{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,6]],"date-time":"2024-10-06T00:39:26Z","timestamp":1728175166368},"reference-count":45,"publisher":"Elsevier BV","issue":"12","license":[{"start":{"date-parts":[[2010,12,1]],"date-time":"2010-12-01T00:00:00Z","timestamp":1291161600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Reliability Engineering & System Safety"],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1016\/j.ress.2010.06.010","type":"journal-article","created":{"date-parts":[[2010,7,2]],"date-time":"2010-07-02T04:52:15Z","timestamp":1278046335000},"page":"1335-1344","source":"Crossref","is-referenced-by-count":288,"title":["An approach for modelling interdependent infrastructures in the context of vulnerability analysis"],"prefix":"10.1016","volume":"95","author":[{"given":"Jonas","family":"Johansson","sequence":"first","affiliation":[]},{"given":"Henrik","family":"Hassel","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.ress.2010.06.010_bib1","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1111\/j.1468-5973.2007.00501.x","article-title":"Systems that should have failed: critical infrastructure protection in an institutionally fragmented environment","volume":"15","author":"de Bruijne","year":"2007","journal-title":"Journal of Contingencies and Crises Management"},{"issue":"2","key":"10.1016\/j.ress.2010.06.010_bib2","first-page":"8","article-title":"New approaches to assessing vulnerability and resilience","volume":"15","author":"Buckle","year":"2000","journal-title":"Australian Journal of Emergency Management"},{"issue":"1","key":"10.1016\/j.ress.2010.06.010_bib3","first-page":"51","article-title":"Preparing for critical infrastructure breakdowns: the limits of crisis management and the need for resilience","volume":"15","author":"Boin","year":"2007","journal-title":"Journal of Contingencies and Crises Management"},{"key":"10.1016\/j.ress.2010.06.010_bib4","series-title":"Foundations for risk analysis: a knowledge and decision-oriented perspective","author":"Aven","year":"2003"},{"issue":"3","key":"10.1016\/j.ress.2010.06.010_bib5","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1080\/106307301753430764","article-title":"Social implications of infrastructure interactions","volume":"8","author":"Zimmerman","year":"2001","journal-title":"Journal of Urban Technology"},{"issue":"1","key":"10.1016\/j.ress.2010.06.010_bib6","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1080\/106307302317379855","article-title":"Controlling cascading failure: understanding the vulnerabilities of interconnected infrastructure","volume":"9","author":"Little","year":"2002","journal-title":"Journal of Urban Technology"},{"key":"10.1016\/j.ress.2010.06.010_bib7","unstructured":"US\u2013Canada Power Systems Outage Task Force. August 14, 2003 blackout in the United States and Canada: causes and recommendations. Final report. Washington, US: Department of Energy, 2004."},{"key":"10.1016\/j.ress.2010.06.010_bib8","unstructured":"Johansson J., Lindahl S., Samuelsson O., Ottosson H., The storm gudrun a seven-weeks power outage in Sweden. Presented at CRIS2006, Alexandria, 2006."},{"issue":"4","key":"10.1016\/j.ress.2010.06.010_bib9","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1177\/1087724X06289055","article-title":"Infrastructure interdependency and the creation of a normal disaster","volume":"10","author":"Leavitt","year":"2006","journal-title":"Public Works Management and Policy"},{"issue":"1\u20132","key":"10.1016\/j.ress.2010.06.010_bib10","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1504\/IJEM.2004.005232","article-title":"A socio-technical systems approach to understanding and enhancing the reliability of interdependent infrastructure systems","volume":"2","author":"Little","year":"2004","journal-title":"International Journal of Emergency Management"},{"key":"10.1016\/j.ress.2010.06.010_bib11","article-title":"Critical infrastructure interdependency modeling: a survey of US and international research","author":"Pederson","year":"2006","journal-title":"Idaho National Laboratory"},{"issue":"1","key":"10.1016\/j.ress.2010.06.010_bib12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1061\/(ASCE)1076-0342(2001)7:1(1)","article-title":"Leontief-based model of risk in complex interconnected infrastructures","volume":"7","author":"Haimes","year":"2001","journal-title":"Journal of Infrastructure Systems"},{"key":"10.1016\/j.ress.2010.06.010_bib13","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1080\/07408170600940005","article-title":"Towards modeling and simulation of critical national infrastructure interdependencies","volume":"39","author":"Min","year":"2007","journal-title":"IIE Transactions"},{"issue":"1","key":"10.1016\/j.ress.2010.06.010_bib14","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1504\/IJCIS.2004.003800","article-title":"Assessing infrastructure interdependencies: the challenge of risk analysis for complex adaptive systems","volume":"1","author":"Brown","year":"2004","journal-title":"International Journal of Critical Infrastructures"},{"issue":"2","key":"10.1016\/j.ress.2010.06.010_bib15","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1111\/j.1539-6924.2005.00595.x","article-title":"Screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism","volume":"25","author":"Apostolakis","year":"2005","journal-title":"Risk Analysis"},{"issue":"3","key":"10.1016\/j.ress.2010.06.010_bib16","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1061\/(ASCE)1076-0342(2007)13:3(175)","article-title":"Empirical framework for characterizing infrastructure failure interdependencies","volume":"13","author":"McDaniels","year":"2007","journal-title":"Journal of Infrastructure Systems"},{"key":"10.1016\/j.ress.2010.06.010_bib17","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1007\/s11069-006-9039-4","article-title":"Infrastructure failure interdependencies in extreme events: power outage consequences in the 1998 ice storm","volume":"41","author":"Chang","year":"2007","journal-title":"Natural Hazards"},{"issue":"2\u20133","key":"10.1016\/j.ress.2010.06.010_bib18","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1504\/IJCIS.2006.009439","article-title":"The next step: quantifying infrastructure interdependencies to improve security","volume":"2","author":"Zimmerman","year":"2006","journal-title":"International Journal of Critical Infrastructures"},{"key":"10.1016\/j.ress.2010.06.010_bib19","doi-asserted-by":"crossref","unstructured":"Restrepo CE, Simonoff JS, Zimmerman R., Unraveling geographic interdependencies in electric power infrastructure. In: Proceedings of the 39th Hawaii international conference on systems sciences, Hawaii, USA, 2006.","DOI":"10.1109\/HICSS.2006.518"},{"key":"10.1016\/j.ress.2010.06.010_bib20","doi-asserted-by":"crossref","unstructured":"Rinaldi SM., Modeling and simulating critical infrastructure and their interdependencies. In: Proceedings of the 37th Hawaii conference on systems science, Hawaii, USA, 2004.","DOI":"10.1109\/HICSS.2004.1265180"},{"key":"10.1016\/j.ress.2010.06.010_bib21","doi-asserted-by":"crossref","first-page":"954","DOI":"10.1016\/j.ress.2008.10.011","article-title":"The role of network theory and object-oriented modeling within a framework for the vulnerability analysis of critical infrastructures","volume":"94","author":"Eusgeld","year":"2009","journal-title":"Reliability Engineering and System Safety"},{"issue":"4","key":"10.1016\/j.ress.2010.06.010_bib22","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1111\/j.1468-2257.2008.00447.x","article-title":"Methodological overview of network vulnerability analysis","volume":"39","author":"Murray","year":"2008","journal-title":"Growth and Change"},{"issue":"1","key":"10.1016\/j.ress.2010.06.010_bib23","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1504\/IJEM.2007.012385","article-title":"Analysing the vulnerability of electric distribution systems: a step towards incorporating the societal consequences of disruptions","volume":"4","author":"Johansson","year":"2007","journal-title":"International Journal of Emergency Management"},{"issue":"2","key":"10.1016\/j.ress.2010.06.010_bib24","first-page":"235","article-title":"Identifying critical components in technical infrastructure networks","volume":"222","author":"J\u00f6nsson","year":"2008","journal-title":"Journal of Risk and Reliability"},{"issue":"2","key":"10.1016\/j.ress.2010.06.010_bib25","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1137\/S003614450342480","article-title":"The structure and function of complex networks","volume":"45","author":"Newman","year":"2003","journal-title":"SIAM Review"},{"issue":"056109","key":"10.1016\/j.ress.2010.06.010_bib26","article-title":"Attack vulnerability of complex networks","volume":"65","author":"Holme","year":"2002","journal-title":"Physical Review E"},{"issue":"6794","key":"10.1016\/j.ress.2010.06.010_bib27","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1038\/35019019","article-title":"Error and attack tolerance of complex systems","volume":"406","author":"Albert","year":"2000","journal-title":"Nature"},{"issue":"3","key":"10.1016\/j.ress.2010.06.010_bib28","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1061\/(ASCE)1076-0342(2007)13:3(185)","article-title":"Interdependent response of networked systems","volume":"13","author":"Due\u00f1as-Osorio","year":"2007","journal-title":"Journal of Infrastructure Systems"},{"key":"10.1016\/j.ress.2010.06.010_bib29","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1140\/epjb\/e2005-00237-9","article-title":"Modeling cascading failures in the North American power grid","volume":"46","author":"Kinney","year":"2005","journal-title":"The European Physical Journal B"},{"issue":"066109","key":"10.1016\/j.ress.2010.06.010_bib30","first-page":"1","article-title":"Vertex overload breakdown in evolving networks","volume":"65","author":"Holme","year":"2002","journal-title":"Physical Review E"},{"issue":"2","key":"10.1016\/j.ress.2010.06.010_bib31","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1111\/j.1539-6924.2006.00755.x","article-title":"On the definition of vulnerabilities in measuring risks to infrastructures","volume":"26","author":"Haimes","year":"2006","journal-title":"Risk Analysis"},{"key":"10.1016\/j.ress.2010.06.010_bib32","series-title":"Risk modeling, assessment, and management","author":"Haimes","year":"1998"},{"issue":"1","key":"10.1016\/j.ress.2010.06.010_bib33","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1111\/j.1539-6924.1981.tb01350.x","article-title":"On the quantitative definition of risk","volume":"1","author":"Kaplan","year":"1981","journal-title":"Risk Analysis"},{"issue":"5","key":"10.1016\/j.ress.2010.06.010_bib34","doi-asserted-by":"crossref","first-page":"807","DOI":"10.1111\/0272-4332.215153","article-title":"Fitting hierarchial holographic modeling into the theory of scenario structuring and a resulting refinement to the quantitative definition of risk","volume":"21","author":"Kaplan","year":"2001","journal-title":"Risk Analysis"},{"key":"10.1016\/j.ress.2010.06.010_bib35","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/S0306-9192(00)00046-4","article-title":"Coming to terms with vulnerability: a critique of the food security definition","volume":"26","author":"Dilley","year":"2001","journal-title":"Food Policy"},{"issue":"1","key":"10.1016\/j.ress.2010.06.010_bib36","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1111\/1468-5973.00037","article-title":"Risk management in a disaster management context","volume":"5","author":"Salter","year":"1997","journal-title":"Journal of Contingencies and Crises Management"},{"issue":"6","key":"10.1016\/j.ress.2010.06.010_bib37","doi-asserted-by":"crossref","first-page":"745","DOI":"10.1016\/j.ress.2006.03.008","article-title":"A unified framework for risk and vulnerability analysis covering both safety and security","volume":"92","author":"Aven","year":"2007","journal-title":"Reliability Engineering and System Safety"},{"issue":"5","key":"10.1016\/j.ress.2010.06.010_bib38","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1111\/j.1539-6924.1998.tb00367.x","article-title":"An approach to vulnerability analysis of complex industrial systems","volume":"18","author":"Einarsson","year":"1998","journal-title":"Risk Analysis"},{"key":"10.1016\/j.ress.2010.06.010_bib39","doi-asserted-by":"crossref","first-page":"1183","DOI":"10.1016\/j.ress.2006.08.004","article-title":"Identification of critical locations across multiple infrastructures for terrorist actions","volume":"92","author":"Patterson","year":"2007","journal-title":"Reliability Engineering and System Safety"},{"key":"10.1016\/j.ress.2010.06.010_bib40","unstructured":"Jenelius E, Mattsson L-G., The vulnerability of road networks under area-covering disruptions. In: Proceedings of INFORMS annual meeting, Washington, DC, 2008."},{"issue":"6","key":"10.1016\/j.ress.2010.06.010_bib41","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/37.969131","article-title":"Identifying, understanding, and analyzing critical infrastructure interdependencies","volume":"21","author":"Rinaldi","year":"2001","journal-title":"IEEE Control Systems Magazine"},{"issue":"6","key":"10.1016\/j.ress.2010.06.010_bib42","doi-asserted-by":"crossref","first-page":"1303","DOI":"10.1109\/TSMCC.2007.905859","article-title":"Restoration of services in interdependent infrastructure systems: a network flows approach","volume":"37","author":"Lee","year":"2007","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics\u2014Part C: Applications and Reviews"},{"issue":"1","key":"10.1016\/j.ress.2010.06.010_bib43","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1504\/IJCIS.2010.029574","article-title":"An approach to identifying geographic interdependencies among critical infrastructures","volume":"6","author":"Robert","year":"2010","journal-title":"International Journal of Critical Infrastructures"},{"issue":"1","key":"10.1016\/j.ress.2010.06.010_bib44","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1103\/RevModPhys.74.47","article-title":"Statistical mechanics of complex networks","volume":"74","author":"Albert","year":"2002","journal-title":"Review of Modern Physics"},{"key":"10.1016\/j.ress.2010.06.010_bib45","unstructured":"Wilhelmsson A., Johansson J., Assessing response system capabilities of socio-technical systems. In: Proceedings of TIEMS 2009, Istanbul, Turkey, June 9\u201311, 2009."}],"container-title":["Reliability Engineering & System Safety"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0951832010001444?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0951832010001444?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T13:37:11Z","timestamp":1559223431000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0951832010001444"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12]]},"references-count":45,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2010,12]]}},"alternative-id":["S0951832010001444"],"URL":"https:\/\/doi.org\/10.1016\/j.ress.2010.06.010","relation":{},"ISSN":["0951-8320"],"issn-type":[{"value":"0951-8320","type":"print"}],"subject":[],"published":{"date-parts":[[2010,12]]}}}