{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T01:04:46Z","timestamp":1759971886732,"version":"build-2065373602"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1109\/tnsm.2025.3589936","type":"journal-article","created":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T17:39:10Z","timestamp":1752687550000},"page":"3895-3908","source":"Crossref","is-referenced-by-count":0,"title":["Availability and Cost Analysis of Network-Attack-Resilient Byzantine Fault Tolerant Systems"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-2953-126X","authenticated-orcid":false,"given":"Aren","family":"Alyahya","sequence":"first","affiliation":[{"name":"Department of Informatics and Networked Systems, University of Pittsburgh, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9429-6425","authenticated-orcid":false,"given":"David","family":"Tipper","sequence":"additional","affiliation":[{"name":"Department of Informatics and Networked Systems, University of Pittsburgh, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9982-1364","authenticated-orcid":false,"given":"Amy","family":"Babay","sequence":"additional","affiliation":[{"name":"Department of Informatics and Networked Systems, University of Pittsburgh, Pittsburgh, PA, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04444-1_3"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00036"},{"volume-title":"FPL breaks ground on distribution center to be CAT-5 storm ready","year":"2017","author":"Salisbury","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48987.2021.00019"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS60354.2023.00033"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.53"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-02939-x"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS64841.2024.00014"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2009.83"},{"article-title":"Intrusion-tolerant SCADA for the power grid","year":"2019","author":"Tantillo","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14778\/3380750.3380757"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM52122.2024.10621371"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2024.3502619"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-024-01888-4"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9061050"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1017\/9781316163047"},{"volume-title":"Amazon compute service level agreement","year":"2024","key":"ref19"},{"volume-title":"AWS pricing calculater","year":"2024","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEUROPE.2010.5638912"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2017.7510313"},{"article-title":"Adapting distributed database systems for high availability","year":"1995","author":"Liu","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03617-z"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2018.8538752"},{"key":"ref26","first-page":"38","article-title":"Sitar: A scalable intrusion-tolerant architecture for distributed services","volume-title":"Proc. IEEE Workshop Inf. Assurance Security","author":"Feiyi"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2014.11.110"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10665-1_16"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICON.2012.6506597"},{"key":"ref30","first-page":"C-5-1","article-title":"Providing intrusion tolerance with ITUA","volume-title":"Proc. Int. Conf. Dependable Syst. Netw. (DSN)","author":"Courtney"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/dsn.2003.1209971"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30483-8_20"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS64841.2024.00017"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-29056-5_4"},{"key":"ref35","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2023.100889","article-title":"Availability evaluation of IoT systems with Byzantine fault-tolerance for mission-critical applications","volume":"23","author":"Marcozzi","year":"2023","journal-title":"Internet Things"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121838"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/LADC.2011.27"},{"key":"ref38","first-page":"485","article-title":"XFT: Practical fault tolerance beyond crashes","volume-title":"Proc. 12th USENIX Symp. Oper. Syst. Design Implement. (OSDI)","author":"Liu"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4275028\/11194281\/11081952.pdf?arnumber=11081952","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T17:38:23Z","timestamp":1759945103000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11081952\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":38,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2025.3589936","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"type":"electronic","value":"1932-4537"},{"type":"electronic","value":"2373-7379"}],"subject":[],"published":{"date-parts":[[2025,10]]}}}