{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:47:19Z","timestamp":1729662439830,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1109\/glocom.2010.5683786","type":"proceedings-article","created":{"date-parts":[[2011,1,10]],"date-time":"2011-01-10T21:19:12Z","timestamp":1294694352000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["A Threat-Aware Routing Algorithm for Maximum Physical-Layer Path Survivability"],"prefix":"10.1109","author":[{"given":"Shengli","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Balaji","family":"Raghavachari","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICUMT.2009.5345552"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1287\/moor.4.3.233"},{"journal-title":"Computers and Intractability A Guide to the Theory of NP-Completeness","year":"0","author":"garey","key":"ref12"},{"journal-title":"Introduction to Algorithms","year":"2001","author":"cormen","key":"ref13"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/65.587049"},{"key":"ref3","first-page":"1","article-title":"All-optical wavelength conversion at 160Gb\/s by inter subband transition switches utilizing efficient XPM in InGaAs\/AlAsSb coupled double quantum well","author":"akimoto","year":"2009","journal-title":"Proc 35th Eur Conf Optical Communication (ECOC '09)"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/ICNC.2009.368","article-title":"An Approach for Network Security Analysis Using Logic Exploitation Graph","volume":"1","author":"li","year":"2009","journal-title":"Fifth International Conference on Natural Computation ICNC '09"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WOACN.2006.337180"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/NAS.2009.23"},{"key":"ref7","first-page":"761","article-title":"An Approach for Network Security Analysis Using Logic Exploitation Graph Computer and Information Technology","author":"mao","year":"2007","journal-title":"7th IEEE International Conference on Computer and Information Technology CIT 2007"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/OFC.2008.4528429"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/OFC.2008.4528299"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"2658","DOI":"10.1109\/INFCOM.2005.1498549","article-title":"Minimum Color Problem for Reliability in Mesh Networks","volume":"4","author":"yuan","year":"2005","journal-title":"Proceedings IEEE INFOCOM 2005"}],"event":{"name":"GLOBECOM 2010 - 2010 IEEE Global Communications Conference","start":{"date-parts":[[2010,12,6]]},"location":"Miami, FL, USA","end":{"date-parts":[[2010,12,10]]}},"container-title":["2010 IEEE Global Telecommunications Conference GLOBECOM 2010"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5682081\/5683069\/05683786.pdf?arnumber=5683786","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T12:52:53Z","timestamp":1592225573000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5683786\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/glocom.2010.5683786","relation":{},"subject":[],"published":{"date-parts":[[2010,12]]}}}