{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T03:18:55Z","timestamp":1743045535838,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319165486"},{"type":"electronic","value":"9783319165493"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16549-3_3","type":"book-chapter","created":{"date-parts":[[2015,3,16]],"date-time":"2015-03-16T05:30:34Z","timestamp":1426483834000},"page":"29-41","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Black Holes and Revelations: Using Evolutionary Algorithms to Uncover Vulnerabilities in Disruption-Tolerant Networks"],"prefix":"10.1007","author":[{"given":"Doina","family":"Bucur","sequence":"first","affiliation":[]},{"given":"Giovanni","family":"Iacca","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Squillero","sequence":"additional","affiliation":[]},{"given":"Alberto","family":"Tonda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,17]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Jain, S., Fall, K., Patra, R.: Routing in a delay tolerant network. In: Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM 2004, pp. 145\u2013158. ACM, New York (2004)","DOI":"10.1145\/1015467.1015484"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Borrel, V., Ammar, M.H., Zegura, E.W.: Understanding the wireless and mobile network space: a routing-centered classification. In: Proceedings of the Second ACM Workshop on Challenged Networks, CHANTS 2007, pp. 11\u201318. ACM, New York (2007)","DOI":"10.1145\/1287791.1287795"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Jenkins, A., Kuzminsky, S., Gifford, K., Pitts, R., Nichols, K.: Delay\/disruption-tolerant networking: flight test results from the international space station. In: Aerospace Conference, 2010 IEEE, pp. 1\u20138, March 2010","DOI":"10.1109\/AERO.2010.5446948"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Burgess, J., Gallagher, B., Jensen, D., Levine, B.: Maxprop: routing for vehicle-based disruption-tolerant networks. In: INFOCOM 2006, 25th IEEE International Conference on Computer Communications, pp. 1\u201311, April 2006","DOI":"10.1109\/INFOCOM.2006.228"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Li, F., Wu, J., Srinivasan, A.: Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets. In: INFOCOM 2009, IEEE, pp. 2428\u20132436, April 2009","DOI":"10.1109\/INFCOM.2009.5062170"},{"issue":"3","key":"3_CR6","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1109\/TDSC.2012.84","volume":"10","author":"Q Li","year":"2013","unstructured":"Li, Q., Gao, W., Zhu, S., Cao, G.: To lie or to comply: defending against flood attacks in disruption tolerant networks. IEEE Trans. Dependable Secure Comput. 10(3), 168\u2013182 (2013)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Burgess, J., Bissias, G.D., Corner, M.D., Levine, B.N.: Surviving attacks on disruption-tolerant networks without authentication. In: Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2007, pp. 61\u201370. ACM, New York (2007)","DOI":"10.1145\/1288107.1288116"},{"key":"3_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09426-7","volume-title":"Evolutionary Optimization: The $$\\mu $$GP Toolkit","author":"E Sanchez","year":"2011","unstructured":"Sanchez, E., Schillaci, M., Squillero, G.: Evolutionary Optimization: The $$\\mu $$GP Toolkit, 1st edn. Springer, New York (2011)","edition":"1"},{"key":"3_CR9","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.asoc.2013.12.002","volume":"16","author":"D Bucur","year":"2014","unstructured":"Bucur, D., Iacca, G., Squillero, G., Tonda, A.: The impact of topology on energy consumption for collection tree protocols: an experimental assessment through evolutionary computation. Appl. Soft Comput. 16, 210\u2013222 (2014)","journal-title":"Appl. Soft Comput."},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Bucur, D., Iacca, G., Squillero, G., Tonda, A.: The tradeoffs between data delivery ratio and energy costs in wireless sensor networks: a multi-objective evolutionary framework for protocol analysis. In: Proceedings of the Sixtienth Annual Conference on Genetic and Evolutionary Computation Conference, GECCO 2014. ACM, New York (2014)","DOI":"10.1145\/2576768.2598384"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Ker\u00e4nen, A., Ott, J., K\u00e4rkk\u00e4inen, T.: The ONE simulator for DTN protocol evaluation. In: SIMUTools 2009, Proceedings of the 2nd International Conference on Simulation Tools and Techniques, New York, NY, USA, ICST (2009)","DOI":"10.4108\/ICST.SIMUTOOLS2009.5674"}],"container-title":["Lecture Notes in Computer Science","Applications of Evolutionary Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16549-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T22:55:19Z","timestamp":1676933719000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-16549-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319165486","9783319165493"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16549-3_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"17 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}