{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:56:05Z","timestamp":1729677365392,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/iscc.2017.8024709","type":"proceedings-article","created":{"date-parts":[[2017,9,4]],"date-time":"2017-09-04T20:26:54Z","timestamp":1504556814000},"page":"1332-1337","source":"Crossref","is-referenced-by-count":0,"title":["Worst-case attacker models for two-layered networks based on the Minimum Overlay Cut"],"prefix":"10.1109","author":[{"given":"Martin","family":"Backhaus","sequence":"first","affiliation":[]},{"given":"Guenter","family":"Schaefer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1145\/844128.844156","article-title":"Secure routing for structured peer-to-peer overlay networks","author":"castro","year":"2002","journal-title":"SIGOPS Oper Syst Rev"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-015-9992-x"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2143425"},{"key":"ref13","article-title":"A privacy-preserving location monitoring system for wireless sensor networks","author":"chow","year":"2011","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49380-8_7"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.32"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.842221"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2005.1440942"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-004-4744-y"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514288"},{"key":"ref4","volume":"35","author":"andersen","year":"2001","journal-title":"Resilient overlay networks"},{"key":"ref3","article-title":"A survey of virtual topology design algorithms for wavelength routed optical networks","author":"dutta","year":"2000","journal-title":"Optical Networks"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-010-9168-7"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1145\/380752.380830","article-title":"Pro-visioning a virtual private network: A network design problem for multicommodity flow","author":"gupta","year":"2001","journal-title":"STOC"},{"key":"ref8","article-title":"Approximating minimum label st cut via linear programming","author":"tang","year":"2012","journal-title":"LATIN"},{"journal-title":"Forrester Consulting","year":"2016","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/GIIS.2016.7814941"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2091426"},{"journal-title":"Automatic creation of vpn backup paths for improved resilience against bgp-attackers","year":"2012","author":"grey","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.23919\/INM.2017.7987439"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996833"},{"journal-title":"Gurobi Optimizer Reference Manual","year":"2016","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282417"},{"key":"ref23","article-title":"Inet-3.0: Internet topology generator","author":"winick","year":"2002","journal-title":"University of Michigan Tech Rep"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199206650.001.0001"}],"event":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2017,7,3]]},"location":"Heraklion, Greece","end":{"date-parts":[[2017,7,6]]}},"container-title":["2017 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8016448\/8024490\/08024709.pdf?arnumber=8024709","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T18:16:34Z","timestamp":1719425794000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8024709\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/iscc.2017.8024709","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}