{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:53:03Z","timestamp":1729677183271,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/dsn.2011.5958248","type":"proceedings-article","created":{"date-parts":[[2011,7,21]],"date-time":"2011-07-21T11:17:24Z","timestamp":1311247044000},"page":"347-358","source":"Crossref","is-referenced-by-count":4,"title":["Modeling and evaluating targeted attacks in large scale dynamic systems"],"prefix":"10.1109","author":[{"given":"Emmanuelle","family":"Anceaume","sequence":"first","affiliation":[]},{"given":"Bruno","family":"Sericola","sequence":"additional","affiliation":[]},{"given":"Romaric","family":"Ludinard","sequence":"additional","affiliation":[]},{"given":"Frederic","family":"Tronel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.2001.990064"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.231"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45748-8_25","article-title":"Security considerations for peer-to-peer distributed hash tables","author":"sit","year":"2002","journal-title":"Proc 1st International Workshop on Peer-to-Peer Systems (IPTPS)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39989-6_23"},{"key":"ref15","article-title":"Induced churn as shelter from routing-table poisoning","author":"condie","year":"2006","journal-title":"Procs of the 13th thirteenth Annual Symposium on Network and Distributed System Security (NDSS'06)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/258492.258523"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45748-8_5","article-title":"Kademlia: A peer-to-peer information system based on the XOR metric","author":"maymounkov","year":"2002","journal-title":"Proc 1st International Workshop on Peer-to-Peer Systems (IPTPS)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2006.17"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45748-8_24","article-title":"The sybil attack","author":"douceur","year":"2002","journal-title":"Proc 1st International Workshop on Peer-to-Peer Systems (IPTPS)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SASO.2008.44"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2007.4447808"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159931"},{"key":"ref5","article-title":"Towards scalable and robust overay networks","author":"awerbuch","year":"2007","journal-title":"Proc 1st International Workshop on Peer-to-Peer Systems (IPTPS)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060317"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/PDCAT.2009.62"},{"key":"ref2","article-title":"Making chord robust to byzantine attacks","author":"fiat","year":"2005","journal-title":"Proc Ann European Symp Algorithms (ESA)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383072"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1146847.1146894"},{"journal-title":"Internet X 509 Public Key Infrastructure Certificate and CRL Profile","year":"1999","author":"housley","key":"ref20"},{"key":"ref22","article-title":"Performance analysis of large scale peer-to-peer overlays using markov chains","author":"anceaume","year":"2010","journal-title":"Tech Rep 1963"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"744","DOI":"10.2307\/3214379","article-title":"Sojourn times in Markov processes","volume":"26","author":"sericola","year":"1989","journal-title":"Journal of Applied Probability"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.2307\/3214555"},{"key":"ref25","article-title":"Markov chains competing for transitions: Application to large scale distributed systems","author":"anceaume","year":"2011","journal-title":"Tech Rep"}],"event":{"name":"Networks (DSN)","start":{"date-parts":[[2011,6,27]]},"location":"Hong Kong, China","end":{"date-parts":[[2011,6,30]]}},"container-title":["2011 IEEE\/IFIP 41st International Conference on Dependable Systems &amp; Networks (DSN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5949577\/5958196\/05958248.pdf?arnumber=5958248","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T23:27:51Z","timestamp":1497914871000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5958248\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/dsn.2011.5958248","relation":{},"subject":[],"published":{"date-parts":[[2011,6]]}}}