{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T06:56:33Z","timestamp":1760079393341,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2009,4,1]],"date-time":"2009-04-01T00:00:00Z","timestamp":1238544000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2009,4,1]],"date-time":"2009-04-01T00:00:00Z","timestamp":1238544000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,4]]},"DOI":"10.1109\/infcom.2009.5061959","type":"proceedings-article","created":{"date-parts":[[2009,6,3]],"date-time":"2009-06-03T11:10:14Z","timestamp":1244027414000},"page":"531-539","source":"Crossref","is-referenced-by-count":16,"title":["Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints"],"prefix":"10.1109","author":[{"given":"Y.","family":"Zhao","sequence":"first","affiliation":[{"name":"Northwestern Univ., Chicago, IL"}]},{"given":"Z.","family":"Zhu","sequence":"additional","affiliation":[{"name":"Northwestern Univ., Chicago, IL"}]},{"given":"Y.","family":"Chen","sequence":"additional","affiliation":[{"name":"Northwestern Univ., Chicago, IL"}]},{"given":"D.","family":"Pei","sequence":"additional","affiliation":[]},{"given":"J.","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2004.1401682"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298340"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948231"},{"journal-title":"Graph Coloring Problems","year":"1995","author":"jensen","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/505680.505683"},{"journal-title":"Linear Programming and Network Flows","year":"2004","author":"bazaraa","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511814075"},{"journal-title":"Foundations of Constraint Satisfaction","year":"1993","author":"tsang","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1520-6750(199809)45:6<615::AID-NAV5>3.0.CO;2-5"},{"key":"21","article-title":"active measurement for multiple link failures diagnosis in ip networks","author":"nguyen","year":"2004","journal-title":"PAM Workshop"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028810"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2006.286433"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208955"},{"key":"24","article-title":"optimal positioning of active and passive monitoring devices","author":"cantieni","year":"2005","journal-title":"the ACM Conference on Emerging Network Experiment and Technology (CoNEXT)"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2006.286433"},{"key":"26","article-title":"locating network monitors: complexity, heuristics and coverage","author":"suh","year":"2005","journal-title":"IEEE INFOCOM"},{"key":"27","article-title":"efficient and adaptive web replication using content clustering","volume":"21","author":"chen","year":"2003","journal-title":"IEEE Journal on Selected Areas in Communications (J-SAC)"},{"key":"28","article-title":"attack graphs for sensor placement, alert prioritization, and attack response","author":"noel","year":"2007","journal-title":"Cyberspace Research Workshop"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/1073970.1074010"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948232"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208667"},{"article-title":"towards efficient large-scale vpn monitoring and diagnosis under operational constraints","year":"2008","author":"zhao","key":"10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208666"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.925635"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2022158"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498451"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015475"},{"key":"9","article-title":"on the cost-quality tradeoff in topology-aware overlay path probing","author":"tang","year":"2003","journal-title":"IEEE ICNP"},{"journal-title":"Approximation Algorithms","year":"2001","author":"vazirani","key":"8"}],"event":{"name":"2009 Proceedings IEEE INFOCOM","start":{"date-parts":[[2009,4,19]]},"location":"Rio de Janeiro, Brazil","end":{"date-parts":[[2009,4,25]]}},"container-title":["IEEE INFOCOM 2009"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5061887\/5061888\/05061959.pdf?arnumber=5061959","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,2]],"date-time":"2023-03-02T13:23:50Z","timestamp":1677763430000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5061959\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,4]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/infcom.2009.5061959","relation":{},"subject":[],"published":{"date-parts":[[2009,4]]}}}