{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:41:38Z","timestamp":1765622498560,"version":"3.48.0"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Beijing Natural Science Foundation","award":["L254063"],"award-info":[{"award-number":["L254063"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["2024JBZX018"],"award-info":[{"award-number":["2024JBZX018"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Central Guidance for Local Scientific and Technological Development Fund","award":["246Z0705G"],"award-info":[{"award-number":["246Z0705G"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s12083-025-02137-y","type":"journal-article","created":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T14:17:13Z","timestamp":1761229033000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Failure analysis and resilience enhancement of LEO satellite network under inter-satellite link flooding attack"],"prefix":"10.1007","volume":"18","author":[{"given":"Yunyi","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Ye","family":"Du","sequence":"additional","affiliation":[]},{"given":"Le","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jiamu","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,23]]},"reference":[{"issue":"5","key":"2137_CR1","doi-asserted-by":"publisher","first-page":"3962","DOI":"10.1109\/TAES.2022.3156087","volume":"58","author":"AU Chaudhry","year":"2022","unstructured":"Chaudhry AU, Yanikomeroglu H (2022) When to crossover from Earth to space for lower latency data communications. IEEE Trans Aerosp Electron Syst 58(5):3962\u20133978. https:\/\/ieeexplore.ieee.org\/document\/9726866","journal-title":"IEEE Trans Aerosp Electron Syst"},{"key":"2137_CR2","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1007\/s12083-023-01617-3","volume":"17","author":"V Deepa","year":"2024","unstructured":"Deepa V, Sivakumar B (2024) Heuristic-aided multi-objective function for satellite controller placement and route in integrated satellite terrestrial network. Peer-to-Peer Netw Appl 17:767\u2013783. https:\/\/doi.org\/10.1007\/s12083-023-01617-3","journal-title":"Peer-to-Peer Netw Appl"},{"key":"2137_CR3","doi-asserted-by":"publisher","first-page":"103770","DOI":"10.1016\/j.jnca.2023.103770","volume":"221","author":"A Nauman","year":"2024","unstructured":"Nauman A, Alshahrani HM, Nemri N, Othman KM, Aljehane N, Maashi M, Dutta AK, Assiri M, Khan WU (2024) Dynamic resource management in integrated NOMA terrestrial-satellite networks using multi-agent reinforcement learning. J Netw Comput Appl 221:103770. https:\/\/doi.org\/10.1016\/j.jnca.2023.103770","journal-title":"J Netw Comput Appl"},{"issue":"3","key":"2137_CR4","doi-asserted-by":"publisher","first-page":"2612","DOI":"10.1109\/TNSM.2022.3168148","volume":"19","author":"W Wang","year":"2022","unstructured":"Wang W, Zhao YL, Zhang YJ, He XY, Liu Y, Zhang J (2022) Intersatellite laser link planning for reliable topology design in optical satellite networks: A networking perspective. IEEE Trans Netw Serv Manage 19(3):2612\u20132624. https:\/\/ieeexplore.ieee.org\/document\/9758829","journal-title":"IEEE Trans Netw Serv Manage"},{"issue":"17","key":"2137_CR5","doi-asserted-by":"publisher","first-page":"15497","DOI":"10.1109\/JIOT.2022.3176121","volume":"9","author":"W Guo","year":"2022","unstructured":"Guo W, Xu J, Pei YK, Yin LG, Jiang CX, Ge N (2022) A distributed collaborative entrance defense framework against DDoS attacks on satellite internet. IEEE Internet Things J 9(17):15497\u201315510. https:\/\/ieeexplore.ieee.org\/abstract\/document\/9777763","journal-title":"IEEE Internet Things J"},{"key":"2137_CR6","unstructured":"Giuliari G, Ciussani T, Perrig A, Singla A, {ICARUS} (2021) Attacking low earth orbit satellite networks. 2021 USENIX Annual Technical Conference (USENIX ATC 21). : 317\u2013331. https:\/\/www.usenix.org\/conference\/atc21\/presentation\/giuliari"},{"issue":"16","key":"2137_CR7","doi-asserted-by":"publisher","first-page":"27340","DOI":"10.1109\/JIOT.2024.3397865","volume":"11","author":"W Jiang","year":"2024","unstructured":"Jiang W, Jiang H, Xie YL, Wu J, He XF, Li H, Zhou P (2024) SatShield: In-Network mitigation of link flooding attacks for LEO constellation networks. IEEE Internet Things J 11(16):27340\u201327355. https:\/\/ieeexplore.ieee.org\/document\/10530518","journal-title":"IEEE Internet Things J"},{"key":"2137_CR8","unstructured":"Wu XS, Fan T, Zheng TS, Wu RF, Du Y (2025) A Long-Short-Term Stress-Tolerant route algorithm for LEO satellite network. IEEE Trans Aerosp Electron Syst 1\u201314\u00a0https:\/\/ieeexplore.ieee.org\/document\/10899857"},{"key":"2137_CR9","doi-asserted-by":"publisher","first-page":"3146","DOI":"10.1007\/s12083-024-01742-7","volume":"17","author":"QL Kong","year":"2024","unstructured":"Kong QL, Wang YF, Ma MD, Qu XD, Bao HY (2024) A secure location management scheme in an LEO-satellite network with dual-mobility. Peer-to-Peer Netw Appl 17:3146\u20133158. https:\/\/doi.org\/10.1007\/s12083-024-01742-7","journal-title":"Peer-to-Peer Netw Appl"},{"key":"2137_CR10","doi-asserted-by":"publisher","first-page":"103705","DOI":"10.1016\/j.cose.2024.103705","volume":"139","author":"A Diro","year":"2024","unstructured":"Diro A, Kaisar S, Vasilakos AV, Anwar A, Nasirian A, Olani G (2024) Anomaly detection for space information networks: A survey of challenges, techniques, and future directions. Computers Secur 139:103705. https:\/\/doi.org\/10.1016\/j.cose.2024.103705","journal-title":"Computers Secur"},{"key":"2137_CR11","doi-asserted-by":"crossref","unstructured":"Zhang Y, Wo TY, Wang GJ, Ye TY, Zhang JW, Liu XY, Feng X\u00a0(2023) Data Acquisition and Monitoring Scheme for Satellite Network with Time-Varying Topology. IEEE International Conference on Satellite Computing (Satellite), Shenzhen, China, 1\u20136 2023. https:\/\/ieeexplore.ieee.org\/document\/10488334","DOI":"10.1109\/Satellite59115.2023.00009"},{"key":"2137_CR12","doi-asserted-by":"publisher","first-page":"103806","DOI":"10.1016\/j.cose.2024.103806","volume":"140","author":"JX Peng","year":"2024","unstructured":"Peng JX, Guo C, Ping Y, Cui Y, Chen Y, Shen GW (2024) Spyware network traffic detection method based on inducement operations. Computers Secur 140:103806. https:\/\/doi.org\/10.1016\/j.cose.2024.103806","journal-title":"Computers Secur"},{"issue":"10","key":"2137_CR13","doi-asserted-by":"publisher","first-page":"2423","DOI":"10.1109\/TIFS.2018.2815555","volume":"13","author":"L Xue","year":"2018","unstructured":"Xue L, Ma X, Luo X, Chan EWW, Miu TTN, Gu G (2018) LinkScope: toward detecting target link flooding attacks. IEEE Trans Inf Forensics Secur 13(10):2423\u20132438. https:\/\/ieeexplore.ieee.org\/document\/8315066","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2137_CR14","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.comnet.2016.08.023","volume":"108","author":"K Kalkan","year":"2016","unstructured":"Kalkan K, Alag\u00f6z F (2016) A distributed filtering mechanism against DDoS attacks: scoreforcore. Comput Netw 108:199\u2013209. https:\/\/doi.org\/10.1016\/j.comnet.2016.08.023","journal-title":"Comput Netw"},{"key":"2137_CR15","doi-asserted-by":"publisher","first-page":"103778","DOI":"10.1016\/j.cose.2024.103778","volume":"140","author":"S Javanmardi","year":"2024","unstructured":"Javanmardi S, Ghahramani M, Shojafar M, Alazab M, Caruso AM (2024) A mobility and impersonation-aware IDS for DDoS UDP flooding attacks in IoT-Fog networks. Computers Secur 140:103778. https:\/\/doi.org\/10.1016\/j.cose.2024.103778","journal-title":"Computers Secur"},{"key":"2137_CR16","doi-asserted-by":"publisher","unstructured":"Zhang L, Du Y, A Dynamic Cascading Failure Model for LEO Satellite Networks (2024) IEEE Trans Netw Serv Manage 21(2):1672\u20131689. https:\/\/doi.org\/10.1109\/TNSM.2023.3343357. https:\/\/ieeexplore.ieee.org\/document\/10361587","DOI":"10.1109\/TNSM.2023.3343357"},{"issue":"1","key":"2137_CR17","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1109\/TNET.2024.3473742","volume":"33","author":"XB Huang","year":"2025","unstructured":"Huang XB, Xue KP, Huang ZX, Han JP, Chen LT, Wei DSL (2025) SpiderNet: enabling bot identification in network topology obfuscation against link flooding attacks. IEEE Trans Netw 33(1):99\u2013113. https:\/\/ieeexplore.ieee.org\/document\/10716867","journal-title":"IEEE Trans Netw"},{"key":"2137_CR18","doi-asserted-by":"publisher","first-page":"109011","DOI":"10.1016\/j.comnet.2022.109011","volume":"221","author":"H Li","year":"2022","unstructured":"Li H, Shi DC, Wang WZ, Liao D, Gadekallu TR, Yu KP (2022) Secure route for LEO satellite network survivability. Comput Netw 221:109011. https:\/\/doi.org\/10.1016\/j.comnet.2022.109011","journal-title":"Comput Netw"},{"key":"2137_CR19","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.infsof.2017.10.006","volume":"94","author":"DM Phillips","year":"2018","unstructured":"Phillips DM, Mazzuchi TA, Sarkani S (2018) An architecture, system engineering, and acquisition approach for space system software resiliency. \u200eInf Softw Technol 94:150\u2013164. https:\/\/doi.org\/10.1016\/j.infsof.2017.10.006","journal-title":"\u200eInf Softw Technol"},{"issue":"12","key":"2137_CR20","doi-asserted-by":"publisher","first-page":"2376","DOI":"10.3390\/electronics14122376","volume":"14","author":"FZ Meng","year":"2025","unstructured":"Meng FZ, Yan XD, Zhang YJ, Yang J, Cao A, Liu RQ, Zhao YL (2025) Mitigating DDoS attacks in LEO satellite networks through bottleneck minimize route. Electronics 14(12):2376. https:\/\/doi.org\/10.3390\/electronics14122376","journal-title":"Electronics"},{"key":"2137_CR21","doi-asserted-by":"publisher","unstructured":"Studer A, Perrig A The coremelt attack. In: Backes M, Ning P (eds) Computer security -ESORICS 2009. ESORICS 2009. Lecture notes in computer Science, 5789. Springer, Berlin, Heidelberg, https:\/\/doi.org\/10.1007\/978-3-642-04444-1_3","DOI":"10.1007\/978-3-642-04444-1_3"},{"key":"2137_CR22","doi-asserted-by":"crossref","unstructured":"Kang MS, Lee SB, Gligor VD, The Crossfire Attack (2013) IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 2013, 127\u2013141. https:\/\/ieeexplore.ieee.org\/document\/654710","DOI":"10.1109\/SP.2013.19"},{"key":"2137_CR23","doi-asserted-by":"publisher","unstructured":"Kim J, Marin E, Conti M, Shin S\u00a0(2022) EqualNet: A secure and practical defense for Long-term network topology obfuscation. Netw Distrib Syst Secur 24\u201328. https:\/\/doi.org\/10.14722\/ndss.2022.23154","DOI":"10.14722\/ndss.2022.23154"},{"key":"2137_CR24","doi-asserted-by":"crossref","unstructured":"Nance-Hall M, Liu Z, Sekar V, Durairajan R (2024) Analyzing the benefits of optical topology programming for mitigating Link-Flood DDoS attacks. IEEE Trans Dependable Secur Comput, 1\u201318, https:\/\/ieeexplore.ieee.org\/document\/10504966","DOI":"10.1109\/TDSC.2024.3391188"},{"issue":"6","key":"2137_CR25","doi-asserted-by":"publisher","first-page":"944","DOI":"10.1109\/TDSC.2018.2822275","volume":"16","author":"J Wang","year":"2019","unstructured":"Wang J, Wen R, Li JQ, Yan F, Zhao B, Yu FJ (2019) Detecting and mitigating target Link-Flooding attacks using SDN. IEEE Trans Dependable Secur Comput 16(6):944\u2013956. https:\/\/ieeexplore.ieee.org\/document\/8329552","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"2137_CR26","doi-asserted-by":"publisher","first-page":"3291","DOI":"10.1007\/s12083-021-01128-z","volume":"14","author":"Y Wan","year":"2021","unstructured":"Wan Y, Long J, Liu LM, Qian ZM, Zhong SW (2021) Downlink aware data scheduling with delay guarantees in resource-limited Leo satellite networks. Peer-to-Peer Netw Appl 14:3291\u20133306. https:\/\/doi.org\/10.1007\/s12083-021-01128-z","journal-title":"Peer-to-Peer Netw Appl"},{"key":"2137_CR27","doi-asserted-by":"crossref","unstructured":"Liaskos C, Kotronis V, Dimitropoulos X (2016) A novel framework for modeling and mitigating distributed link flooding attacks. IEEE INFOCOM (2016) -The 35th Annual IEEE International Conference on Computer Communications, 10\u201314. https:\/\/ieeexplore.ieee.org\/document\/7524507","DOI":"10.1109\/INFOCOM.2016.7524507"},{"issue":"3","key":"2137_CR28","doi-asserted-by":"publisher","first-page":"2106","DOI":"10.1109\/TNSE.2020.3015220","volume":"8","author":"CM Zhang","year":"2020","unstructured":"Zhang CM, Luo FJ, Sun MY, Ranzi G (2020) Modeling and defending advanced metering infrastructure subjected to distributed Denial-of-Service attacks. IEEE Trans Netw Sci Eng 8(3):2106\u20132117. https:\/\/ieeexplore.ieee.org\/document\/9165966","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"2137_CR29","doi-asserted-by":"publisher","first-page":"102803","DOI":"10.1016\/j.jnca.2020.102803","volume":"172","author":"R Rasool","year":"2020","unstructured":"Rasool R, Wang H, Ashraf U, Ahmed K, Anwar Z, Rafique W (2020) A survey of link flooding attacks in software defined network ecosystems. J Netw Comput Appl 172:102803. https:\/\/doi.org\/10.1016\/j.jnca.2020.102803","journal-title":"J Netw Comput Appl"},{"key":"2137_CR30","doi-asserted-by":"publisher","first-page":"112792","DOI":"10.1109\/ACCESS.2021.3103845","volume":"9","author":"MF Hyder","year":"2021","unstructured":"Hyder MF, Fatima T (2021) Towards crossfire distributed denial of service attack protection using Intent-Based moving target defense over Software-Defined networking. IEEE Access 9:112792\u2013112804. https:\/\/ieeexplore.ieee.org\/document\/9509535","journal-title":"IEEE Access"},{"key":"2137_CR31","doi-asserted-by":"crossref","unstructured":"Biswas R, Wu J (2021) Minimizing the number of rules to mitigate link congestion in SDN-based datacenters. 2021 IEEE Int Conf Netw Archit Storage (NAS) 1\u20138. https:\/\/ieeexplore.ieee.org\/document\/9605365","DOI":"10.1109\/NAS51552.2021.9605365"},{"issue":"4","key":"2137_CR32","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TDSC.2013.8","volume":"10","author":"CJ Chung","year":"2013","unstructured":"Chung CJ, Khatkar P, Xing T, Lee J, Huang D (2013) Network intrusion detection and countermeasure selection in virtual network systems. IEEE Trans Dependable Secur Comput 10(4):198\u2013211. https:\/\/ieeexplore.ieee.org\/document\/6419708","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"2137_CR33","doi-asserted-by":"publisher","unstructured":"Deng YT, Wu Q, Lai ZQ, Gu CW, Li HW, Li YJ, Liu J (2025) Time-varying Bottleneck Links in LEO Satellite Networks: Identification, Exploits, and Countermeasures. Network and Distributed System Security (NDSS) Symposium 2025, https:\/\/doi.org\/10.14722\/ndss.2025.230109","DOI":"10.14722\/ndss.2025.230109"},{"key":"2137_CR34","doi-asserted-by":"publisher","unstructured":"Lu T, Ding X, Shang J, Zhao P, Zhang H, DoSat: A DDoS attack on the vulnerable Time-Varying topology of LEO satellite networks. In: P\u00f6pper C, Batina L (eds) Applied cryptography and network Security. ACNS 2024. Lecture notes in computer science, 14584. Springer, Cham, https:\/\/doi.org\/10.1007\/978-3-031-54773-7_11","DOI":"10.1007\/978-3-031-54773-7_11"},{"key":"2137_CR35","doi-asserted-by":"publisher","unstructured":"Yoon S, Kang M, Choi JY Security Attacks Against the Availability of Low Earth Orbit Satellite Networks. In Proceedings of the (2023) 12th International Conference on Networks, Communication and Computing (ICNCC \u201923). Association for Computing Machinery, New York, NY, USA, 64\u201369. https:\/\/doi.org\/10.1145\/3638837.3638847","DOI":"10.1145\/3638837.3638847"},{"issue":"1","key":"2137_CR36","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MNET.2023.3337141","volume":"38","author":"ZQ Lai","year":"2024","unstructured":"Lai ZQ, Deng YT, Li HW, Wu Q, Zhang Q (2024) Space digital twin for secure satellite internet: Vulnerabilities, Methodologies, and future directions. IEEE Network 38(1):30\u201337. https:\/\/ieeexplore.ieee.org\/document\/10330122","journal-title":"IEEE Network"},{"key":"2137_CR37","doi-asserted-by":"publisher","first-page":"109379","DOI":"10.1016\/j.ress.2023.109379","volume":"237","author":"L Zhang","year":"2023","unstructured":"Zhang L, Du Y (2023) Cascading failure model and resilience enhancement scheme of space information networks. Reliab Eng Syst Saf 237:109379. https:\/\/doi.org\/10.1016\/j.ress.2023.109379","journal-title":"Reliab Eng Syst Saf"},{"issue":"1","key":"2137_CR38","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1109\/TNSE.2023.3308610","volume":"11","author":"L Zhang","year":"2024","unstructured":"Zhang L, Du Y, Sun ZY (2024) Modeling and analysis of cascading failures in LEO satellite networks. IEEE Trans Netw Sci Eng 11(1):807\u2013822. https:\/\/ieeexplore.ieee.org\/document\/10230313","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"2137_CR39","doi-asserted-by":"publisher","first-page":"106608","DOI":"10.1016\/j.ress.2019.106608","volume":"193","author":"CJ Lowe","year":"2020","unstructured":"Lowe CJ, Macdonald M (2020) Space mission resilience with inter-satellite networking. Reliab Eng Syst Saf 193:106608. https:\/\/doi.org\/10.1016\/j.ress.2019.106608","journal-title":"Reliab Eng Syst Saf"},{"issue":"1","key":"2137_CR40","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1109\/JSYST.2020.2980760","volume":"15","author":"S Jung","year":"2021","unstructured":"Jung S, Choi JP (2021) End-to-End reliability of satellite communication network systems. IEEE Syst J 15(1):791\u2013801. https:\/\/ieeexplore.ieee.org\/document\/9072644","journal-title":"IEEE Syst J"},{"key":"2137_CR41","doi-asserted-by":"publisher","first-page":"123182","DOI":"10.1109\/ACCESS.2019.2936637","volume":"7","author":"YY Nie","year":"2019","unstructured":"Nie YY, Fang ZG, Gao S (2019) Survivability analysis of LEO satellite networks based on network utility. IEEE Access 7:123182\u2013123194. https:\/\/ieeexplore.ieee.org\/document\/8808926","journal-title":"IEEE Access"},{"key":"2137_CR42","doi-asserted-by":"crossref","unstructured":"Yang YF, Wang HN, Ma XM, Liu YN, Research on Survivability of Satellite Internet Constellation Considering Cascading Failures. (2023) 3rd International Conference on Electronic Information Engineering and Computer Science (EIECS), 2024. https:\/\/ieeexplore.ieee.org\/document\/10435584","DOI":"10.1109\/EIECS59936.2023.10435584"},{"key":"2137_CR43","doi-asserted-by":"crossref","unstructured":"Li GD, Zhao ZW, Lu D (2022) Research on survivability of spatial information network. (2022) 2nd International Conference on Computer Science, Electronic Information Engineering and Intelligent Control Technology (CEI). https:\/\/ieeexplore.ieee.org\/document\/9950202","DOI":"10.1109\/CEI57409.2022.9950202"},{"issue":"1","key":"2137_CR44","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.icte.2024.08.009","volume":"11","author":"Y Han","year":"2025","unstructured":"Han Y, Yu FR, Wang J, Yan S, Huo SW, Li FQ (2025) Evidential reasoning rule with dynamic reliability for performance assessment of wireless sensor network. ICT Express 11(1):19\u201325. https:\/\/doi.org\/10.1016\/j.icte.2024.08.009","journal-title":"ICT Express"},{"key":"2137_CR45","doi-asserted-by":"publisher","first-page":"78930","DOI":"10.1109\/ACCESS.2019.2922677","volume":"7","author":"W He","year":"2019","unstructured":"He W, Yu CQ, Zhou GH, Zhou ZJ, Hu GY (2019) Fault prediction method for wireless sensor network based on evidential reasoning and Belief-Rule-Base. IEEE Access 7:78930\u201378941. https:\/\/ieeexplore.ieee.org\/abstract\/document\/8736343","journal-title":"IEEE Access"},{"key":"2137_CR46","doi-asserted-by":"publisher","first-page":"107630","DOI":"10.1016\/j.ress.2021.107630","volume":"212","author":"SY Geng","year":"2021","unstructured":"Geng SY, Liu SF, Fang ZG, Gao S (2021) An agent-based clustering framework for reliable satellite networks. Reliab Eng Syst Saf 212:107630. https:\/\/doi.org\/10.1016\/j.ress.2021.107630","journal-title":"Reliab Eng Syst Saf"},{"issue":"3","key":"2137_CR47","doi-asserted-by":"publisher","first-page":"3147","DOI":"10.32604\/cmc.2021.016591","volume":"68","author":"MR Haque","year":"2021","unstructured":"Haque MR, Tan SC, Yusoff Z, Nisar K, Lee CK, Kaspin R, Chowdhry BS, Buyya R, Majumder SP, Gupta M, Memon S (2021) Automated controller placement for software-defined networks to resist DDoS attacks. Computers Mater Continua 68(3):3147\u20133165. https:\/\/doi.org\/10.32604\/cmc.2021.016591","journal-title":"Computers Mater Continua"},{"key":"2137_CR48","doi-asserted-by":"crossref","unstructured":"Kumar S, Valdez R, Gomez O, Bose S (2016) Survivability Evaluation of Wireless Sensor Network under DDoS Attack. International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL\u201906), Morne, Mauritius, 82\u201382. https:\/\/ieeexplore.ieee.org\/abstract\/document\/1628328","DOI":"10.1109\/ICNICONSMCL.2006.205"},{"key":"2137_CR49","doi-asserted-by":"publisher","first-page":"109555","DOI":"10.1016\/j.comnet.2022.109555","volume":"222","author":"L Zhang","year":"2023","unstructured":"Zhang L, Du Y (2023) Resilience enhancement scheme for gateway placement in space information networks. Comput Netw 222:109555. https:\/\/doi.org\/10.1016\/j.comnet.2022.109555","journal-title":"Comput Netw"},{"issue":"2","key":"2137_CR50","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1109\/LWC.2017.2763149","volume":"7","author":"YR Cao","year":"2017","unstructured":"Cao YR, Shi YP, Liu JJ, Kato N (2017) Optimal satellite gateway placement in spaceground integrated network for latency minimization with reliability guarantee. IEEE Wirel Commun Lett 7(2):174\u2013177. https:\/\/ieeexplore.ieee.org\/document\/8068282","journal-title":"IEEE Wirel Commun Lett"},{"issue":"5","key":"2137_CR51","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MNET.2018.1800016","volume":"32","author":"Y Cao","year":"2018","unstructured":"Cao Y, Guo H, Liu J, Kato N (2018) Optimal satellite gateway placement in space-ground integrated networks. IEEE Network 32(5):32\u201337. https:\/\/ieeexplore.ieee.org\/document\/8473478","journal-title":"IEEE Network"},{"key":"2137_CR52","doi-asserted-by":"crossref","unstructured":"Cao YR, Zhao L, Shi YP, Liu JJ (2018) Gateway placement for reliability optimization in 5\u00a0g-satellite hybrid networks. (2018) International Conference on Computing, Networking and Communications, ICNC, IEEE, 372\u2013376. https:\/\/ieeexplore.ieee.org\/document\/8390422","DOI":"10.1109\/ICCNC.2018.8390422"},{"key":"2137_CR53","doi-asserted-by":"crossref","unstructured":"Dai CQ, ang QQ Y, Wu JS, Chen QB (2021) Intelligent Gateway Placement in Satellite-Terrestrial Integrated Network. IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Vancouver, BC, Canada, 1\u20136, https:\/\/ieeexplore.ieee.org\/document\/9484491","DOI":"10.1109\/INFOCOMWKSHPS51825.2021.9484491"},{"issue":"22","key":"2137_CR54","doi-asserted-by":"publisher","first-page":"22682","DOI":"10.1109\/JIOT.2022.3182412","volume":"9","author":"Q Chen","year":"2022","unstructured":"Chen Q, Yang L, Guo JM, Liu XF, Chen XQ (2022) Optimal gateway placement for minimizing intersatellite link usage in LEO megaconstellation networks. IEEE Internet Things J 9(22):22682\u201322694. https:\/\/ieeexplore.ieee.org\/document\/9794736","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"2137_CR55","doi-asserted-by":"publisher","first-page":"3860","DOI":"10.1109\/TVT.2021.3065994","volume":"70","author":"JM Guo","year":"2021","unstructured":"Guo JM, Rincon D, Sallent S, Yang L, Chen XQ, Chen XQ (2021) Gateway placement optimization in LEO satellite networks based on traffic Estimation. IEEE Trans Veh Technol 70(4):3860\u20133876. https:\/\/ieeexplore.ieee.org\/document\/9380214","journal-title":"IEEE Trans Veh Technol"},{"issue":"10","key":"2137_CR56","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1088\/0964-1726\/21\/10\/105033\/meta","volume":"21","author":"TH Yi","year":"2012","unstructured":"Yi TH, Li HN, Zhang XD (2012) A modified monkey algorithm for optimal sensor placement in structural health monitoring. Smart Mater Struct 21(10):105\u2013133. https:\/\/iopscience.iop.org\/article\/https:\/\/doi.org\/10.1088\/0964-1726\/21\/10\/105033\/meta","journal-title":"Smart Mater Struct"},{"issue":"3","key":"2137_CR57","doi-asserted-by":"publisher","first-page":"2743","DOI":"10.1109\/TVT.2021.3058126","volume":"70","author":"Q Chen","year":"2021","unstructured":"Chen Q, Giambene G, Yang L, Fan CG, Chen XQ (2021) Analysis of Inter-Satellite link paths for LEO Mega-Constellation networks. IEEE Trans Veh Technol 70(3):2743\u20132755. https:\/\/ieeexplore.ieee.org\/document\/9351765","journal-title":"IEEE Trans Veh Technol"},{"key":"2137_CR58","doi-asserted-by":"publisher","unstructured":"Xu K, Liu HY, Liu JC, Shen M (2010) One more weight is enough: toward the optimal traffic engineering with OSPF. arXiv:1011.5015v2. https:\/\/doi.org\/10.48550\/arXiv.1011.5015","DOI":"10.48550\/arXiv.1011.5015"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02137-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02137-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02137-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:37:14Z","timestamp":1765622234000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02137-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":58,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["2137"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02137-y","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,10]]},"assertion":[{"value":"17 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"310"}}