{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:41:58Z","timestamp":1729669318675,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/giis.2016.7814850","type":"proceedings-article","created":{"date-parts":[[2017,1,17]],"date-time":"2017-01-17T04:28:21Z","timestamp":1484627301000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["FUSE-IT: Enhancing critical site supervision with cross-domain key performance indicators"],"prefix":"10.1109","author":[{"given":"Helia","family":"Pouyllau","sequence":"first","affiliation":[]},{"given":"Bernard","family":"Istasse","sequence":"additional","affiliation":[]},{"given":"Shoreh","family":"Ahvar","sequence":"additional","affiliation":[]},{"given":"Noel","family":"Crespi","sequence":"additional","affiliation":[]},{"given":"Isabel","family":"Praca","sequence":"additional","affiliation":[]},{"given":"Sandra","family":"Garcia-Rodriguez","sequence":"additional","affiliation":[]},{"given":"Erhan","family":"Mengusoglu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","volume":"204","author":"luckham","year":"2002","journal-title":"The Power of Events"},{"journal-title":"Framework for Cyber-Physical Systems Release 1 0","year":"2015","author":"group","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2010.12.008"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11269-006-9112-5"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1584","DOI":"10.1016\/j.rser.2005.11.005","article-title":"Use of multicriteria decision analysis methods for energy planning problems","volume":"11","author":"l\u00f8ken","year":"2007","journal-title":"Renewable and Sustainable Energy Reviews"},{"key":"ref15","article-title":"Intuitionistic fuzzy choquet integral operator-based approach for black-start decision-making","volume":"6","author":"liu","year":"2012","journal-title":"Generation Transmission & Distribution LET"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1016\/j.apenergy.2014.09.032","article-title":"Decision framework of solar thermal power plant site selection based on linguistic choquet operator","volume":"136","author":"wu","year":"2014","journal-title":"Applied Energy"},{"key":"ref17","article-title":"Using multi attribute choquet integral in site selection of wind energy plants: The case of turkey","volume":"20","author":"cebi","year":"2013","journal-title":"J Multiple-Valued Logic Soft Computing"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2012.2188873"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"5068","DOI":"10.1021\/es100959q","article-title":"Coupling multi-criteria decision analysis, life-cycle assessment, and risk assessment for emerging threats","volume":"45","author":"linkov","year":"2011","journal-title":"Environmental Science & Technology"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICE.2015.7438671"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.buildenv.2013.01.019"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2015.04.002"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2013.20"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-35813-5","author":"de lemos","year":"2013","journal-title":"Software Engineering for Self-Adaptive Systems A Second Research Roadmap"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1518\/001872095779049543"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2012.10.003"},{"key":"ref9","volume":"37","author":"goodman","year":"2013","journal-title":"Mathematics of Data Fusion"},{"key":"ref1","article-title":"Research challenges for the security of control systems","author":"c\u00e1rdenas","year":"2008","journal-title":"HOTSEC"},{"journal-title":"Multi-criteria decision model inference and application in information security risk classification","year":"2012","author":"van der meer","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet.2015.7335290"},{"article-title":"Risk quadruplet: Integrating assessments of threat, vulnerability, consequence and perception for homeland security","year":"0","author":"hilla","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MPE.2009.934876"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2015.03.065"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MPAE.2005.1507024"}],"event":{"name":"2016 Global Information Infrastructure and Networking Symposium (GIIS)","start":{"date-parts":[[2016,10,19]]},"location":"Porto, Portugal","end":{"date-parts":[[2016,10,21]]}},"container-title":["2016 Global Information Infrastructure and Networking Symposium (GIIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7799593\/7814849\/07814850.pdf?arnumber=7814850","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T16:46:47Z","timestamp":1568738807000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7814850\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/giis.2016.7814850","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}