{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T03:39:26Z","timestamp":1771299566524,"version":"3.50.1"},"reference-count":22,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000774","name":"Defense Threat Reduction Agency","doi-asserted-by":"publisher","award":["HDTRA1-10-1-0085"],"award-info":[{"award-number":["HDTRA1-10-1-0085"]}],"id":[{"id":"10.13039\/100000774","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100004415","name":"NATO under SPS","doi-asserted-by":"publisher","award":["G4936 SONiCS"],"award-info":[{"award-number":["G4936 SONiCS"]}],"id":[{"id":"10.13039\/100004415","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1109\/tnet.2020.2969523","type":"journal-article","created":{"date-parts":[[2020,2,19]],"date-time":"2020-02-19T21:25:42Z","timestamp":1582147542000},"page":"588-601","source":"Crossref","is-referenced-by-count":27,"title":["On Fundamental Bounds on Failure Identifiability by Boolean Network Tomography"],"prefix":"10.1109","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1278-4549","authenticated-orcid":false,"given":"Novella","family":"Bartolini","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1070-7483","authenticated-orcid":false,"given":"Ting","family":"He","sequence":"additional","affiliation":[]},{"given":"Viviana","family":"Arrigoni","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8343-8929","authenticated-orcid":false,"given":"Annalisa","family":"Massini","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6640-1972","authenticated-orcid":false,"given":"Federico","family":"Trombetti","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4859-814X","authenticated-orcid":false,"given":"Hana","family":"Khamfroush","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663723"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2584544"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.882907"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2014.56"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524375"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2642185"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2834141"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057091"},{"key":"ref18","article-title":"On fundamental bounds of failure identifiability by Boolean network tomography","author":"bartolini","year":"2019","journal-title":"arXiv 1903 10636"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402967"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177731363"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2169535"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.21"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2178156"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.885460"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2015.06.003"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948232"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.252"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.245"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1985.6312192"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1538902.1538905"},{"key":"ref21","year":"2019","journal-title":"Aurora Fiber Optic Networks"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/90\/9069346\/09003530.pdf?arnumber=9003530","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T14:42:26Z","timestamp":1651070546000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9003530\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4]]},"references-count":22,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2020.2969523","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"value":"1063-6692","type":"print"},{"value":"1558-2566","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4]]}}}