{"id":"https://openalex.org/W2744916219","doi":"https://doi.org/10.1145/3098954.3098993","title":"Systemic Risk Modeling and Evaluation through Simulation and Bayesian Networks","display_name":"Systemic Risk Modeling and Evaluation through Simulation and Bayesian Networks","publication_year":2017,"publication_date":"2017-08-10","ids":{"openalex":"https://openalex.org/W2744916219","doi":"https://doi.org/10.1145/3098954.3098993","mag":"2744916219"},"language":"en","primary_location":{"id":"doi:10.1145/3098954.3098993","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3098954.3098993","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012797617","display_name":"Andrea Tundis","orcid":"https://orcid.org/0000-0002-7729-2780"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Andrea Tundis","raw_affiliation_strings":["Department of Computer Science, Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Technische Universit\u00e4t Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067175860","display_name":"Alfredo Garro","orcid":"https://orcid.org/0000-0003-0351-0869"},"institutions":[{"id":"https://openalex.org/I45204951","display_name":"University of Calabria","ror":"https://ror.org/02rc97e94","country_code":"IT","type":"education","lineage":["https://openalex.org/I45204951"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Alfredo Garro","raw_affiliation_strings":["Department of Informatics, Modeling, Electronics and Systems Engineering, University of Calabria, Rende, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, Modeling, Electronics and Systems Engineering, University of Calabria, Rende, Italy","institution_ids":["https://openalex.org/I45204951"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112206505","display_name":"Teresa Gallo","orcid":"https://orcid.org/0000-0002-7740-8325"},"institutions":[{"id":"https://openalex.org/I45204951","display_name":"University of Calabria","ror":"https://ror.org/02rc97e94","country_code":"IT","type":"education","lineage":["https://openalex.org/I45204951"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Teresa Gallo","raw_affiliation_strings":["Department of Informatics, Modeling, Electronics and Systems Engineering, University of Calabria, Rende, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, Modeling, Electronics and Systems Engineering, University of Calabria, Rende, Italy","institution_ids":["https://openalex.org/I45204951"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052111624","display_name":"Domenico Sacc\u00e0","orcid":"https://orcid.org/0000-0003-3584-5372"},"institutions":[{"id":"https://openalex.org/I45204951","display_name":"University of Calabria","ror":"https://ror.org/02rc97e94","country_code":"IT","type":"education","lineage":["https://openalex.org/I45204951"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Domenico Sacc\u00e1","raw_affiliation_strings":["Department of Informatics, Modeling, Electronics and Systems Engineering, University of Calabria, Rende, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, Modeling, Electronics and Systems Engineering, University of Calabria, Rende, Italy","institution_ids":["https://openalex.org/I45204951"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001030006","display_name":"Simona Citrigno","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Simona Citrigno","raw_affiliation_strings":["Centro di Competenza ICT-SUD, Rende (CS), Italy"],"affiliations":[{"raw_affiliation_string":"Centro di Competenza ICT-SUD, Rende (CS), Italy","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040377095","display_name":"Sabrina Graziano","orcid":"https://orcid.org/0000-0002-5963-9648"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sabrina Graziano","raw_affiliation_strings":["Centro di Competenza ICT-SUD, Rende (CS), Italy"],"affiliations":[{"raw_affiliation_string":"Centro di Competenza ICT-SUD, Rende (CS), Italy","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021712397","display_name":"Max M\u00fchlh\u00e4user","orcid":"https://orcid.org/0000-0003-4713-5327"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Max M\u00fchlh\u00e4user","raw_affiliation_strings":["Department of Computer Science, Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Technische Universit\u00e4t Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5012797617"],"corresponding_institution_ids":["https://openalex.org/I31512782"],"apc_list":null,"apc_paid":null,"fwci":0.6784,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.7232665,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"24","issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11195","display_name":"Simulation Techniques and Applications","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/dependability","display_name":"Dependability","score":0.8169029951095581},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7616478204727173},{"id":"https://openalex.org/keywords/systemic-risk","display_name":"Systemic risk","score":0.7231447100639343},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.7047212719917297},{"id":"https://openalex.org/keywords/bayesian-network","display_name":"Bayesian network","score":0.6419873833656311},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6301552057266235},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5603343844413757},{"id":"https://openalex.org/keywords/risk-assessment","display_name":"Risk assessment","score":0.42004796862602234},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.3677459955215454},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3368830680847168},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20347467064857483},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.16482186317443848},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.16117951273918152},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.12076520919799805}],"concepts":[{"id":"https://openalex.org/C77019957","wikidata":"https://www.wikidata.org/wiki/Q2689057","display_name":"Dependability","level":2,"score":0.8169029951095581},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7616478204727173},{"id":"https://openalex.org/C144587487","wikidata":"https://www.wikidata.org/wiki/Q1369234","display_name":"Systemic risk","level":3,"score":0.7231447100639343},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.7047212719917297},{"id":"https://openalex.org/C33724603","wikidata":"https://www.wikidata.org/wiki/Q812540","display_name":"Bayesian network","level":2,"score":0.6419873833656311},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6301552057266235},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5603343844413757},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.42004796862602234},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.3677459955215454},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3368830680847168},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20347467064857483},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.16482186317443848},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.16117951273918152},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.12076520919799805},{"id":"https://openalex.org/C2778300220","wikidata":"https://www.wikidata.org/wiki/Q114380","display_name":"Financial crisis","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3098954.3098993","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3098954.3098993","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},{"id":"pmh:oai:tubiblio.ulb.tu-darmstadt.de:107442","is_oa":false,"landing_page_url":"http://tubiblio.ulb.tu-darmstadt.de/107442/","pdf_url":null,"source":{"id":"https://openalex.org/S4377196390","display_name":"TUbilio (Technical University of Darmstadt)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I31512782","host_organization_name":"Technische Universit\u00e4t Darmstadt","host_organization_lineage":["https://openalex.org/I31512782"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Konferenzver\u00f6ffentlichung"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.46000000834465027}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1537143241","https://openalex.org/W1559496943","https://openalex.org/W1591752624","https://openalex.org/W1863731631","https://openalex.org/W1971019032","https://openalex.org/W2029958405","https://openalex.org/W2057878844","https://openalex.org/W2108444701","https://openalex.org/W2114138382","https://openalex.org/W2148301044","https://openalex.org/W2159080219","https://openalex.org/W2160036766","https://openalex.org/W2162337502","https://openalex.org/W2170482397","https://openalex.org/W2278913692","https://openalex.org/W2341071358","https://openalex.org/W2402669747","https://openalex.org/W2405627052","https://openalex.org/W2521945375","https://openalex.org/W2970939900","https://openalex.org/W3103141125","https://openalex.org/W3121379941","https://openalex.org/W3123933399","https://openalex.org/W3123987360","https://openalex.org/W3125456580","https://openalex.org/W3129431445","https://openalex.org/W3140580841","https://openalex.org/W4237806680","https://openalex.org/W4248920304","https://openalex.org/W4300544251","https://openalex.org/W6814343861"],"related_works":["https://openalex.org/W4252527915","https://openalex.org/W2409287660","https://openalex.org/W2233357156","https://openalex.org/W1976489385","https://openalex.org/W4256317220","https://openalex.org/W1506225852","https://openalex.org/W2141414364","https://openalex.org/W2376514150","https://openalex.org/W1523265213","https://openalex.org/W2363668972"],"abstract_inverted_index":{"In":[0,98],"the":[1,12,20,24,27,38,56,68,79,101,131,134,145,159,167],"Risk":[2,14,70,108,138,164],"Analysis":[3,15,109,126,165],"domain":[4,169],"an":[5,43],"increasing":[6],"interest":[7],"has":[8],"been":[9],"gaining":[10],"by":[11,23,31,37,90,140],"System":[13,124],"that":[16,110],"aims":[17],"at":[18],"investigating":[19],"risk":[21],"deriving":[22],"interdependence":[25],"of":[26,67,82,85,136,149,158],"system":[28,50],"under":[29],"consideration":[30],"other":[32,57],"systems":[33,59],"and,":[34],"in":[35,47,166],"general,":[36],"interactions":[39],"among":[40],"them.":[41],"Indeed,":[42],"adverse":[44],"event":[45],"occurring":[46],"a":[48,104,112,120],"certain":[49],"can":[51],"cause":[52],"negative":[53],"effects":[54],"on":[55],"interconnected":[58],"and":[60,74,87,95,133,144],"compromise":[61],"their":[62],"operation.":[63],"An":[64],"effective":[65],"analysis":[66],"Systemic":[69,107,137,163],"requires":[71],"suitable":[72],"methods":[73],"techniques":[75],"able":[76],"to":[77,162],"handle":[78],"high":[80],"level":[81],"complexity":[83],"typical":[84],"Systems":[86,88],"characterized":[89],"several":[91],"interconnected,":[92],"distributed,":[93],"autonomous":[94],"changing":[96],"components.":[97],"this":[99],"context,":[100],"paper":[102],"proposes":[103],"method":[105,122],"for":[106,115,123],"combines":[111],"Goal-Oriented":[113],"Methodology":[114],"Requirement":[116],"Modeling":[117],"(GOReM)":[118],"with":[119],"Model-Based":[121],"Dependability":[125],"(RAMSoS).":[127],"Such":[128],"combination":[129],"enables":[130],"modeling":[132],"evaluation":[135,148],"scenarios":[139],"using":[141],"agent-based":[142],"simulations":[143],"complementary":[146],"quantitative":[147],"performance":[150],"indices":[151],"through":[152],"Bayesian":[153],"Networks.":[154],"A":[155],"concrete":[156],"exploitation":[157],"proposed":[160],"approach":[161],"cyber-security":[168],"is":[170],"also":[171],"presented1.":[172]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2026-02-26T08:16:20.718346","created_date":"2025-10-10T00:00:00"}
