{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T09:42:30Z","timestamp":1773654150765,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,6,17]],"date-time":"2016-06-17T00:00:00Z","timestamp":1466121600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100005203","name":"OeAD","doi-asserted-by":"crossref","award":["UA 07\/2013"],"award-info":[{"award-number":["UA 07\/2013"]}],"id":[{"id":"10.13039\/501100005203","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1007\/s10586-016-0582-9","type":"journal-article","created":{"date-parts":[[2016,6,17]],"date-time":"2016-06-17T06:30:32Z","timestamp":1466145032000},"page":"1183-1200","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Security of grid structures under disguised traffic attacks"],"prefix":"10.1007","volume":"19","author":[{"given":"D. A.","family":"Zaitsev","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"T. R.","family":"Shmeleva","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"W.","family":"Retschitzegger","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"B.","family":"Pr\u00f6ll","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,6,17]]},"reference":[{"key":"582_CR1","unstructured":"Grid and Cloud Computing: Concepts, Methodologies, Tools and Applications, vol. 4. Information Resources Management Association (USA), IGI-Global (2012). http:\/\/www.igi-global.com\/book\/grid-cloud-computing\/60756"},{"key":"582_CR2","doi-asserted-by":"crossref","unstructured":"Preve, N.P. (ed.): Grid Computing: Towards a Global Interconnected Infrastructure. Springer, London (2011)","DOI":"10.1007\/978-0-85729-676-4"},{"key":"582_CR3","volume-title":"Parallel Processing and Parallel Algorithms","author":"SH Roosta","year":"2006","unstructured":"Roosta, S.H.: Parallel Processing and Parallel Algorithms. Springer, New York (2006)"},{"key":"582_CR4","volume-title":"Hypercube Algorithms: with Application to Image Processing and Pattern Recognition","author":"S Ranka","year":"2011","unstructured":"Ranka, S., Sahni, S.: Hypercube Algorithms: with Application to Image Processing and Pattern Recognition. Springer, New York (2011)"},{"key":"582_CR5","volume-title":"Computational Optimization of Systems Governed by Partial Differential Equations","author":"A Borzi","year":"2012","unstructured":"Borzi, A., Schulz, V.: Computational Optimization of Systems Governed by Partial Differential Equations. SIAM, Philadelphia (2012)"},{"key":"582_CR6","doi-asserted-by":"crossref","DOI":"10.1137\/1.9781611971200","volume-title":"Numerical Methods for Unconstrained Optimization and Nonlinear Equations","author":"JR Dennis Jr","year":"1996","unstructured":"Dennis Jr., J.R., Schnabel, R.B.: Numerical Methods for Unconstrained Optimization and Nonlinear Equations. SIAM, Philadelphia (1996)"},{"key":"582_CR7","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4471-5460-0","volume-title":"Analysis of Finite Difference Schemes","author":"BS Jovanovic","year":"2014","unstructured":"Jovanovic, B.S., Suli, E.: Analysis of Finite Difference Schemes. Springer, London (2014)"},{"key":"582_CR8","volume-title":"Reactor Physics: Numerical Methods","author":"WJ Garland","year":"2004","unstructured":"Garland, W.J.: Reactor Physics: Numerical Methods. Ontario University, Ontario (2004)"},{"key":"582_CR9","volume-title":"Plasma Physics and Controlled Nuclear Fusion","author":"K Miyamoto","year":"2005","unstructured":"Miyamoto, K.: Plasma Physics and Controlled Nuclear Fusion. Springer, Berlin (2005)"},{"key":"582_CR10","doi-asserted-by":"crossref","DOI":"10.1002\/047122460X","volume-title":"Reliability of Computer Systems and Networks: Fault Tolerance, Analysis, and Design","author":"ML Shooman","year":"2002","unstructured":"Shooman, M.L.: Reliability of Computer Systems and Networks: Fault Tolerance, Analysis, and Design. Wiley, New York (2002)"},{"issue":"56","key":"582_CR11","first-page":"444","volume":"3","author":"Yuan-Shun Dai","year":"2007","unstructured":"Dai, Yuan-Shun, Levitin, G.: Optimal resource allocation for maximizing performance and reliability in tree-structured grid services. IEEE Trans. Reliab. 3(56), 444\u2013453 (2007)","journal-title":"IEEE Trans. Reliab."},{"issue":"55","key":"582_CR12","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TR.2006.879651","volume":"3","author":"G Levitin","year":"2006","unstructured":"Levitin, G., Dai, Y.S., Ben-Haim, H.: Reliability and performance of star topology grid service with precedence constraints on subtask execution. IEEE Trans. Reliab. 3(55), 507\u2013515 (2006)","journal-title":"IEEE Trans. Reliab."},{"issue":"61","key":"582_CR13","first-page":"452","volume":"2","author":"Pao-Lien Lai","year":"2012","unstructured":"Lai, Pao-Lien: A systematic algorithm for identifying faults on hypercube-like networks under the comparison model. IEEE Trans. Reliab. 2(61), 452\u2013459 (2012)","journal-title":"IEEE Trans. Reliab."},{"issue":"54","key":"582_CR14","first-page":"402","volume":"3","author":"Wu Jie","year":"2005","unstructured":"Jie, Wu, Gao, Feng, Li, Zhongcheng, Min, Yinghua: Optimal, and reliable communication in hypercubes using extended safety vectors. IEEE Trans. Reliab. 3(54), 402\u2013411 (2005)","journal-title":"IEEE Trans. Reliab."},{"key":"582_CR15","doi-asserted-by":"crossref","unstructured":"Kumar, M., Hanumanthappa, M., Kumar, T.V.S. Intrusion detection system for grid computing using SNORT. 2012 International Conference on Computing, Communication and Applications (ICCCA), 2012, 1\u20136","DOI":"10.1109\/ICCCA.2012.6179141"},{"issue":"49","key":"582_CR16","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1109\/24.877337","volume":"2","author":"N Lopez-Benitez","year":"2000","unstructured":"Lopez-Benitez, N.: Petri-net based performance-evaluation of distributed homogeneous task systems. IEEE Trans. Reliab. 2(49), 188\u2013198 (2000)","journal-title":"IEEE Trans. Reliab."},{"issue":"4","key":"582_CR17","doi-asserted-by":"crossref","first-page":"741","DOI":"10.1109\/TSG.2011.2160000","volume":"2","author":"TM Chen","year":"2011","unstructured":"Chen, T.M., Sanchez-Aarnoutse, J.C., Buford, J.: Petri net modeling of cyber-physical attacks on smart grid. IEEE Trans. Smart Grid 2(4), 741\u2013749 (2011)","journal-title":"IEEE Trans. Smart Grid"},{"key":"582_CR18","doi-asserted-by":"crossref","unstructured":"Mitchell, R., Chen, I.: Effect of intrusion detection and response on reliability of cyber physical systems. IEEE Trans. Reliab. 1(62), 199\u2013210 (2013)","DOI":"10.1109\/TR.2013.2240891"},{"key":"582_CR19","volume-title":"Encyclopedia of Information Science and Technology, Vol 10","author":"DA Zaitsev","year":"2014","unstructured":"Zaitsev, D.A., Zaitsev, I.D., Shmeleva, T.R.: Infinite petri nets as models of grids, chapter\u00a019. In: Khosrow-Pour, M. (ed.) Encyclopedia of Information Science and Technology, Vol 10, 3rd edn. IGI-Global, Pennsylvania (2014)","edition":"3"},{"key":"582_CR20","doi-asserted-by":"crossref","DOI":"10.1007\/b95112","volume-title":"Coloured Petri Nets: Modelling and Validation of Concurrent Systems","author":"K Jensen","year":"2009","unstructured":"Jensen, K., Kristensen, L.M.: Coloured Petri Nets: Modelling and Validation of Concurrent Systems. Springer, Berlin (2009)"},{"key":"582_CR21","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/8811.001.0001","volume-title":"Modeling Business Processes: A Petri Net-Oriented Approach","author":"W Aalst","year":"2011","unstructured":"Aalst, W., Stahl, C.: Modeling Business Processes: A Petri Net-Oriented Approach. MIT Press, Cambridge (2011)"},{"key":"582_CR22","volume-title":"Clans of Petri Nets: Verification of Protocols and Performance Evaluation of Networks","author":"DA Zaitsev","year":"2013","unstructured":"Zaitsev, D.A.: Clans of Petri Nets: Verification of Protocols and Performance Evaluation of Networks. LAP LAMBERT Academic Publishing, Saarbr\u00fccken (2013)"},{"key":"582_CR23","unstructured":"http:\/\/cpntools.org"},{"key":"582_CR24","first-page":"202","volume":"6412","author":"N Baumgartner","year":"2010","unstructured":"Baumgartner, N., Gottesheim, W., Mitsch, S., Retschitzegger, W., Schwinger, W.: Situation Prediction Nets. Springer, LNCS 6412, 202\u2013218 (2010)","journal-title":"Springer, LNCS"},{"key":"582_CR25","volume-title":"Web Engineering","author":"G Kappel","year":"2006","unstructured":"Kappel, G., Proll, B., Reich, S., Retschitzegger, W.: Web Engineering. Wiley, New York (2006)"},{"key":"582_CR26","unstructured":"MPI: A Message-Passing Interface Standard. Version 3.0. Message Passing Interface Forum, September 21 (2012)"},{"key":"582_CR27","volume-title":"Solving Problems on Concurrent Processors. Volume 1: General Techniques and Regular Problems","author":"G Fox","year":"1988","unstructured":"Fox, G., Johnson, M., Lyzenga, G., Otto, S., Salmon, J., Walker, D.: Solving Problems on Concurrent Processors. Volume 1: General Techniques and Regular Problems. Prentice-Hall, Upper Saddle River (1988)"},{"key":"582_CR28","doi-asserted-by":"crossref","unstructured":"Douligeris, C., Mitrokotsa, A.: DDoS attacks and defense mechanisms: classification and state-of-the-art. Comput. Netw. 44(5), 643\u2013666 (2004)","DOI":"10.1016\/j.comnet.2003.10.003"},{"issue":"4","key":"582_CR29","doi-asserted-by":"crossref","first-page":"683","DOI":"10.1109\/TNET.2006.880180","volume":"14","author":"A Kuzmanovic","year":"2006","unstructured":"Kuzmanovic, A., Knightly, E.W.: Low-rate TCP-targeted denial of service attacks and counter strategies. IEEE\/ACM Trans. Netw. 14(4), 683\u2013696 (2006)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"582_CR30","doi-asserted-by":"crossref","unstructured":"Lu, Z., Wang, W., Wang, C.: Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications. Springer Briefs in Computer Science (2015)","DOI":"10.1007\/978-3-319-23288-1"},{"key":"582_CR31","doi-asserted-by":"crossref","unstructured":"Wang, K., Chen, J., Zhou, H., Qin, Y., Zhang, H.: Modeling denial-of-service against pending interest table in named data networking. Int. J. Commun. Syst. 27(12), 4355\u20134368 (2014)","DOI":"10.1002\/dac.2618"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-016-0582-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-016-0582-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-016-0582-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,9]],"date-time":"2019-09-09T17:48:01Z","timestamp":1568051281000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-016-0582-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,17]]},"references-count":31,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,9]]}},"alternative-id":["582"],"URL":"https:\/\/doi.org\/10.1007\/s10586-016-0582-9","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,6,17]]}}}