{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T22:32:55Z","timestamp":1725316375192},"reference-count":38,"publisher":"Elsevier BV","issue":"3-4","content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Critical Infrastructure Protection"],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1016\/j.ijcip.2013.08.004","type":"journal-article","created":{"date-parts":[[2013,8,22]],"date-time":"2013-08-22T06:30:39Z","timestamp":1377153039000},"page":"159-178","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":21,"title":["Towards end-to-end network resilience"],"prefix":"10.1016","volume":"6","author":[{"given":"Panagiotis","family":"Vlacheas","sequence":"first","affiliation":[]},{"given":"Vera","family":"Stavroulaki","sequence":"additional","affiliation":[]},{"given":"Panagiotis","family":"Demestichas","sequence":"additional","affiliation":[]},{"given":"Scott","family":"Cadzow","sequence":"additional","affiliation":[]},{"given":"Demosthenes","family":"Ikonomou","sequence":"additional","affiliation":[]},{"given":"Slawomir","family":"Gorniak","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.ijcip.2013.08.004_bib1","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/TDSC.2004.2","article-title":"Basic concepts and taxonomy of dependable and secure computing","volume":"1","author":"Avi\u017eienis","year":"2004","journal-title":"IEEE Transactions of Dependable and Secure Computing"},{"key":"10.1016\/j.ijcip.2013.08.004_bib2","doi-asserted-by":"crossref","unstructured":"C. Basile, A. Lioy, S. Scozzi, M. Vallini, Ontology-based security policy translation, in: Proceedings of the Second International Workshop on Computational Intelligence in Security for Information Systems, 2009, pp. 117\u2013126.","DOI":"10.1007\/978-3-642-04091-7_15"},{"key":"10.1016\/j.ijcip.2013.08.004_bib3","doi-asserted-by":"crossref","unstructured":"M. Chora\u015b, R. Kozik, A. Flizikowski, W. Ho\u0142ubowicz, Ontology applied in decision support system for critical infrastructure protection, in: Proceedings of the Twenty-Third International Conference on Industrial and Other Applications of Applied Intelligent Systems, 2010, pp. 671\u2013680.","DOI":"10.1007\/978-3-642-13022-9_67"},{"key":"10.1016\/j.ijcip.2013.08.004_bib4","doi-asserted-by":"crossref","unstructured":"M. Chora\u015b, R. Kozik, A. Flizikowski, R. Renk, W. Ho\u0142ubowicz, Ontology-based decision support for security management in heterogeneous networks, in: Proceedings of the Fifth International Conference on Intelligent Computing, 2009, pp. 920\u2013927.","DOI":"10.1007\/978-3-642-04020-7_99"},{"key":"10.1016\/j.ijcip.2013.08.004_bib5","unstructured":"European Network and Information Security Agency, ENISA, Heraklion, Greece \u3008www.enisa.europa.eu\u3009."},{"key":"10.1016\/j.ijcip.2013.08.004_bib6","unstructured":"European Network and Information Security Agency, Resilience Features of IPv6, DNSSEC and MPLS and Deployment Scenarios, Heraklion, Greece, 2008 \u3008www.enisa.europa.eu\/act\/it\/library\/deliverables\/res-feat\u3009."},{"key":"10.1016\/j.ijcip.2013.08.004_bib7","unstructured":"European Network and Information Security Agency, Gaps in Standardization Related to Resilience of Communication Networks, Heraklion, Greece, 2009 \u3008www.enisa.europa.eu\/act\/it\/library\/deliverables\/gapsstd\u3009."},{"key":"10.1016\/j.ijcip.2013.08.004_bib8","unstructured":"European Network and Information Security Agency, Priorities for Research on Current and Emerging Network Technologies, Heraklion, Greece, 2010 \u3008www.enisa.europa.eu\/act\/it\/library\/deliverables\/procent\u3009."},{"key":"10.1016\/j.ijcip.2013.08.004_bib9","unstructured":"European Network and Information Security Agency, Enabling and Managing End-to-End Resilience, Heraklion, Greece, 2011 \u3008www.enisa.europa.eu\/act\/it\/library\/deliverables\/e2eres\u3009."},{"key":"10.1016\/j.ijcip.2013.08.004_bib10","unstructured":"European Telecommunications Standards Institute, Methods for Testing and Specification, Sophia-Antipolis, France \u3008www.etsi.org\/mts\u3009."},{"key":"10.1016\/j.ijcip.2013.08.004_bib11","unstructured":"European Telecommunications Standards Institute, Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN\u3009, Sophia-Antipolis, France \u3008www.etsi.org\/tispan\u3009."},{"key":"10.1016\/j.ijcip.2013.08.004_bib12","unstructured":"European Telecommunications Standards Institute, Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN), NGN Security, Report on Issues Related to Security in Identity Management and Their Resolution in the NGN, Technical Report TR 187 010, Sophia-Antipolis, France, 2008."},{"key":"10.1016\/j.ijcip.2013.08.004_bib13","doi-asserted-by":"crossref","unstructured":"I. Fovino, M. Masera, Emergent disservices in interdependent systems and system-of-systems, in: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, 2006, pp. 590\u2013595.","DOI":"10.1109\/ICSMC.2006.384449"},{"key":"10.1016\/j.ijcip.2013.08.004_bib14","series-title":"Enterprise Interoperability IV","first-page":"169","article-title":"An ontology proposal for resilient multi-plant networks","author":"Franco","year":"2010"},{"issue":"1","key":"10.1016\/j.ijcip.2013.08.004_bib15","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1147\/sj.421.0005","article-title":"The dawning of the autonomic computing era","volume":"42","author":"Ganek","year":"2003","journal-title":"IBM System Journal"},{"key":"10.1016\/j.ijcip.2013.08.004_bib16","unstructured":"INSPIRE Project, Increasing Security and Protection Through Infrastructure Resilience, Consorzio Interuniversitario Nazionale per l'Informatica (CINI), University of Roma La Sapienza, Rome, Italy \u3008www.inspire-strep.eu\u3009."},{"key":"10.1016\/j.ijcip.2013.08.004_bib17","unstructured":"INTERSECTION Project, Consorzio Interuniversitario Nazionale per l'Informatica (CINI), University of Roma La Sapienza, Rome, Italy \u3008www.intersection-project.eu\u3009."},{"key":"10.1016\/j.ijcip.2013.08.004_bib18","doi-asserted-by":"crossref","unstructured":"T. Jansen, M. Amirijoo, U. T\u00fcrke, L. Jorguseski, K. Zetterberg, R. Nascimento, L. Schmelz, J. Turk, I. Balan, Embedding multiple self-organization functionalities in future radio access networks, in: Proceedings of the Sixty-Ninth IEEE Vehicular Technology Conference, 2009.","DOI":"10.1109\/VETECS.2009.5073530"},{"issue":"1","key":"10.1016\/j.ijcip.2013.08.004_bib19","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MC.2003.1160055","article-title":"The vision of autonomic computing","volume":"36","author":"Kephart","year":"2003","journal-title":"IEEE Computer"},{"key":"10.1016\/j.ijcip.2013.08.004_bib20","doi-asserted-by":"crossref","unstructured":"J. Laprie, Resilience for the scalability of dependability, in: Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications, 2005, pp. 5\u20136.","DOI":"10.1109\/NCA.2005.44"},{"key":"10.1016\/j.ijcip.2013.08.004_bib21","unstructured":"J. Laprie, From dependability to resilience, in: Proceedings of the Thirty-Eighth IEEE\/IFIP International Conference on Dependable Systems and Networks, 2008."},{"issue":"1\/2","key":"10.1016\/j.ijcip.2013.08.004_bib22","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1504\/IJMTM.2009.023785","article-title":"Developing a taxonomy and model for security-centric supply chain management","volume":"17","author":"Li","year":"2009","journal-title":"International Journal of Manufacturing Technology and Management"},{"issue":"3","key":"10.1016\/j.ijcip.2013.08.004_bib23","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1007\/s10922-009-9129-1","article-title":"Ontology-based network management: study cases and lessons learned","volume":"17","author":"L\u00f3pez de Vergara","year":"2009","journal-title":"Journal of Network and Systems Management"},{"issue":"8","key":"10.1016\/j.ijcip.2013.08.004_bib24","first-page":"720","article-title":"Use of ontologies for the definition of alerts and policies in a network security platform","volume":"4","author":"L\u00f3pez de Vergara","year":"2009","journal-title":"Journal of Networks"},{"issue":"13","key":"10.1016\/j.ijcip.2013.08.004_bib25","doi-asserted-by":"crossref","first-page":"3049","DOI":"10.1016\/j.comcom.2008.04.010","article-title":"An autonomic approach to offer services in OSGi-based home gateways","volume":"31","author":"Lopez de Vergara","year":"2008","journal-title":"Computer Communications"},{"key":"10.1016\/j.ijcip.2013.08.004_bib26","doi-asserted-by":"crossref","unstructured":"J. Lozano, A. Castro, J. Gonzalez, J. Lopez de Vergara, V. Villagra, V. Olmedo, Autonomic provisioning model for digital home services, in: Proceedings of the Third IEEE International Workshop on Modeling Autonomic Communications Environments, 2008, pp. 114\u2013119.","DOI":"10.1007\/978-3-540-87355-6_11"},{"key":"10.1016\/j.ijcip.2013.08.004_bib27","unstructured":"REMPLANET Project, Resilient Multi-Plant Networks, Polytechnic University of Valencia, Valencia, Spain \u3008www.remplanet.eu\/web\u3009."},{"key":"10.1016\/j.ijcip.2013.08.004_bib28","unstructured":"ReSIST Project, Resilience for Survivability in IST, Laboratory for Analysis and Architecture of Systems, Toulouse, France \u3008www.resist-noe.org\/overview\/summary.html\u3009."},{"key":"10.1016\/j.ijcip.2013.08.004_bib29","unstructured":"ReSIST Project, Deliverable D34: Resilience Ontology: Final, Laboratory for Analysis and Architecture of Systems, Toulouse, France, 2008 \u3008www.resist-noe.org\/Publications\/Deliverables\/D34-Resilience_Ontology_Final.pdf\u3009."},{"key":"10.1016\/j.ijcip.2013.08.004_bib30","series-title":"Artificial Intelligence: A Modern Approach","author":"Russell","year":"2009"},{"key":"10.1016\/j.ijcip.2013.08.004_bib31","doi-asserted-by":"crossref","unstructured":"V. Stavroulaki, N. Koutsouris, K. Tsagkaris, P. Demestichas, A platform for the integration and management of cognitive systems in future networks, in: Proceedings of the IEEE International Workshop on Management of Emerging Networks and Services \u2013 IEEE GLOBECOM Workshop on Management of Emerging Networks and Services, 2010, pp. 492\u2013497.","DOI":"10.1109\/GLOCOMW.2010.5700368"},{"key":"10.1016\/j.ijcip.2013.08.004_bib32","doi-asserted-by":"crossref","unstructured":"V. Stavroulaki, Y. Kritikou, E. Darra, Acquiring and learning user information in the context of cognitive device management, in: Proceedings of the IEEE International Conference on Communications Workshops, 2009.","DOI":"10.1109\/ICCW.2009.5208053"},{"key":"10.1016\/j.ijcip.2013.08.004_bib33","unstructured":"TM Forum, Business Process Framework (eTOM), Morristown, New Jersey \u3008www.tmforum.org\/BusinessProcessFramework\/1647\/home.html\u3009."},{"key":"10.1016\/j.ijcip.2013.08.004_bib34","doi-asserted-by":"crossref","unstructured":"J. Undercoffer, A. Joshi, J. Pinkston, Modeling computer attacks: An ontology for intrusion detection, in: Proceedings of the Sixth International Symposium on Recent Advances in Intrusion Detection, 2003, pp. 113\u2013135.","DOI":"10.1007\/978-3-540-45248-5_7"},{"key":"10.1016\/j.ijcip.2013.08.004_bib35","unstructured":"UniverSelf Project, Case Study on Operator-Governed, End-to-End, Autonomic, Joint Network and Service, Alcatel-Lucent Bell Labs France, Villarceaux, France, 2011."},{"key":"10.1016\/j.ijcip.2013.08.004_bib36","unstructured":"UniverSelf Project, UniverSelf, Alcatel-Lucent Bell Labs France, Villarceaux, France \u3008www.univerself-project.eu\u3009."},{"issue":"2","key":"10.1016\/j.ijcip.2013.08.004_bib37","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1017\/S0269888900007797","article-title":"Ontologies: principles, methods and applications","volume":"11","author":"Uschold","year":"1996","journal-title":"The Knowledge Engineering Review"},{"key":"10.1016\/j.ijcip.2013.08.004_bib38","doi-asserted-by":"crossref","unstructured":"J. V\u00f6lker, D. Vrande\u010di\u0107, Y. Sure, A. Hotho, Learning disjointness, in: Proceedings of the Fourth European Semantic Web Conference, 2007, pp. 175\u2013189.","DOI":"10.1007\/978-3-540-72667-8_14"}],"container-title":["International Journal of Critical Infrastructure Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1874548213000449?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1874548213000449?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,7,21]],"date-time":"2019-07-21T17:04:51Z","timestamp":1563728691000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1874548213000449"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":38,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["S1874548213000449"],"URL":"https:\/\/doi.org\/10.1016\/j.ijcip.2013.08.004","relation":{},"ISSN":["1874-5482"],"issn-type":[{"value":"1874-5482","type":"print"}],"subject":[],"published":{"date-parts":[[2013,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Towards end-to-end network resilience","name":"articletitle","label":"Article Title"},{"value":"International Journal of Critical Infrastructure Protection","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ijcip.2013.08.004","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2013 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}