,7,6]]},"location":"Ohrid, Macedonia","end":{"date-parts":[[2017,7,8]]}},"container-title":["IEEE EUROCON 2017 -17th International Conference on Smart Technologies"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8004574\/8011054\/08011182.pdf?arnumber=8011182","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T14:28:53Z","timestamp":1570026533000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8011182\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":54,"URL":"https:\/\/doi.org\/10.1109\/eurocon.2017.8011182","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}