{"id":"https://openalex.org/W3127783340","doi":"https://doi.org/10.1109/csit49958.2020.9321990","title":"Event-based Spatially-distributed Multi-hazard Risk Analysis","display_name":"Event-based Spatially-distributed Multi-hazard Risk Analysis","publication_year":2020,"publication_date":"2020-09-23","ids":{"openalex":"https://openalex.org/W3127783340","doi":"https://doi.org/10.1109/csit49958.2020.9321990","mag":"3127783340"},"language":"en","primary_location":{"id":"doi:10.1109/csit49958.2020.9321990","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csit49958.2020.9321990","pdf_url":null,"source":{"id":"https://openalex.org/S4306498651","display_name":"2020 IEEE 15th International Conference on Computer Sciences and Information Technologies (CSIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 15th International Conference on Computer Sciences and Information Technologies (CSIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025493353","display_name":"Maryna Zharikova","orcid":"https://orcid.org/0000-0001-6144-480X"},"institutions":[{"id":"https://openalex.org/I118493624","display_name":"Kherson National Technical University","ror":"https://ror.org/04trbj059","country_code":"UA","type":"education","lineage":["https://openalex.org/I118493624"]}],"countries":["UA"],"is_corresponding":true,"raw_author_name":"Maryna Zharikova","raw_affiliation_strings":["Kherson National Technical University, Kherson, Ukraine"],"affiliations":[{"raw_affiliation_string":"Kherson National Technical University, Kherson, Ukraine","institution_ids":["https://openalex.org/I118493624"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016479658","display_name":"Volodymyr Sherstjuk","orcid":"https://orcid.org/0000-0002-9096-2582"},"institutions":[{"id":"https://openalex.org/I118493624","display_name":"Kherson National Technical University","ror":"https://ror.org/04trbj059","country_code":"UA","type":"education","lineage":["https://openalex.org/I118493624"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Volodymyr Sherstjuk","raw_affiliation_strings":["Kherson National Technical University, Kherson, Ukraine"],"affiliations":[{"raw_affiliation_string":"Kherson National Technical University, Kherson, Ukraine","institution_ids":["https://openalex.org/I118493624"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5025493353"],"corresponding_institution_ids":["https://openalex.org/I118493624"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21700263,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2105","issue":null,"first_page":"273","last_page":"276"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9575999975204468,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9575999975204468,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11819","display_name":"Data-Driven Disease Surveillance","score":0.934499979019165,"subfield":{"id":"https://openalex.org/subfields/2713","display_name":"Epidemiology"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9336000084877014,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hazard","display_name":"Hazard","score":0.7125117778778076},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6989502906799316},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6282539367675781},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.6242364645004272},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5718291997909546},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.41864609718322754},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.195363849401474},{"id":"https://openalex.org/keywords/geography","display_name":"Geography","score":0.16890206933021545}],"concepts":[{"id":"https://openalex.org/C49261128","wikidata":"https://www.wikidata.org/wiki/Q1132455","display_name":"Hazard","level":2,"score":0.7125117778778076},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6989502906799316},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6282539367675781},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.6242364645004272},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5718291997909546},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.41864609718322754},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.195363849401474},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.16890206933021545},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csit49958.2020.9321990","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csit49958.2020.9321990","pdf_url":null,"source":{"id":"https://openalex.org/S4306498651","display_name":"2020 IEEE 15th International Conference on Computer Sciences and Information Technologies (CSIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 15th International Conference on Computer Sciences and Information Technologies (CSIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1008544164","https://openalex.org/W2039403734","https://openalex.org/W2049462634","https://openalex.org/W2059747835","https://openalex.org/W2136739076","https://openalex.org/W2164348122","https://openalex.org/W2462566322","https://openalex.org/W2579282067","https://openalex.org/W2898645164","https://openalex.org/W2954457523","https://openalex.org/W2984197671","https://openalex.org/W3151477191","https://openalex.org/W4249017384","https://openalex.org/W4285719527","https://openalex.org/W6729923477","https://openalex.org/W6755759386","https://openalex.org/W6765567583","https://openalex.org/W7024602005"],"related_works":["https://openalex.org/W2095999892","https://openalex.org/W2018764758","https://openalex.org/W2383689843","https://openalex.org/W1550668881","https://openalex.org/W617913288","https://openalex.org/W2319323865","https://openalex.org/W2951745010","https://openalex.org/W2347958299","https://openalex.org/W2963125730","https://openalex.org/W2911698928"],"abstract_inverted_index":{"This":[0],"work":[1],"presents":[2],"an":[3],"event-based":[4],"spatially-distributed":[5,38],"dynamic":[6,30],"multi-hazard":[7,17,70],"risk":[8,18,43],"model":[9,19],"for":[10,44],"the":[11,23,29,33,69],"objects":[12],"of":[13,32,42,55],"critical":[14,47],"infrastructure.":[15],"The":[16,40],"is":[20,50],"based":[21],"on":[22],"spatial":[24],"model,":[25],"as":[26,28,52],"well":[27],"models":[31],"socioeconomic":[34],"system,":[35],"vulnerability,":[36],"and":[37],"risks.":[39],"dynamics":[41],"a":[45,53,59],"certain":[46,60],"infrastructure":[48],"object":[49],"represented":[51],"sequence":[54],"events":[56],"plunged":[57],"into":[58],"context,":[61],"where":[62],"each":[63],"event":[64],"can":[65],"initiate":[66],"scenarios":[67],"describing":[68],"dynamics.":[71]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
