{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:50:56Z","timestamp":1730260256313,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/icton.2015.7193308","type":"proceedings-article","created":{"date-parts":[[2015,8,13]],"date-time":"2015-08-13T22:54:16Z","timestamp":1439506456000},"page":"1-4","source":"Crossref","is-referenced-by-count":1,"title":["An approach to improve the time efficiency of disjoint paths calculation"],"prefix":"10.1109","author":[{"given":"Kanstantsin","family":"Myslitski","sequence":"first","affiliation":[]},{"given":"Jacek","family":"Rak","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"A new approach to provide the differentiated levels of network survivability under a double node failure","author":"molisz","year":"2009","journal-title":"Proceedings 11th International Conference on Transparent Optical Networks (ICTON 09)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.4.000344"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.7.00A162"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/BF01386390"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.892851"},{"key":"ref3","first-page":"19","article-title":"End-to-end service survivability under attacks on networks","volume":"3","author":"molisz","year":"2006","journal-title":"Journal of Telecommunications and Information Technology"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.4.000628"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.03.005"},{"key":"ref8","first-page":"84","volume":"30","author":"rak","year":"2012","journal-title":"Fast service recovery under shared protection in WDM networks"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.892844"},{"key":"ref2","first-page":"889","article-title":"Reliable anycast and unicast routing: Protection against attacks","volume":"52","author":"rak","year":"2013","journal-title":"Telecommunication Systems"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2014.2334713"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962478"}],"event":{"name":"2015 17th International Conference on Transparent Optical Networks (ICTON)","start":{"date-parts":[[2015,7,5]]},"location":"Budapest","end":{"date-parts":[[2015,7,9]]}},"container-title":["2015 17th International Conference on Transparent Optical Networks (ICTON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7173926\/7193279\/07193308.pdf?arnumber=7193308","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:19:53Z","timestamp":1602685193000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7193308"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icton.2015.7193308","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}