{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T00:40:09Z","timestamp":1749688809025,"version":"3.41.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491509"},{"type":"electronic","value":"9783319491516"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49151-6_10","type":"book-chapter","created":{"date-parts":[[2016,11,4]],"date-time":"2016-11-04T02:09:46Z","timestamp":1478225386000},"page":"137-150","source":"Crossref","is-referenced-by-count":0,"title":["Masking Algorithm for Multiple Crosstalk Attack Source Identification Under Greedy Sparse Monitoring"],"prefix":"10.1007","author":[{"given":"Hong Wei","family":"Siew","sequence":"first","affiliation":[]},{"given":"Saw Chin","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Ching Kwang","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,5]]},"reference":[{"issue":"3","key":"10_CR1","doi-asserted-by":"crossref","first-page":"696","DOI":"10.1109\/LPT.2004.841002","volume":"17","author":"H Yoon-Suk","year":"2005","unstructured":"Yoon-Suk, H., Gyo-Sun, H., Jin-Young, J., Kyung-Goo, L., Kyung-Woon, S., Sang Soo, L., Keon Young, Y., Jae-seung, L.: 1-Tb\/s (100&times;12.4 gb\/s) transmission of 12.5-GHz-spaced ultradense WDM channels over a standard single-mode fiber of 1200 km. IEEE Photonics Technol. Lett. 17(3), 696\u2013698 (2005)","journal-title":"IEEE Photonics Technol. Lett."},{"issue":"6","key":"10_CR2","doi-asserted-by":"crossref","first-page":"1390","DOI":"10.1109\/TNET.2005.860103","volume":"13","author":"W Tao","year":"2005","unstructured":"Tao, W., Somani, K.A.: Crosstalk attack monitoring and localization in all-optical networks. IEEE\/ACM Trans. Netw. 13(6), 1390\u20131401 (2005)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"3","key":"10_CR3","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/65.587049","volume":"11","author":"M Medard","year":"1997","unstructured":"Medard, M., Marquis, D., Barry, R.A., Finn, S.G.: Security issues in all-optical networks. IEEE Network 11(3), 42\u201348 (1997)","journal-title":"IEEE Network"},{"doi-asserted-by":"crossref","unstructured":"Yeom, J., Tonguz, O.K.: Security and self-organization in transparent optical networks: an overview. In: Proceedings of the 1st International Conference on Access Networks, Athens, Greece, pp. 13 (2006)","key":"10_CR4","DOI":"10.1145\/1189355.1189368"},{"issue":"4","key":"10_CR5","doi-asserted-by":"crossref","first-page":"269","DOI":"10.3233\/HSN-2001-204","volume":"10","author":"I Katzela","year":"2001","unstructured":"Katzela, I., Ellinas, G., Yoon, W.S., Stern, T.E.: Fault diagnosis in optical networks. J. High Speed Netw. 10(4), 269\u2013291 (2001)","journal-title":"J. High Speed Netw."},{"issue":"4","key":"10_CR6","first-page":"73","volume":"2","author":"C Mas","year":"2001","unstructured":"Mas, C., Thiran, P.: A review on fault location methods and their application to optical networks. Opt. Netw. Mag. 2(4), 73\u201387 (2001)","journal-title":"Opt. Netw. Mag."},{"issue":"3","key":"10_CR7","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1007\/s11107-005-7355-3","volume":"11","author":"H Zeng","year":"2006","unstructured":"Zeng, H., Huang, C., Vukovic, A.: A novel fault detection and localization scheme for meshed all-optical networks based on monitoring-cycles. Photonic Netw. Commun. 11(3), 277\u2013286 (2006)","journal-title":"Photonic Netw. Commun."},{"issue":"1","key":"10_CR8","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1109\/JLT.2003.822154","volume":"22","author":"DC Kilper","year":"2004","unstructured":"Kilper, D.C., Bach, R., Blumenthal, D.J., Einstein, D., Landolsi, T., Ostar, L., Preiss, M., Willner, A.E.: Optical performance monitoring. IEEE J. Lightwave Technol. 22(1), 294\u2013304 (2004)","journal-title":"IEEE J. Lightwave Technol."},{"doi-asserted-by":"crossref","unstructured":"Patell, J.K., Kim, S.U., Su, D.H., Subramaniam, S.S.: A framework for managing faults and attacks in all-optical transport networks. In: DARPA Information Survivability Conference and Exposition II, DISCEX 2001. Proceedings, pp. 137\u2013145 (2001)","key":"10_CR9","DOI":"10.1109\/DISCEX.2001.932166"},{"issue":"3","key":"10_CR10","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/JSAC-OCN.2007.022305","volume":"25","author":"G Liu","year":"2007","unstructured":"Liu, G., Ji, C.: Resilience of all-optical network architectures under in-band crosstalk attacks: a probabilistic graphical model approach. IEEE J. Sel. Areas Commun. 25(3), 2\u201317 (2007)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"8","key":"10_CR11","doi-asserted-by":"crossref","first-page":"085002","DOI":"10.1117\/1.3607412","volume":"50","author":"Y Peng","year":"2011","unstructured":"Peng, Y., Sun, Z., Du, S., Long, K.: Propagation of all-optical crosstalk attack in transparent optical networks. Opt. Eng. 50(8), 085002 (2011)","journal-title":"Opt. Eng."},{"doi-asserted-by":"crossref","unstructured":"Sharma, N.: Effects of crosstalk propagation on the performance of all-optical networks. In: 1st International Conference on Recent Advances in Information Technology, pp. 240\u2013245 (2012)","key":"10_CR12","DOI":"10.1109\/RAIT.2012.6194513"},{"issue":"1","key":"10_CR13","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/s12204-015-1580-4","volume":"20","author":"YF Zhang","year":"2015","unstructured":"Zhang, Y.F., Ren, S., Li, J., Liao, X.M., Li, M., Fang, Y.Y.: Research on high power inter-channel crosstalk attack in optical networks. J. Shanghai Jiaotong Univ. (Sci.) 20(1), 7\u201313 (2015)","journal-title":"J. Shanghai Jiaotong Univ. (Sci.)"},{"issue":"4","key":"10_CR14","doi-asserted-by":"crossref","first-page":"247","DOI":"10.3233\/HSN-2001-205","volume":"10","author":"M Mdard","year":"2001","unstructured":"Mdard, M., Chinn, S.R., Saengudomlert, P.: Node wrappers for QoS monitoring in transparent optical nodes. J. High Speed Netw. 10(4), 247\u2013268 (2001)","journal-title":"J. High Speed Netw."},{"key":"10_CR15","doi-asserted-by":"crossref","first-page":"1438","DOI":"10.1109\/49.257935","volume":"11","author":"H Deng","year":"1993","unstructured":"Deng, H., Lazar, A.A., Wang, W.: A probabilistic approach to fault diagnosis in linear lightwave networks. IEEE J. Sel. Areas Commun. 11, 1438\u20131448 (1993)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"8","key":"10_CR16","doi-asserted-by":"crossref","first-page":"1508","DOI":"10.1109\/JSAC.2005.852182","volume":"23","author":"C Mas","year":"2005","unstructured":"Mas, C., Tomkos, I., Tonguz, K.O.: Failure location algorithm for transparent optical networks. IEEE J. Sel. Areas Commun. 23(8), 1508\u20131519 (2005)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10_CR17","first-page":"223","volume":"44","author":"P Jaccard","year":"1998","unstructured":"Jaccard, P.: Nouvelles recherches sur la distribution florale. Bulletin de la Soci\u00e8te Vaudense des Sciences Naturelles 44, 223\u2013270 (1998)","journal-title":"Bulletin de la Soci\u00e8te Vaudense des Sciences Naturelles"},{"issue":"3","key":"10_CR18","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1287\/moor.4.3.233","volume":"4","author":"V Chvatal","year":"1979","unstructured":"Chvatal, V.: A Greedy heuristic for the set-covering problem. Math. Oper. Res. 4(3), 233\u2013235 (1979)","journal-title":"Math. Oper. Res."},{"issue":"1","key":"10_CR19","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/BF01386390","volume":"1","author":"EW Dijkstra","year":"1959","unstructured":"Dijkstra, E.W.: A note on two problems in connection with graphs. Numer. Math. 1(1), 269\u2013271 (1959). doi: 10.1007\/BF01386390","journal-title":"Numer. Math."}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49151-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T00:00:29Z","timestamp":1749686429000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49151-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319491509","9783319491516"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49151-6_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}