{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T06:22:24Z","timestamp":1761805344059,"version":"3.38.0"},"reference-count":22,"publisher":"SAGE Publications","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["KES"],"published-print":{"date-parts":[[2016,7,27]]},"DOI":"10.3233\/kes-160342","type":"journal-article","created":{"date-parts":[[2016,8,2]],"date-time":"2016-08-02T14:27:54Z","timestamp":1470148074000},"page":"175-188","source":"Crossref","is-referenced-by-count":9,"title":["Multi objective optimization of VPN design by linear programming with risks models"],"prefix":"10.1177","volume":"20","author":[{"given":"Alexander","family":"Uskov","sequence":"first","affiliation":[{"name":"Department of Computer Science and Information Systems, Bradley University, Peoria, IL, USA"}]},{"given":"Natalia A.","family":"Serdyukova","sequence":"additional","affiliation":[{"name":"Plekhanov Russian University of Economics, Moscow, Russia"}]},{"given":"Vladimir I.","family":"Serdyukov","sequence":"additional","affiliation":[{"name":"Institute of Management of Education of Russian Academy of Education, Bauman Moscow State Technical University, Moscow, Russia"}]},{"given":"Colleen","family":"Heinemann","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Systems, Bradley University, Peoria, IL, USA"}]},{"given":"Adam","family":"Byerly","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Systems, Bradley University, Peoria, IL, USA"}]}],"member":"179","reference":[{"key":"10.3233\/KES-160342_ref1","unstructured":"Frankel S., Guide to IPsec VPNs: Recommendations of the national institute of standards and technology, National Institute of Standards and Technology, USA, (2005)."},{"volume-title":"IPsec virtual private network fundamentals","year":"2007","author":"Carmouche","key":"10.3233\/KES-160342_ref2"},{"volume-title":"Comparing, designing, and deploying VPNs","year":"2006","author":"Lewis","key":"10.3233\/KES-160342_ref3"},{"volume-title":"IPSec VPN design","year":"2005","author":"Bollapragada","key":"10.3233\/KES-160342_ref4"},{"volume-title":"Cryptography and security services: Mechanisms and applications","year":"2007","author":"Mogollon","key":"10.3233\/KES-160342_ref8"},{"key":"10.3233\/KES-160342_ref10","doi-asserted-by":"crossref","unstructured":"Ghobadi M., Ganti S. and Shoja G.C., Resource optimization to provision a virtual private network using the hose model, Proccedings of the IEEE International Conference on Communications ICC'07, IEEE, (2007), 512-517.","DOI":"10.1109\/ICC.2007.90"},{"key":"10.3233\/KES-160342_ref11","doi-asserted-by":"crossref","unstructured":"Scharf M., Gurbani V., Voith T., Stein M., Roome W., Soprovich G. and Hilt V., Dynamic VPN optimization by ALTO guidance, The Second European Workshop on Software Defined Networks (EWSDN), Alcatel-Lucent, 2013.","DOI":"10.1109\/EWSDN.2013.9"},{"issue":"3","key":"10.3233\/KES-160342_ref12","doi-asserted-by":"crossref","first-page":"706","DOI":"10.1137\/060654827","article-title":"New approaches for virtual private network design","volume":"37","author":"Eisenbrand","year":"2007","journal-title":"SIAM Journal on Computing"},{"issue":"5","key":"10.3233\/KES-160342_ref13","doi-asserted-by":"crossref","first-page":"1544","DOI":"10.1109\/TNET.2010.2043743","article-title":"Multi-VPN optimization for scalable routing via relaying","volume":"18","author":"Bateni","year":"2010","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10.3233\/KES-160342_ref14","unstructured":"Uskov A.A., Information security of IPsec-based mobile VPN: Authentication and encryption algorithms performance, Proceedings 11th IEEE Int Conf on Trust, Security and Privacy in Computing and Communications TrustCom-2012, IEEE, (2012), 1042-1048."},{"key":"10.3233\/KES-160342_ref15","unstructured":"Uskov A., IPsec VPN-based security of web-based rich multimedia systems, Proceedings of the 6th International Conference on Intelligent Interactive Multimedia Systems and Services (IIMSS-2013), IOS Press, (2013), 31-40."},{"key":"10.3233\/KES-160342_ref16","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/978-3-319-14645-4_3","article-title":"Fusion of secure IPsec-based virtual private network, mobile computing and rich multimedia technology","author":"Uskov","year":"2015","journal-title":"Fusion of Smart, Multimedia and Computer Gaming Technology: Research, Systems and Perspectives"},{"issue":"1","key":"10.3233\/KES-160342_ref17","first-page":"18","article-title":"The efficiency of encryption algorithms in EAX mode of operation in IPsec-based virtual private networks for streaming rich multimedia data","volume":"11","author":"Uskov","year":"2014","journal-title":"The International Journal of Computer Science and Applications"},{"key":"10.3233\/KES-160342_ref18","unstructured":"Uskov A., Serdyukova N. and Serdyukov V., Multi-objective optimization of IPsec-based mobile VPN design for secure transfer of multimedia data, Proceedings of the International Conference on Intelligent Interactive Multimedia: Systems and Services KES-IIMSS-2016, IOS Press, in print, (2016)."},{"key":"10.3233\/KES-160342_ref20","first-page":"235","volume-title":"Theory of measurement, 2nd, Physica, Ed.","author":"Pfanzagl","year":"1973"},{"key":"10.3233\/KES-160342_ref21","unstructured":"Prokhorov Y.V., Probability and mathematical statistics, Big Russian Encyclopdia, Ed., Moscow, Russian, 1999."},{"key":"10.3233\/KES-160342_ref22","first-page":"392","volume-title":"Algebraic systems","author":"Maltcev","year":"1970"},{"key":"10.3233\/KES-160342_ref23","unstructured":"Serdyukova N. and Serdyukov V., Modeling, simulations and optimization based on algebraic formalization of the system, Proceedings of the 2016 International Conference on Engineering Education ``New Technologies and Innovation for Global Busness'' (2015), 557-564."},{"key":"10.3233\/KES-160342_ref24","first-page":"640","volume-title":"Lectures on Mathematical Aanlysis","author":"Arkhipov","year":"2004"},{"key":"10.3233\/KES-160342_ref25","doi-asserted-by":"crossref","unstructured":"Zacharov V., Kravtsov A. and Priymenko C., Generalizations of bernstein polynomials in problems of multiobjective optimization, Science and World 1(6) (2014).","DOI":"10.1155\/2014\/961412"},{"issue":"1","key":"10.3233\/KES-160342_ref26","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/BF02759177","article-title":"Involutive bases of Ideals in the ring of polynomials","volume":"26","author":"Astrelin","year":"2000","journal-title":"Programming and Computer"},{"issue":"25","key":"10.3233\/KES-160342_ref27","first-page":"61","article-title":"Method of measurement of risk in conditions of interval uncertainty","volume":"3","author":"Djigimon","year":"2010","journal-title":"Management in Socio-economic Systems"}],"container-title":["International Journal of Knowledge-based and Intelligent Engineering Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/KES-160342","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T16:55:39Z","timestamp":1741625739000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/KES-160342"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,27]]},"references-count":22,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.3233\/kes-160342","relation":{},"ISSN":["1327-2314","1875-8827"],"issn-type":[{"type":"print","value":"1327-2314"},{"type":"electronic","value":"1875-8827"}],"subject":[],"published":{"date-parts":[[2016,7,27]]}}}