{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:31:29Z","timestamp":1742988689174,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030870096"},{"type":"electronic","value":"9783030870102"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-87010-2_39","type":"book-chapter","created":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T21:52:34Z","timestamp":1631224354000},"page":"526-535","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Effective Method for Ensuring the Reliability of a Critical Infrastructure Monitoring Network"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4860-7552","authenticated-orcid":false,"given":"Vladimir V.","family":"Shakhov","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3386-4641","authenticated-orcid":false,"given":"Denis","family":"Migov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,10]]},"reference":[{"issue":"1","key":"39_CR1","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MNET.2011.5687953","volume":"25","author":"Y Sunhee","year":"2011","unstructured":"Sunhee, Y., Wei, Y., Heidemann, J., Littlefield, B., Shahabi, C.: SWATS: wireless sensor networks for steamflood and waterflood pipeline monitoring. IEEE Netw. 25(1), 50\u201356 (2011)","journal-title":"IEEE Netw."},{"key":"39_CR2","doi-asserted-by":"crossref","unstructured":"Phelan, B., et al.: Should I stay or should I go? Maximizing lifetime with relays. In: Proceedings of the IEEE DCOSS 2012, pp. 1\u20138 (2012)","DOI":"10.1109\/DCOSS.2012.24"},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"Mohamed, N., et al.: Failure impact on coverage in linear wireless sensor networks. In: Proceedings of the SPECTS 2013, pp. 188\u2013195 (2013)","DOI":"10.1109\/NCA.2013.36"},{"key":"39_CR4","volume-title":"The Combinatorics of Network Reliability","author":"CJ Colbourn","year":"1987","unstructured":"Colbourn, C.J.: The Combinatorics of Network Reliability. Oxford University Press, New York (1987)"},{"issue":"3","key":"39_CR5","first-page":"577","volume":"5","author":"L Petingi","year":"2011","unstructured":"Petingi, L.: Introduction of a new network reliability model to evaluate the performance of sensor networks. Int. J. Math. Models Meth. Appl. Sci. 5(3), 577\u2013585 (2011)","journal-title":"Int. J. Math. Models Meth. Appl. Sci."},{"key":"39_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-319-10262-7_5","volume-title":"Multiple Access Communications","author":"DA Migov","year":"2014","unstructured":"Migov, D.A., Shakhov, V.: Reliability of ad hoc networks with imperfect nodes. In: Jonsson, M., Vinel, A., Bellalta, B., Belyaev, E. (eds.) MACOM 2014. LNCS, vol. 8715, pp. 49\u201358. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10262-7_5"},{"issue":"1\/2","key":"39_CR7","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1504\/IJSN.2007.012823","volume":"2","author":"F Sun","year":"2007","unstructured":"Sun, F., Shayman, M.A.: On pairwise connectivity of wireless multihop networks. Int. J. Secur. Netw. 2(1\/2), 37\u201349 (2007)","journal-title":"Int. J. Secur. Netw."},{"key":"39_CR8","doi-asserted-by":"crossref","unstructured":"Shazly, M., et al.: On area coverage reliability of wireless sensor networks. In: Proceedings of IEEE Conference on Local Computer Networks (LCN 2011), Bonn, Germany, pp. 580\u2013588 (2011)","DOI":"10.1109\/LCN.2011.6115520"},{"issue":"3","key":"39_CR9","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1109\/TR.1986.4335422","volume":"35","author":"MO Ball","year":"1986","unstructured":"Ball, M.O.: Computational complexity of network reliability analysis: an overview. IEEE Trans. Reliab. 35(3), 230\u2013239 (1986)","journal-title":"IEEE Trans. Reliab."},{"issue":"1","key":"39_CR10","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/s10009-020-00594-9","volume":"23","author":"V Shakhov","year":"2020","unstructured":"Shakhov, V., Koo, I.: Graph-based technique for survivability assessment and optimization of IoT applications. Int. J. Softw. Tools Technol. Transf. 23(1), 105\u2013114 (2020). https:\/\/doi.org\/10.1007\/s10009-020-00594-9","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"39_CR11","doi-asserted-by":"crossref","unstructured":"Shooman, A.M., Kershenbaum, A.: Exact graph-reduction algorithms for network reliability analysis. In: IEEE Global Telecommunications Conference GLOBECOM, vol. 91, pp. 1412\u20131420 (1991)","DOI":"10.1109\/GLOCOM.1991.188601"},{"issue":"3","key":"39_CR12","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/s11786-018-0345-5","volume":"12","author":"H P\u00e9rez-Ros\u00e9s","year":"2018","unstructured":"P\u00e9rez-Ros\u00e9s, H.: Sixty years of network reliability. Math. Comput. Sci. 12(3), 275\u2013293 (2018). https:\/\/doi.org\/10.1007\/s11786-018-0345-5","journal-title":"Math. Comput. Sci."},{"key":"39_CR13","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1002\/net.3230190203","volume":"19","author":"RK Wood","year":"1989","unstructured":"Wood, R.K.: Triconnected decomposition for computing K-terminal network reliability. Networks 19, 203\u2013220 (1989)","journal-title":"Networks"},{"key":"39_CR14","first-page":"425","volume":"13","author":"D Migov","year":"2008","unstructured":"Migov, D.: Methods of network reliability calculation based on the use of vertex cuts. Comput. Technol. 13, 425\u2013431 (2008)","journal-title":"Comput. Technol."},{"issue":"2","key":"39_CR15","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1109\/TR.2012.2196172","volume":"61","author":"AS Rodionov","year":"2012","unstructured":"Rodionov, A.S., Migov, D.A., Rodionova, O.K.: Improvements in the efficiency of cumulative updating of all-terminal network reliability. IEEE Trans. Reliab. 61(2), 460\u2013465 (2012)","journal-title":"IEEE Trans. Reliab."},{"key":"39_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1007\/11807964_71","volume-title":"Emerging Directions in Embedded and Ubiquitous Computing","author":"DA Migov","year":"2006","unstructured":"Migov, D.A., Rodionova, O.K., Rodionov, A.S., Choo, H.: Network probabilistic connectivity: using node cuts. In: Zhou, X., et al. (eds.) EUC 2006. LNCS, vol. 4097, pp. 702\u2013709. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11807964_71"},{"key":"39_CR17","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.dam.2015.06.006","volume":"198","author":"J Burgos","year":"2016","unstructured":"Burgos, J., Amoza, F.: Factorization of network reliability with perfect nodes I: introduction and statements. Discr. Appl. Math. 198, 82\u201390 (2016)","journal-title":"Discr. Appl. Math."},{"issue":"3","key":"39_CR18","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1109\/24.3752","volume":"37","author":"LB Page","year":"1998","unstructured":"Page, L.B., Perry, J.E.: A practical implementation of the factoring theorem for network reliability. IEEE Trans. Reliab. 37(3), 259\u2013267 (1998)","journal-title":"IEEE Trans. Reliab."}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-87010-2_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:20:42Z","timestamp":1725769242000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-87010-2_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030870096","9783030870102"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-87010-2_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"10 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cagliari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Customed version of CyberChair 4","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1588","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"466","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}