{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T05:36:35Z","timestamp":1725600995055},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642232190"},{"type":"electronic","value":"9783642232206"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23220-6_87","type":"book-chapter","created":{"date-parts":[[2011,8,17]],"date-time":"2011-08-17T12:37:47Z","timestamp":1313584667000},"page":"684-690","source":"Crossref","is-referenced-by-count":0,"title":["Utility-Based Network Adversary Model"],"prefix":"10.1007","author":[{"given":"Yunmeng","family":"Tan","sequence":"first","affiliation":[]},{"given":"Shengbin","family":"Liao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"87_CR1","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/363647.363659","volume":"48","author":"A. Borodin","year":"2001","unstructured":"Borodin, A., Kleinberg, J., Raghavan, P., Sudan, M., Williamson, D.: Adversarial queuing theory. Journal of the ACM\u00a048, 13\u201338 (2001)","journal-title":"Journal of the ACM"},{"issue":"5","key":"87_CR2","doi-asserted-by":"publisher","first-page":"1656","DOI":"10.1137\/050639272","volume":"37","author":"E. Anshelevich","year":"2008","unstructured":"Anshelevich, E., Kempe, D., Kleinberg, J.: Stability of load balancing alogrithms in dynamic adversarial systems. SIAM Journal of Comput.\u00a037(5), 1656\u20131673 (2008)","journal-title":"SIAM Journal of Comput."},{"key":"87_CR3","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s00453-005-1162-1","volume":"43","author":"J. Sethuraman","year":"2005","unstructured":"Sethuraman, J., Teo, C.: Effective routing and scheduling in adversarial queueing networks. Algorithmica\u00a043, 133\u2013146 (2005)","journal-title":"Algorithmica"},{"key":"87_CR4","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/s001860050100","volume":"50","author":"J. Kallsen","year":"1999","unstructured":"Kallsen, J.: A utility maximization approach to hedging in incomplete markets. Mathematical Methods of Operations Research\u00a050, 321\u2013338 (1999)","journal-title":"Mathematical Methods of Operations Research"},{"issue":"1","key":"87_CR5","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/JPROC.2006.887322","volume":"95","author":"M. Chiang","year":"2007","unstructured":"Chiang, M., Low, S.H., Calderbank, A.R., Doyle, J.C.: Layering as optimization decomposition: A mathematical theory of network architectures. Proceedings of the IEEE\u00a095(1), 255\u2013312 (2007)","journal-title":"Proceedings of the IEEE"},{"issue":"3","key":"87_CR6","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1057\/palgrave.jors.2600523","volume":"49","author":"F.P. Kelly","year":"1998","unstructured":"Kelly, F.P., Maulloo, A., Tan, D.: Rate control for communication networks: shadow prices, proportional fairness and stability. Journal of the Operational Research Society\u00a049(3), 237\u2013252 (1998)","journal-title":"Journal of the Operational Research Society"},{"issue":"6","key":"87_CR7","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1109\/90.811451","volume":"7","author":"S.H. Low","year":"1999","unstructured":"Low, S.H., Lapsley, D.E.: Optimal flow control, I: Basic algorithm and convergence. IEEE\/ACM Transactions on networking\u00a07(6), 861\u2013874 (1999)","journal-title":"IEEE\/ACM Transactions on networking"},{"key":"87_CR8","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.cose.2009.06.008","volume":"29","author":"C. Zhou","year":"2010","unstructured":"Zhou, C., Leckie, C., Karunasekera, S.: A survey of coordinated attacks and collaborative. Computers & Security\u00a029, 124\u2013140 (2010)","journal-title":"Computers & Security"},{"key":"87_CR9","doi-asserted-by":"crossref","unstructured":"Acs, G., Buttyan, L., Vajda, I.: Modelling adversaries and security objectives for routing protocols in wireless sensor networks. In: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, Alexandria, Virginia, USA, pp. 49\u201358 (2006)","DOI":"10.1145\/1180345.1180352"},{"issue":"10","key":"87_CR10","doi-asserted-by":"publisher","first-page":"1067","DOI":"10.1016\/j.jpdc.2007.06.004","volume":"67","author":"T. Xie","year":"2007","unstructured":"Xie, T., Qin, X.: Performance evaluation of a newscheduling algorithm for distributed systems with security heterogeneity. Journal of Parallel and Distributed Computing\u00a067(10), 1067\u20131081 (2007)","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"87_CR11","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1002\/net.20044","volume":"49","author":"C. Alvarez","year":"2005","unstructured":"Alvarez, C., Blesa, M., Diaz, J., Serna, M.: Adversarial models for priority-based networks. Networks\u00a049, 23\u201335 (2005)","journal-title":"Networks"},{"issue":"4","key":"87_CR12","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1109\/TDSC.2007.70214","volume":"4","author":"M. Haleem","year":"2007","unstructured":"Haleem, M., Mathur, C., Chandramouli, R., Subbalakshmi, K.: Opportunistic encryption: a trade-off between security and throughput in wireless networks. IEEE Transaction on Dependable and Secure Computing\u00a04(4), 313\u2013324 (2007)","journal-title":"IEEE Transaction on Dependable and Secure Computing"},{"issue":"7","key":"87_CR13","doi-asserted-by":"publisher","first-page":"1176","DOI":"10.1109\/49.414637","volume":"13","author":"S. Shenker","year":"1995","unstructured":"Shenker, S.: Fundamental design issues for the future Internet. IEEE Journal of Select Area Communication\u00a013(7), 1176\u20131188 (1995)","journal-title":"IEEE Journal of Select Area Communication"},{"key":"87_CR14","series-title":"Springer series in operations research","doi-asserted-by":"publisher","DOI":"10.1007\/b98874","volume-title":"Numerical optimization","author":"J. Nocedal","year":"1999","unstructured":"Nocedal, J., Wright, S.: Numerical optimization. Springer series in operations research. Springer, Heidelberg (1999)"}],"container-title":["Communications in Computer and Information Science","Applied Informatics and Communication"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23220-6_87","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,26]],"date-time":"2019-01-26T04:33:29Z","timestamp":1548477209000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23220-6_87"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642232190","9783642232206"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23220-6_87","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}