{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:42:18Z","timestamp":1740123738942,"version":"3.37.3"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,8,14]],"date-time":"2018-08-14T00:00:00Z","timestamp":1534204800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100005981","name":"DIKTI","doi-asserted-by":"crossref","award":["242.7\/E4.4\/2014"],"award-info":[{"award-number":["242.7\/E4.4\/2014"]}],"id":[{"id":"10.13039\/501100005981","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s11036-018-1103-2","type":"journal-article","created":{"date-parts":[[2018,8,14]],"date-time":"2018-08-14T17:28:09Z","timestamp":1534267689000},"page":"1095-1103","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Performance Evaluation of Resilient Server with a Self-Repair Network Model"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9436-6836","authenticated-orcid":false,"given":"Idris","family":"Winarno","sequence":"first","affiliation":[]},{"given":"Yoshiteru","family":"Ishida","sequence":"additional","affiliation":[]},{"given":"Takeshi","family":"Okamoto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,14]]},"reference":[{"key":"1103_CR1","unstructured":"Spiceworks Inc. (2016) Server virtualization and OS trends. [Online]. \n                    https:\/\/community.spiceworks.com\/networking\/articles\/2462-server-virtualization-and-os-trends"},{"issue":"5","key":"1103_CR2","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/MC.2005.176","volume":"38","author":"M Rosenblum","year":"2005","unstructured":"Rosenblum M, Garfinkel T (2005) Virtual machine monitors: current technology and future trends. Computers 38(5):39\u201347","journal-title":"Computers"},{"key":"1103_CR3","unstructured":"Garfinkel T, Rosenblum M (2003) A virtual machine introspection based architecture for intrusion detection. In: Network and Distributed Systems Security Symposium, p 191\u2013206"},{"key":"1103_CR4","doi-asserted-by":"crossref","unstructured":"Hebbal Y, Laniepce S, Menaud J-M (2015) Virtual machine introspection: techniques and application. In: Availability, Reliability and Security (ARES), 2015 10th International Conference, p 676\u2013685","DOI":"10.1109\/ARES.2015.43"},{"key":"1103_CR5","doi-asserted-by":"crossref","unstructured":"He S, Ghanem M, Guo L, Guo Y (2013) Cloud resource monitoring for intrusion detection. In: Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference, vol. 2, p 281\u2013284","DOI":"10.1109\/CloudCom.2013.148"},{"issue":"4","key":"1103_CR6","first-page":"1059","volume":"12","author":"I Winarno","year":"2016","unstructured":"Winarno I, Okamoto T, Hata Y, Ishida Y (2016) A resilient server based on virtualization with a self-repair network model. IJICIC 12(4):1059\u20131071","journal-title":"IJICIC"},{"key":"1103_CR7","doi-asserted-by":"publisher","first-page":"1745","DOI":"10.1016\/j.procs.2015.08.284","volume":"60","author":"I Winarno","year":"2015","unstructured":"Winarno I, Ishida Y (2015) Simulating resilient server using XEN virtualization. Procedia Comput Sci 60:1745\u20131752","journal-title":"Procedia Comput Sci"},{"key":"1103_CR8","unstructured":"Okamoto T, Sano F, Winarno I, Hata Y, Ishida Y (2017) Implementation and evaluation of an intrusion-resilient system for a DNS Service. IJICIC 13(5):1735\u20131749"},{"issue":"3","key":"1103_CR9","first-page":"345","volume":"21","author":"F Sano","year":"2016","unstructured":"Sano F, Okamoto T, Winarno I, Hata Y, Ishida Y (2016) A cyber attack-resilient server inspired by biological diversity. AROB 21(3):345\u2013350","journal-title":"AROB"},{"key":"1103_CR10","doi-asserted-by":"crossref","unstructured":"Okamoto T, Tarao M (2016) Toward an artificial immune server against cyber attack. AROB 21(3):351\u2013356","DOI":"10.1007\/s10015-016-0282-9"},{"key":"1103_CR11","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-26447-9","volume-title":"Self-repair networks: a mechanism design","author":"Y Ishida","year":"2015","unstructured":"Ishida Y (2015) Self-repair networks: a mechanism design, vol 101. Springer, New York"},{"issue":"1","key":"1103_CR12","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1038\/scientificamerican0773-52","volume":"229","author":"NK Jerne","year":"1973","unstructured":"Jerne NK (1973) The immune system. Sci Am 229(1):52\u201360","journal-title":"Sci Am"},{"issue":"5","key":"1103_CR13","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MSP.2014.87","volume":"12","author":"C Pham","year":"2014","unstructured":"Pham C, Estrada ZJ, Cao P, Kalbarczyk Z, Iyer RK (2014) Building realible and secure virtual machines using architectural invariants. IEEE Security & Privacy 12(5):82\u201385","journal-title":"IEEE Security & Privacy"},{"key":"1103_CR14","doi-asserted-by":"crossref","unstructured":"Pham C, Estrada ZJ, Cao P, Kalbarczyk Z, Iyer RK (2014) Reliability and security monitoring of virtual machines using hardware architectural invariants. In: 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, p 13\u201324","DOI":"10.1109\/DSN.2014.19"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-018-1103-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1103-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1103-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,13]],"date-time":"2019-08-13T19:12:39Z","timestamp":1565723559000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-018-1103-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,14]]},"references-count":14,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["1103"],"URL":"https:\/\/doi.org\/10.1007\/s11036-018-1103-2","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2018,8,14]]},"assertion":[{"value":"14 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}