{"id":"https://openalex.org/W45332261","doi":"https://doi.org/10.1007/978-3-642-28920-0_1","title":"Overview of Critical Information Infrastructure Protection","display_name":"Overview of Critical Information Infrastructure Protection","publication_year":2012,"publication_date":"2012-01-01","ids":{"openalex":"https://openalex.org/W45332261","doi":"https://doi.org/10.1007/978-3-642-28920-0_1","mag":"45332261"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-28920-0_1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-28920-0_1","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100641212","display_name":"Javier L\u00f3pez","orcid":"https://orcid.org/0000-0001-8066-9991"},"institutions":[{"id":"https://openalex.org/I82767444","display_name":"Universidad de M\u00e1laga","ror":"https://ror.org/036b2ww28","country_code":"ES","type":"education","lineage":["https://openalex.org/I82767444"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Javier Lopez","raw_affiliation_strings":["Computer Science Department, E.T.S. Ingenieria Informatica, University of Malaga, Campus de Teatinos, Malaga, Spain","Department of Computer Science, University of Malaga, 29071, M\u00e1laga, Spain"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, E.T.S. Ingenieria Informatica, University of Malaga, Campus de Teatinos, Malaga, Spain","institution_ids":["https://openalex.org/I82767444"]},{"raw_affiliation_string":"Department of Computer Science, University of Malaga, 29071, M\u00e1laga, Spain","institution_ids":["https://openalex.org/I82767444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032289109","display_name":"Roberto Setola","orcid":"https://orcid.org/0000-0002-8792-2520"},"institutions":[{"id":"https://openalex.org/I155125353","display_name":"Universit\u00e0 Campus Bio-Medico","ror":"https://ror.org/04gqx4x78","country_code":"IT","type":"education","lineage":["https://openalex.org/I155125353"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Roberto Setola","raw_affiliation_strings":["Complex Systems & Security Lab, University CAMPUS Bio-Medico, Via Alavro del Portilla, 21, 00128, Roma, Italy","Faculty of Engineering, Universit\u00e1 Campus Bio-Medico di Roma, Rome, Italy"],"affiliations":[{"raw_affiliation_string":"Complex Systems & Security Lab, University CAMPUS Bio-Medico, Via Alavro del Portilla, 21, 00128, Roma, Italy","institution_ids":["https://openalex.org/I155125353"]},{"raw_affiliation_string":"Faculty of Engineering, Universit\u00e1 Campus Bio-Medico di Roma, Rome, Italy","institution_ids":["https://openalex.org/I155125353"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013455841","display_name":"Stephen D. Wolthusen","orcid":null},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]},{"id":"https://openalex.org/I4210127026","display_name":"Ko-Aks (Norway)","ror":"https://ror.org/036jhyh48","country_code":"NO","type":"company","lineage":["https://openalex.org/I4210127026"]}],"countries":["GB","NO"],"is_corresponding":false,"raw_author_name":"Stephen D. Wolthusen","raw_affiliation_strings":["Department of Mathematics, Royal Holloway, University of London, Egham, United Kingdom","Information Security Group, Department of Mathematics, University of London, Royal Holloway, Egham Hill, TW20 0EX, Egham, Surrey, UK","Norwegian Information Security Laboratory, Gj\u00f8vik University College, Gj\u00f8vik, Norway"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Royal Holloway, University of London, Egham, United Kingdom","institution_ids":["https://openalex.org/I184558857"]},{"raw_affiliation_string":"Information Security Group, Department of Mathematics, University of London, Royal Holloway, Egham Hill, TW20 0EX, Egham, Surrey, UK","institution_ids":["https://openalex.org/I184558857"]},{"raw_affiliation_string":"Norwegian Information Security Laboratory, Gj\u00f8vik University College, Gj\u00f8vik, Norway","institution_ids":["https://openalex.org/I4210127026"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100641212"],"corresponding_institution_ids":["https://openalex.org/I82767444"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":4.4124,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.94883249,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"14"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6883512139320374},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.658775806427002},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6470807194709778},{"id":"https://openalex.org/keywords/dimension","display_name":"Dimension (graph theory)","score":0.4929080009460449},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.4912680983543396},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4744780361652374},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4643096923828125},{"id":"https://openalex.org/keywords/element","display_name":"Element (criminal law)","score":0.4594818353652954},{"id":"https://openalex.org/keywords/electricity","display_name":"Electricity","score":0.45229777693748474},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.438286691904068},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3652426600456238},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.20958024263381958},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.1746494472026825},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.16396835446357727}],"concepts":[{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6883512139320374},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.658775806427002},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6470807194709778},{"id":"https://openalex.org/C33676613","wikidata":"https://www.wikidata.org/wiki/Q13415176","display_name":"Dimension (graph theory)","level":2,"score":0.4929080009460449},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.4912680983543396},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4744780361652374},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4643096923828125},{"id":"https://openalex.org/C200288055","wikidata":"https://www.wikidata.org/wiki/Q2621792","display_name":"Element (criminal law)","level":2,"score":0.4594818353652954},{"id":"https://openalex.org/C206658404","wikidata":"https://www.wikidata.org/wiki/Q12725","display_name":"Electricity","level":2,"score":0.45229777693748474},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.438286691904068},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3652426600456238},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.20958024263381958},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.1746494472026825},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.16396835446357727},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-642-28920-0_1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-28920-0_1","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6399999856948853,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1968686485","https://openalex.org/W2025550035","https://openalex.org/W2065769502","https://openalex.org/W3103071483","https://openalex.org/W4232581335","https://openalex.org/W6686332108"],"related_works":["https://openalex.org/W2770234245","https://openalex.org/W96612179","https://openalex.org/W4229499248","https://openalex.org/W2566006169","https://openalex.org/W1567818861","https://openalex.org/W2987774938","https://openalex.org/W4256492088","https://openalex.org/W632915154","https://openalex.org/W2055733372","https://openalex.org/W3022067003"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
