{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T04:08:44Z","timestamp":1750392524292,"version":"3.41.0"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319596075"},{"type":"electronic","value":"9783319596082"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59608-2_8","type":"book-chapter","created":{"date-parts":[[2017,6,13]],"date-time":"2017-06-13T15:29:56Z","timestamp":1497367796000},"page":"144-162","source":"Crossref","is-referenced-by-count":1,"title":["Faulty Node Repair and Dynamically Spawned Black Hole Search"],"prefix":"10.1007","author":[{"given":"Wei","family":"Shi","sequence":"first","affiliation":[]},{"given":"Mengfei","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Jean-Pierre","family":"Corriveau","sequence":"additional","affiliation":[]},{"given":"William Lee","family":"Croft","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,14]]},"reference":[{"key":"8_CR1","unstructured":"Almorsy, M., Grundy, J., and M\u00fcller, I.: An analysis of the cloud computing security problem. In: Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia, 30th Nov (2010)"},{"issue":"2\u20133","key":"8_CR2","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/s00446-003-0088-6","volume":"16","author":"JH Anderson","year":"2003","unstructured":"Anderson, J.H., Kim, Y.-J., Herman, T.: Shared-memory mutual ex- clusion: major research trends since 1986. Distrib. Comput. 16(2\u20133), 75\u2013110 (2003)","journal-title":"Distrib. Comput."},{"key":"8_CR3","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1016\/j.tcs.2014.07.013","volume":"610","author":"B Balamohan","year":"2014","unstructured":"Balamohan, B., Dobrev, S., Flocchini, P., Santoro, N.: Exploring an unknown dangerous graph with a constant number of tokens. Theor. Comput. Sci. 610, 169\u2013181 (2014)","journal-title":"Theor. Comput. Sci."},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-319-09620-9_27","volume-title":"Structural Information and Communication Complexity","author":"E Bampas","year":"2014","unstructured":"Bampas, E., Leonardos, N., Markou, E., Pagourtzis, A., Petrolia, M.: Improved periodic data retrieval in asynchronous rings with a faulty host. In: Halld\u00f3rsson, Magn\u00fas M. (ed.) SIROCCO 2014. LNCS, vol. 8576, pp. 355\u2013370. Springer, Cham (2014). doi: 10.1007\/978-3-319-09620-9_27"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Cai, J., Flocchini, P., Santoro, N.: Network decontamination from a black virus. In: 2013 IEEE 27th International Parallel and Distributed Processing Symposium Workshops and PhD Forum (IPDPSW), pp. 696\u2013705. IEEE (2013)","DOI":"10.1109\/IPDPSW.2013.115"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J.: Controlling data in the cloud: outsourcing computation without outsourcing control. In: Proceedings of the 2009 ACM workshop on Cloud computing security, pp. 85\u201390. ACM (2009)","DOI":"10.1145\/1655008.1655020"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/11945529_23","volume-title":"Principles of Distributed Systems","author":"C Cooper","year":"2006","unstructured":"Cooper, C., Klasing, R., Radzik, T.: Searching for black-hole faults in a network using multiple agents. In: Shvartsman, M.M.A.A. (ed.) OPODIS 2006. LNCS, vol. 4305, pp. 320\u2013332. Springer, Heidelberg (2006). doi: 10.1007\/11945529_23"},{"issue":"14\u201315","key":"8_CR8","doi-asserted-by":"crossref","first-page":"1638","DOI":"10.1016\/j.tcs.2010.01.011","volume":"411","author":"C Cooper","year":"2010","unstructured":"Cooper, C., Klasing, R., Radzik, T.: Locating and repairing faults in a network with mobile agents. Theor. Comput. Sci. 411(14\u201315), 1638\u20131647 (2010)","journal-title":"Theor. Comput. Sci."},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/11516798_5","volume-title":"Principles of Distributed Systems","author":"J Czyzowicz","year":"2005","unstructured":"Czyzowicz, J., Kowalski, D., Markou, E., Pelc, A.: Searching for a black hole in tree networks. In: Higashino, T. (ed.) OPODIS 2004. LNCS, vol. 3544, pp. 67\u201380. Springer, Heidelberg (2005). doi: 10.1007\/11516798_5"},{"issue":"2\u20133","key":"8_CR10","doi-asserted-by":"crossref","first-page":"229","DOI":"10.3233\/FUN-2006-712-305","volume":"71","author":"J Czyzowicz","year":"2006","unstructured":"Czyzowicz, J., Kowalski, D., Markou, E., Pelc, A.: Complexity of searching for a black hole. Fundamenta Informaticae 71(2\u20133), 229\u2013242 (2006)","journal-title":"Fundamenta Informaticae"},{"issue":"4","key":"8_CR11","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1017\/S0963548306008133","volume":"16","author":"J Czyzowicz","year":"2007","unstructured":"Czyzowicz, J., Kowalski, D., Markou, E., Pelc, A.: Searching for a black hole in synchronous tree networks. Comb. Probab. Comput. 16(4), 595\u2013619 (2007)","journal-title":"Comb. Probab. Comput."},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/978-3-642-39247-4_12","volume-title":"Ad-hoc, Mobile, and Wireless Network","author":"M D\u2019Emidio","year":"2013","unstructured":"D\u2019Emidio, M., Frigioni, D., Navarra, A.: Exploring and making safe dangerous networks using mobile entities. In: Cicho\u0144, J., Ge\u0327bala, M., Klonowski, M. (eds.) ADHOC-NOW 2013. LNCS, vol. 7960, pp. 136\u2013147. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-39247-4_12"},{"key":"8_CR13","unstructured":"Dobrev, S., Flocchini, P., Kralovic, R., Prencipe, G., Ruzicka, P., Santoro, N.: Black hole search by mobile agents in hypercubes and related networks. In: OPODIS, vol. 3, pp. 169\u2013180 (2002)"},{"key":"8_CR14","series-title":"IFIP International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-0-387-34735-6_14","volume-title":"Fourth IFIP International Conference on Theoretical Computer Science- TCS 2006","author":"S Dobrev","year":"2006","unstructured":"Dobrev, S., Flocchini, P., Kr\u00e1lovi\u010d, R., Santoro, N.: Exploring an unknown graph to locate a black hole using tokens. In: Navarro, G., Bertossi, L., Kohayakawa, Y. (eds.) TCS 2006. IIFIP, vol. 209, pp. 131\u2013150. Springer, Boston, MA (2006). doi: 10.1007\/978-0-387-34735-6_14"},{"key":"8_CR15","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1016\/j.tcs.2012.11.022","volume":"472","author":"S Dobrev","year":"2013","unstructured":"Dobrev, S., Flocchini, P., Kr\u00e1lovi\u010d, R., Santoro, N.: Exploring an unknown dangerous graph using tokens. Theor. Comput. Sci. 472, 28\u201345 (2013)","journal-title":"Theor. Comput. Sci."},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/3-540-45414-4_12","volume-title":"Distributed Computing","author":"S Dobrev","year":"2001","unstructured":"Dobrev, S., Flocchini, P., Prencipe, G., Santoro, N.: Mobile search for a black hole in an anonymous ring. In: Welch, J. (ed.) DISC 2001. LNCS, vol. 2180, pp. 166\u2013179. Springer, Heidelberg (2001). doi: 10.1007\/3-540-45414-4_12"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Dobrev, S., Flocchini, P., Prencipe, G., Santoro, N.: Searching for a black hole in arbitrary networks: optimal mobile agent protocols. In: Proceedings of the Twenty-first Annual Symposium on Principles of Distributed Computing, NY, USA, PODC 2002, pp. 153\u2013162. ACM, New York (2002)","DOI":"10.1145\/571825.571853"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-540-27860-3_6","volume-title":"Principles of Distributed Systems","author":"S Dobrev","year":"2004","unstructured":"Dobrev, S., Flocchini, P., Prencipe, G., Santoro, N.: Multiple agents rendezvous in a ring in spite of a black hole. In: Papatriantafilou, M., Hunel, P. (eds.) OPODIS 2003. LNCS, vol. 3144, pp. 34\u201346. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-27860-3_6"},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-540-27796-5_11","volume-title":"Structural Information and Communication Complexity","author":"S Dobrev","year":"2004","unstructured":"Dobrev, S., Flocchini, P., Santoro, N.: Improved bounds for optimal black hole search with a network map. In: Kr\u00e1lovic\u0306, R., S\u00fdkora, O. (eds.) SIROCCO 2004. LNCS, vol. 3104, pp. 111\u2013122. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-27796-5_11"},{"key":"8_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"608","DOI":"10.1007\/978-3-540-74466-5_64","volume-title":"Euro-Par 2007 Parallel Processing","author":"S Dobrev","year":"2007","unstructured":"Dobrev, S., Santoro, N., Shi, W.: Locating a black hole in an un-oriented ring using tokens: the case of scattered agents. In: Kermarrec, A.-M., Boug\u00e9, L., Priol, T. (eds.) Euro-Par 2007. LNCS, vol. 4641, pp. 608\u2013617. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-74466-5_64"},{"key":"8_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/978-3-642-13122-6_20","volume-title":"Fun with Algorithms","author":"P Flocchini","year":"2010","unstructured":"Flocchini, P., Kellett, M., Mason, Peter C., Santoro, N.: Mapping an unfriendly subway system. In: Boldi, P., Gargano, L. (eds.) FUN 2010. LNCS, vol. 6099, pp. 190\u2013201. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-13122-6_20"},{"key":"8_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-642-33536-5_30","volume-title":"Stabilization, Safety, and Security of Distributed Systems","author":"P Flocchini","year":"2012","unstructured":"Flocchini, P., Kellett, M., Mason, Peter C., Santoro, N.: Fault-tolerant exploration of an unknown dangerous graph by scattered agents. In: Richa, Andr\u00e9a W., Scheideler, C. (eds.) SSS 2012. LNCS, vol. 7596, pp. 299\u2013313. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-33536-5_30"},{"key":"8_CR23","unstructured":"Flocchini, P., Luccio, F.L., Song, L.X.: Size optimal strategies for capturing an intruder in mesh networks. In: Communications in Computing, pp. 200\u2013206 (2005)"},{"issue":"2","key":"8_CR24","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MSP.2010.115","volume":"9","author":"B Grobauer","year":"2011","unstructured":"Grobauer, B., Walloschek, T., Stocker, E.: Understanding cloud computing vulnerabilities. IEEE Secur. Priv. 9(2), 50\u201357 (2011)","journal-title":"IEEE Secur. Priv."},{"issue":"1","key":"8_CR25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1869-0238-4-5","volume":"4","author":"K Hashizume","year":"2013","unstructured":"Hashizume, K., Rosado, D.G., Fern\u00e1ndez-Medina, E., Fernandez, E.B.: An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4(1), 1\u201313 (2013)","journal-title":"J. Internet Serv. Appl."},{"issue":"2","key":"8_CR26","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/j.tcs.2007.04.024","volume":"384","author":"R Klasing","year":"2007","unstructured":"Klasing, R., Markou, E., Radzik, T., Sarracco, F.: Hardness and approximation results for black hole search in arbitrary networks. Theor. Comput. Sci. 384(2), 201\u2013221 (2007)","journal-title":"Theor. Comput. Sci."},{"issue":"4","key":"8_CR27","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1002\/net.20233","volume":"52","author":"R Klasing","year":"2008","unstructured":"Klasing, R., Markou, E., Radzik, T., Sarracco, F.: Approximation bounds for black hole search problems. Networks 52(4), 216\u2013226 (2008)","journal-title":"Networks"},{"key":"8_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-642-10877-8_9","volume-title":"Principles of Distributed Systems","author":"A Kosowski","year":"2009","unstructured":"Kosowski, A., Navarra, A., Pinotti, Cristina M.: Synchronization helps robots to detect black holes in directed graphs. In: Abdelzaher, T., Raynal, M., Santoro, N. (eds.) OPODIS 2009. LNCS, vol. 5923, pp. 86\u201398. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-10877-8_9"},{"key":"8_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-3-642-13284-1_13","volume-title":"Structural Information and Communication Complexity","author":"R Kr\u00e1lovi\u010d","year":"2010","unstructured":"Kr\u00e1lovi\u010d, R., Mikl\u00edk, S.: Periodic data retrieval problem in rings containing a malicious host. In: Patt-Shamir, B., Ekim, T. (eds.) SIROCCO 2010. LNCS, vol. 6058, pp. 157\u2013167. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-13284-1_13"},{"key":"8_CR30","unstructured":"Luccio, F.L., Markou, E.: Mobile agents rendezvous in spite of a malicious agent (2014). arXiv:1410.4772"},{"key":"8_CR31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jpdc.2015.10.006","volume":"88","author":"M Peng","year":"2016","unstructured":"Peng, M., Shi, W., Corriveau, J.-P., Pazzi, R., Wang, Y.: Black hole search in computer networks: state-of-the-art, challenges and future directions. J. Parallel Distrib. Comput. 88, 1\u201315 (2016)","journal-title":"J. Parallel Distrib. Comput."},{"issue":"1","key":"8_CR32","doi-asserted-by":"crossref","first-page":"1945","DOI":"10.1016\/j.jpdc.2013.08.009","volume":"74","author":"W Shi","year":"2014","unstructured":"Shi, W., Garcia-Alfaro, J., Corriveau, J.-P.: Searching for a black hole in interconnected networks using mobile agents and tokens. J. Parallel Distrib. Comput. 74(1), 1945\u20131958 (2014)","journal-title":"J. Parallel Distrib. Comput."},{"key":"8_CR33","volume-title":"The Art of Computer Virus Research and Defense","author":"P Szor","year":"2005","unstructured":"Szor, P.: The Art of Computer Virus Research and Defense. Pearson Education, New Jersey (2005)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59608-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T14:52:44Z","timestamp":1750344764000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59608-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319596075","9783319596082"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59608-2_8","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017]]}}}