{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:52:35Z","timestamp":1760597555805},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2013,6,1]],"date-time":"2013-06-01T00:00:00Z","timestamp":1370044800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/tr.2013.2255794","type":"journal-article","created":{"date-parts":[[2013,4,11]],"date-time":"2013-04-11T18:01:54Z","timestamp":1365703314000},"page":"466-477","source":"Crossref","is-referenced-by-count":2,"title":["Defending Threshold Voting Systems With Identical Voting Units"],"prefix":"10.1109","volume":"62","author":[{"given":"G.","family":"Levitin","sequence":"first","affiliation":[]},{"given":"K.","family":"Hausken","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/800215.806583"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(00)00089-2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/24.295016"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1312","DOI":"10.1109\/T-C.1971.223133","article-title":"the star (self-testing and repairing) computer: an investigation of the theory and practice of fault-tolerant computer design","volume":"c 20","author":"avizienis","year":"1971","journal-title":"IEEE Transactions on Computers"},{"key":"ref14","first-page":"463","article-title":"Optimization of weights for threshold redundancy of binary channels by the method of (Mahalanobis') generalized distance","author":"gogiashvili","year":"2000","journal-title":"Proc MMR 2nd Int Conf Math Methods Rel"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/24.765926"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(01)00034-5"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2003.08.006"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CRiSIS.2011.6061841"},{"key":"ref19","first-page":"97","author":"tullock","year":"1980","journal-title":"In Toward a Theory of the Rent-Seeking Society"},{"key":"ref4","first-page":"3","article-title":"N-version programming: A fault tolerance approach to reliability of software operation","author":"chen","year":"1978","journal-title":"Proc Int Symp Fault-Tolerant Comput"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1080\/00207720903434789"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IPPS.1991.153825"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/24574.24575"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7091-8932-0_3"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1515\/9781400882618-003","author":"von neumann","year":"1956","journal-title":"Automata Studies (Annals of Mathematics Studies no 34)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/12.2185"},{"key":"ref2","first-page":"138","author":"siewiorek","year":"1992","journal-title":"Reliable Computer Systems Design and Evaluation"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/24.370218"},{"key":"ref1","author":"johnson","year":"1989","journal-title":"Design and Analysis of Fault-Tolerant Digital Systems"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(01)00027-8"},{"key":"ref22","first-page":"886","article-title":"Robustness of optimal defensive resource allocations in the face of less than fully rational attackers","author":"hao","year":"0","journal-title":"Proc 2009 Ind Eng Res Conf"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2009.08.016"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1287\/opre.1070.0434"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2013.01.029"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2007.02.013"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2007.11.002"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/6521443\/06497087.pdf?arnumber=6497087","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:37:39Z","timestamp":1642005459000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6497087\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":27,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tr.2013.2255794","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,6]]}}}