{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T13:54:47Z","timestamp":1761486887885,"version":"3.40.3"},"reference-count":18,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Syst., Man, Cybern. A"],"published-print":{"date-parts":[[2002,3]]},"DOI":"10.1109\/tsmca.2002.1021113","type":"journal-article","created":{"date-parts":[[2002,11,7]],"date-time":"2002-11-07T19:41:04Z","timestamp":1036698064000},"page":"260-268","source":"Crossref","is-referenced-by-count":18,"title":["A holistic roadmap for survivable infrastructure systems"],"prefix":"10.1109","volume":"32","author":[{"given":"T.A.","family":"Longstaff","sequence":"first","affiliation":[]},{"given":"Y.Y.","family":"Haimes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"volume-title":"The Boundaryless Organization: Breaking the Chains of Organizational Structure","year":"1995","author":"Ashkenas","key":"ref1"},{"issue":"1","key":"ref2","first-page":"15","article-title":"Knowledge management and the intelligence community","volume":"9","author":"Brooks","year":"2000","journal-title":"Defense Intell. J."},{"volume-title":"Multiobjective Decision Making: Theory and Methodology","year":"1983","author":"Chankong","key":"ref3"},{"volume-title":"Built to Last","year":"1994","author":"Collins","key":"ref4"},{"volume-title":"Working Knowledge: How Organizations Manage What They Know","year":"1998","author":"Davenport","key":"ref5"},{"volume-title":"Managing Quality","year":"1988","author":"Garvin","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1981.4308759"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.1991.tb00589.x"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/9780470422489"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)1076-0342(1998)4:4(164)"},{"issue":"2","key":"ref11","first-page":"381","article-title":"Risk filtering, ranking, and management","volume":"22","author":"Haimes","year":"2002","journal-title":"Risk Anal. Int. J."},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.1981.tb01350.x"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1111\/0272-4332.215153"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/2.889092"},{"volume-title":"Of Acceptable Risk","year":"1976","author":"Lowrance","key":"ref15"},{"journal-title":"Critical Foundations: Protecting America\u2019s Infrastructures","year":"1997","author":"(PCCIP)","key":"ref16"},{"volume-title":"Intellectual Capital: The New Wealth of Organizations","year":"1997","author":"Stewart","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5354\/0718-4360.1992.44252"}],"container-title":["IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/3468\/21969\/01021113.pdf?arnumber=1021113","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T10:18:40Z","timestamp":1743329920000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1021113\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,3]]},"references-count":18,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2002,3]]}},"URL":"https:\/\/doi.org\/10.1109\/tsmca.2002.1021113","relation":{},"ISSN":["1083-4427"],"issn-type":[{"type":"print","value":"1083-4427"}],"subject":[],"published":{"date-parts":[[2002,3]]}}}