{"id":"https://openalex.org/W4233865349","doi":"https://doi.org/10.23919/ifipnetworking.2019.8816845","title":"The Risk of Successive Disasters: A Blow-by-Blow Network Vulnerability Analysis","display_name":"The Risk of Successive Disasters: A Blow-by-Blow Network Vulnerability Analysis","publication_year":2019,"publication_date":"2019-05-20","ids":{"openalex":"https://openalex.org/W4233865349","doi":"https://doi.org/10.23919/ifipnetworking.2019.8816845"},"language":"en","primary_location":{"id":"doi:10.23919/ifipnetworking.2019.8816845","is_oa":false,"landing_page_url":"https://doi.org/10.23919/ifipnetworking.2019.8816845","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IFIP Networking Conference (IFIP Networking)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://resolver.tudelft.nl/uuid:30d7006b-407c-4e92-903d-2abe75beb4b6","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026289856","display_name":"Jorik Oostenbrink","orcid":"https://orcid.org/0000-0001-5396-3060"},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Jorik Oostenbrink","raw_affiliation_strings":["Delft University of Technology"],"affiliations":[{"raw_affiliation_string":"Delft University of Technology","institution_ids":["https://openalex.org/I98358874"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069179616","display_name":"Fernando Kuipers","orcid":"https://orcid.org/0000-0002-6686-8350"},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Fernando Kuipers","raw_affiliation_strings":["Delft University of Technology"],"affiliations":[{"raw_affiliation_string":"Delft University of Technology","institution_ids":["https://openalex.org/I98358874"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5026289856"],"corresponding_institution_ids":["https://openalex.org/I98358874"],"apc_list":null,"apc_paid":null,"fwci":0.1853,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.61189428,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9882000088691711,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.8382065296173096},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6065257787704468},{"id":"https://openalex.org/keywords/realization","display_name":"Realization (probability)","score":0.5501320362091064},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.5192939639091492},{"id":"https://openalex.org/keywords/disaster-recovery","display_name":"Disaster recovery","score":0.49815917015075684},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3524860143661499},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.15188246965408325},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.10416954755783081},{"id":"https://openalex.org/keywords/psychological-resilience","display_name":"Psychological resilience","score":0.0659652054309845}],"concepts":[{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.8382065296173096},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6065257787704468},{"id":"https://openalex.org/C2781089630","wikidata":"https://www.wikidata.org/wiki/Q21856745","display_name":"Realization (probability)","level":2,"score":0.5501320362091064},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.5192939639091492},{"id":"https://openalex.org/C129230348","wikidata":"https://www.wikidata.org/wiki/Q1140205","display_name":"Disaster recovery","level":2,"score":0.49815917015075684},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3524860143661499},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15188246965408325},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.10416954755783081},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0659652054309845},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.23919/ifipnetworking.2019.8816845","is_oa":false,"landing_page_url":"https://doi.org/10.23919/ifipnetworking.2019.8816845","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IFIP Networking Conference (IFIP Networking)","raw_type":"proceedings-article"},{"id":"pmh:oai:tudelft.nl:uuid:30d7006b-407c-4e92-903d-2abe75beb4b6","is_oa":true,"landing_page_url":"http://resolver.tudelft.nl/uuid:30d7006b-407c-4e92-903d-2abe75beb4b6","pdf_url":"http://resolver.tudelft.nl/uuid:30d7006b-407c-4e92-903d-2abe75beb4b6","source":{"id":"https://openalex.org/S4306400906","display_name":"Research Repository (Delft University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I98358874","host_organization_name":"Delft University of Technology","host_organization_lineage":["https://openalex.org/I98358874"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"conference paper"}],"best_oa_location":{"id":"pmh:oai:tudelft.nl:uuid:30d7006b-407c-4e92-903d-2abe75beb4b6","is_oa":true,"landing_page_url":"http://resolver.tudelft.nl/uuid:30d7006b-407c-4e92-903d-2abe75beb4b6","pdf_url":"http://resolver.tudelft.nl/uuid:30d7006b-407c-4e92-903d-2abe75beb4b6","source":{"id":"https://openalex.org/S4306400906","display_name":"Research Repository (Delft University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I98358874","host_organization_name":"Delft University of Technology","host_organization_lineage":["https://openalex.org/I98358874"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"conference paper"},"sustainable_development_goals":[{"score":0.7799999713897705,"id":"https://metadata.un.org/sdg/13","display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4233865349.pdf","grobid_xml":"https://content.openalex.org/works/W4233865349.grobid-xml"},"referenced_works_count":17,"referenced_works":["https://openalex.org/W1645858368","https://openalex.org/W1996857783","https://openalex.org/W2031946689","https://openalex.org/W2049776854","https://openalex.org/W2055693580","https://openalex.org/W2066645961","https://openalex.org/W2106517882","https://openalex.org/W2118404561","https://openalex.org/W2120075079","https://openalex.org/W2131493074","https://openalex.org/W2158192895","https://openalex.org/W2175373329","https://openalex.org/W2175941546","https://openalex.org/W2181317062","https://openalex.org/W2499574849","https://openalex.org/W2757833209","https://openalex.org/W2766446619"],"related_works":["https://openalex.org/W1883246888","https://openalex.org/W2370114625","https://openalex.org/W1756374135","https://openalex.org/W2947584067","https://openalex.org/W3118510577","https://openalex.org/W2280562859","https://openalex.org/W230721595","https://openalex.org/W3157230915","https://openalex.org/W1496728123","https://openalex.org/W2062873522"],"abstract_inverted_index":{"It":[0],"is":[1,161],"often":[2],"assumed":[3],"that":[4,21,42,106,139],"a":[5,15,23,34,53,67,70,84,92,114,123,143,162],"network":[6,85,124,148],"will":[7,26],"not":[8,27,47],"be":[9,152],"struck":[10],"by":[11],"multiple":[12],"disasters":[13,45,95],"in":[14,96],"relatively":[16],"short":[17,156],"period":[18],"of":[19,33,44,62,76,90,94,122,142,169],"time;":[20],"is,":[22],"subsequent":[24],"disaster":[25,87,135,145],"strike":[28],"within":[29],"the":[30,60,74,120,140,147,167],"recovery":[31,102,150],"phase":[32],"previous":[35],"disaster.":[36],"However,":[37],"recent":[38],"events":[39],"have":[40],"shown":[41],"combinations":[43],"are":[46],"implausible.":[48],"This":[49],"realization":[50],"calls":[51],"for":[52,69,155],"new":[54],"perspective":[55],"on":[56,105],"how":[57],"we":[58,108,137],"assess":[59,73],"vulnerability":[61,75,121,168],"our":[63,130],"networks":[64,77,170],"and":[65,86,113],"shows":[66],"need":[68],"framework":[71,160],"to":[72,78,118,125,132,171],"successive":[79,126,173],"independent":[80],"disasters.":[81,127,174],"We":[82],"propose":[83],"model":[88],"capable":[89],"modeling":[91],"sequence":[93],"time,":[97],"while":[98],"taking":[99],"into":[100],"account":[101],"operations.":[103],"Based":[104],"model,":[107],"develop":[109],"both":[110],"an":[111],"exact":[112],"Monte":[115],"Carlo":[116],"method":[117],"compute":[119],"By":[128],"applying":[129],"approach":[131],"real":[133],"empirical":[134],"data,":[136],"show":[138],"probability":[141],"second":[144],"striking":[146],"during":[149],"can":[151],"significant":[153],"even":[154],"repair":[157],"times.":[158],"Our":[159],"first":[163],"step":[164],"towards":[165],"determining":[166],"such":[172]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-11T14:59:36.786465","created_date":"2025-10-10T00:00:00"}
