{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:11:17Z","timestamp":1775913077682,"version":"3.50.1"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["DP180100212"],"award-info":[{"award-number":["DP180100212"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["DP200102491"],"award-info":[{"award-number":["DP200102491"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2022,5,1]]},"DOI":"10.1109\/tsc.2020.3015316","type":"journal-article","created":{"date-parts":[[2020,8,10]],"date-time":"2020-08-10T21:05:41Z","timestamp":1597093541000},"page":"1746-1759","source":"Crossref","is-referenced-by-count":96,"title":["READ: Robustness-Oriented Edge Application Deployment in Edge Computing Environment"],"prefix":"10.1109","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3226-388X","authenticated-orcid":false,"given":"Bo","family":"Li","sequence":"first","affiliation":[{"name":"School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2607-4556","authenticated-orcid":false,"given":"Qiang","family":"He","sequence":"additional","affiliation":[{"name":"School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8334-6263","authenticated-orcid":false,"given":"Guangming","family":"Cui","sequence":"additional","affiliation":[{"name":"School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3526-3217","authenticated-orcid":false,"given":"Xiaoyu","family":"Xia","sequence":"additional","affiliation":[{"name":"School of Information Technology, Deakin University, Geelong, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5455-3792","authenticated-orcid":false,"given":"Feifei","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Information Technology, Deakin University, Geelong, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3934-7605","authenticated-orcid":false,"given":"Hai","family":"Jin","sequence":"additional","affiliation":[{"name":"Services Computing Technology and System Lab, Big Data Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7868-5471","authenticated-orcid":false,"given":"Yun","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2745201"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2009.82"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.09.005"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2604814"},{"issue":"11","key":"ref6","first-page":"1","article-title":"Mobile edge computing\u2014A key technology towards 5G","volume":"11","author":"Hu","year":"2015","journal-title":"ETSI White Paper"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2682318"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2869954"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.05.058"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2487344"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1800110"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737385"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2841758"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2785305"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737449"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2815360"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2435781"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2604803"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00044"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486411"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00104"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.009"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2017.30"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.4018\/IJESMA.2018070104"},{"key":"ref26","first-page":"308","article-title":"DDoS attack mitigation and resource provisioning in cloud using fog computing","volume-title":"Proc. Int. Conf. Smart Technol. Smart Nat.","author":"Bhushan"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.08.010"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2013.6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2449834"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2790421"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33702-5_37"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3010521"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.07.016"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2510638"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2652850"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737385"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737368"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2938944"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s004530010050"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524340"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03596-9_15"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/774572.774597"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2018.06.008"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3132211.3134454"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2013.0480"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33702-5_8"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.3001570"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid49817.2020.00-85"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2019.00027"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3016344"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3366614.3368103"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3362068"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2013.64"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934917"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847950"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2014.2369421"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2012.33"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2010.5707147"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2459704"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4629386\/9799728\/09163305.pdf?arnumber=9163305","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T22:43:38Z","timestamp":1704840218000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9163305\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,1]]},"references-count":59,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tsc.2020.3015316","relation":{},"ISSN":["1939-1374","2372-0204"],"issn-type":[{"value":"1939-1374","type":"electronic"},{"value":"2372-0204","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,1]]}}}