{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T00:15:46Z","timestamp":1772496946891,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,7,13]],"date-time":"2018-07-13T00:00:00Z","timestamp":1531440000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100005234","name":"Central China Normal University","doi-asserted-by":"publisher","award":["CCNU16A02015"],"award-info":[{"award-number":["CCNU16A02015"]}],"id":[{"id":"10.13039\/501100005234","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s10922-018-9468-x","type":"journal-article","created":{"date-parts":[[2018,7,13]],"date-time":"2018-07-13T10:54:06Z","timestamp":1531479246000},"page":"351-365","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["The Analytical Model for Distributed Computer System Parameters Control Based on Multi-factoring Estimations"],"prefix":"10.1007","volume":"27","author":[{"given":"Zhengbing","family":"Hu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1206-9131","authenticated-orcid":false,"given":"Vadym","family":"Mukhin","sequence":"additional","affiliation":[]},{"given":"Yaroslav","family":"Kornaga","sequence":"additional","affiliation":[]},{"given":"Oksana","family":"Herasymenko","sequence":"additional","affiliation":[]},{"given":"Yevgenii","family":"Mostoviy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,13]]},"reference":[{"key":"9468_CR1","doi-asserted-by":"publisher","first-page":"2728","DOI":"10.1016\/j.comnet.2010.05.010","volume":"19","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 19, 2728\u20132805 (2010). https:\/\/doi.org\/10.1016\/j.comnet.2010.05.010","journal-title":"Comput. Netw."},{"key":"9468_CR2","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1016\/j.adhoc.2012.02.016","volume":"10","author":"D Miorandi","year":"2012","unstructured":"Miorandi, D., Sicari, S., Pellegrini, F., Chlamtac, I.: Internet of things: vision, applications and research challenges. Ad Hoc Netw. 10, 1497\u20131516 (2012)","journal-title":"Ad Hoc Netw."},{"key":"9468_CR3","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29, 1645\u20131660 (2013)","journal-title":"Future Gener. Comput. Syst."},{"key":"9468_CR4","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.future.2012.05.023","volume":"29","author":"N Fernando","year":"2013","unstructured":"Fernando, N., Loke, S.W., Rahayu, W.: Mobile cloud computing: a survey. Future Gener. Comput. Syst. 29, 84\u2013106 (2013)","journal-title":"Future Gener. Comput. Syst."},{"key":"9468_CR5","unstructured":"Dinh, H.T., Lee, C., Niyato, D., Wang, P.: A survey of mobile cloud computing: architecture, applications, and approaches. Wirel. Commun. Mob. Comput. https:\/\/www.eecis.udel.edu\/~cshen\/859\/papers\/survey_MCC.pdf (2016). Accessed 30 Oct 2016"},{"issue":"1","key":"9468_CR6","doi-asserted-by":"publisher","first-page":"73","DOI":"10.5755\/j01.eee.22.1.14113","volume":"22","author":"PP Hung","year":"2016","unstructured":"Hung, P.P., Bui, T.-A., Soonil, K., Huh, E.-N.: A new technique for optimizing resource allocation and data distribution in mobile cloud computing. Elektronika ir Elektrotechnika 22(1), 73\u201380 (2016)","journal-title":"Elektronika ir Elektrotechnika"},{"key":"9468_CR7","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/TPDS.2015.2398438","volume":"27","author":"K Hwang","year":"2016","unstructured":"Hwang, K., Bai, X., Shi, Y., Li, M., Chen, W.-G., Wu, Y.: Cloud performance modeling with benchmark evaluation of elastic scaling strategies. IEEE Trans. Parallel Distrib. Syst. 27, 130\u2013143 (2016)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"9468_CR8","first-page":"831","volume":"6","author":"C Wang","year":"2011","unstructured":"Wang, C., Ming, L., Zhao, J., Wang, D.: A general framework for network survivability testing and evaluation. J. Netw. 6, 831\u2013841 (2011)","journal-title":"J. Netw."},{"key":"9468_CR9","unstructured":"Tarvainen, P.: Survey of the survivability of it systems. VTT Technical Research Center of Finland. http:\/\/virtual.vtt.fi\/virtual\/proj1\/projects\/merlin\/pub\/survey_of_the_survivability_of_it_systems.pdf (2004). Accessed 30 Oct 2016"},{"key":"9468_CR10","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/s11235-015-9988-6","volume":"60","author":"KS Trivedi","year":"2015","unstructured":"Trivedi, K.S., Xia, R.: Quantification of system survivability. Telecommun. Syst. 60, 451\u2013470 (2015)","journal-title":"Telecommun. Syst."},{"issue":"1","key":"9468_CR11","first-page":"11","volume":"1","author":"VY Mukhin","year":"2013","unstructured":"Mukhin, V.Y., Shyrochin, V.P.: Adaptive security mechanisms for the computer networks based on risk analysis. J. Qafqaz Univ. Issue Math. Comput. Sci. 1(1), 11\u201316 (2013)","journal-title":"J. Qafqaz Univ. Issue Math. Comput. Sci."},{"issue":"2","key":"9468_CR12","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1109\/TSC.2011.24","volume":"5","author":"C Wang","year":"2012","unstructured":"Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W.: Toward secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput. 5(2), 220\u2013232 (2012)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"9468_CR13","doi-asserted-by":"crossref","unstructured":"Allcock, B., Bester, J., Bresnahan, J., Hervenak, A.L., Foster, I., Kesselman, C., Meder, S., Nefedova, V., Quesnel, D., Tuecke, S.: Data management and transfer in high-performance computational grid environments. http:\/\/toolkit.globus.org\/alliance\/publications\/papers\/dataMgmt.pdf (2002). Accessed 30 Oct 2016","DOI":"10.1016\/S0167-8191(02)00094-7"},{"key":"9468_CR14","unstructured":"Yalamanchili, S.: Switching techniques. http:\/\/users.ece.gatech.edu\/~sudha\/academic\/class\/Networks\/Lectures\/3%20-%20Switching%20Techniques\/papers\/paper.switching.pdf (2010). Accessed 30 Oct 2016"},{"issue":"3","key":"9468_CR15","doi-asserted-by":"publisher","first-page":"74","DOI":"10.5755\/j01.eee.21.3.10445","volume":"21","author":"T Hegr","year":"2015","unstructured":"Hegr, T., Voznak, M., Kozak, M., Bohac, L.: Measurement of switching latency in high data rate ethernet networks. Elektronika ir Elektrotechnika 21(3), 74\u201378 (2015)","journal-title":"Elektronika ir Elektrotechnika"},{"key":"9468_CR16","unstructured":"Mawata, C.: Graph theory lessons. Lesson 4: complete graphs. http:\/\/www.mathcove.net\/petersen\/lessons\/get-lesson?les=4 (2010). Accessed 30 Oct 2016"},{"key":"9468_CR17","doi-asserted-by":"crossref","unstructured":"Gene, A.: Validity of the single processor approach to achieving largescale computing capabilities. In: 1967 AFIPS Conference Proceedings, pp. 483\u2013485 (1967)","DOI":"10.1145\/1465482.1465560"},{"key":"9468_CR18","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.jpdc.2009.05.002","volume":"70","author":"X-H Sun","year":"2010","unstructured":"Sun, X.-H., Chen, Y.: Reevaluating Amdahl\u2019s law in the multicore era. J. Parallel Distrib. Comput. 70, 183\u2013188 (2010)","journal-title":"J. Parallel Distrib. Comput."},{"key":"9468_CR19","doi-asserted-by":"crossref","unstructured":"Chowdhury, M., Zaharia, M., Ma, J., Jordan, M.I., Stoica, I.: Managing data transfers in computer clusters with orchestra. In: 2011 Proceedings of the ACM SIGCOMM 2011 Conference, pp. 98\u2013109 (2011)","DOI":"10.1145\/2018436.2018448"},{"key":"9468_CR20","volume-title":"Computing System Reliability. Models and Analysis","author":"M Xie","year":"2004","unstructured":"Xie, M., Dai, Y.S., Poh, K.-L.: Computing System Reliability. Models and Analysis. Kluwer, New York (2004)"},{"key":"9468_CR21","doi-asserted-by":"crossref","unstructured":"Vishwanath, K.V., Nagappan, N.: Characterizing cloud computing hardware reliability. In: 2010 SoCC\u201910 Proceedings of the 1st ACM Symposium on Cloud Computing, pp. 193\u2013204 (2010)","DOI":"10.1145\/1807128.1807161"},{"issue":"2","key":"9468_CR22","first-page":"21","volume":"5","author":"VY Mukhin","year":"2013","unstructured":"Mukhin, V.Y., Volokyta, A.N.: Integrated safety mechanisms based on security risks minimization for the distributed computer systems. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 5(2), 21\u201328 (2013)","journal-title":"Int. J. Comput. Netw. Inf. Secur. (IJCNIS)"},{"issue":"6","key":"9468_CR23","doi-asserted-by":"publisher","first-page":"41","DOI":"10.5815\/ijcnis.2014.06.06","volume":"6","author":"V Mukhin","year":"2014","unstructured":"Mukhin, V.: The rating mechanism for the trusted relationship establishment for the security of the distributed computer systems. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 6(6), 41\u201347 (2014). https:\/\/doi.org\/10.5815\/ijcnis.2014.06.06","journal-title":"Int. J. Comput. Netw. Inf. Secur. (IJCNIS)"},{"issue":"7","key":"9468_CR24","doi-asserted-by":"publisher","first-page":"29","DOI":"10.5815\/ijcnis.2017.07.04","volume":"9","author":"AK Khare","year":"2017","unstructured":"Khare, A.K., Rana, J.L., Jain, R.C.: Detection of wormhole, blackhole and DDOS attack in MANET using trust estimation under fuzzy logic methodology. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 9(7), 29\u201335 (2017). https:\/\/doi.org\/10.5815\/ijcnis.2017.07.04","journal-title":"Int. J. Comput. Netw. Inf. Secur. (IJCNIS)"},{"issue":"4","key":"9468_CR25","first-page":"62","volume":"2015","author":"RK Jha","year":"2015","unstructured":"Jha, R.K., Kharga, P.: A comparative performance analysis of routing protocols in MANET using NS3 simulator. Int. J. Comput. Netw. Inf. Secur. 2015(4), 62\u201368 (2015)","journal-title":"Int. J. Comput. Netw. Inf. Secur."},{"key":"9468_CR26","first-page":"30","volume":"2","author":"M Madhurya","year":"2014","unstructured":"Madhurya, M., Ananda Krishna, B., Subhashini, T.: Implementation of enhanced security algorithms in mobile ad hoc networks. Int. J. Comput. Netw. Inf. Secur. 2, 30\u201337 (2014)","journal-title":"Int. J. Comput. Netw. Inf. Secur."},{"key":"9468_CR27","unstructured":"Mukhin, V.Y., Bidkov, A.Y., Thinh, V.D.: The forming of trust level to the nodes in the distributed computer systems. In: 2012 Proceedings of XIth International Conference \u201cModern Problems of Radio Engineering, Telecommunications and Computer Science TCSET\u20192012\u201d, p. 362 (2012)"},{"key":"9468_CR28","unstructured":"Nyquist\u2013Shannon sampling theorem. https:\/\/en.wikipedia.org\/wiki\/Nyquist%E2%80%93Shannon_sampling_theorem . Accessed 30 Oct 2016"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-018-9468-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10922-018-9468-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-018-9468-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T19:46:07Z","timestamp":1751744767000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10922-018-9468-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,13]]},"references-count":28,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["9468"],"URL":"https:\/\/doi.org\/10.1007\/s10922-018-9468-x","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,13]]},"assertion":[{"value":"31 October 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 June 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 July 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 July 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}