{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T14:01:44Z","timestamp":1726408904259},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031160806"},{"type":"electronic","value":"9783031160813"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-16081-3_15","type":"book-chapter","created":{"date-parts":[[2022,9,17]],"date-time":"2022-09-17T22:02:24Z","timestamp":1663452144000},"page":"171-182","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Defense of Scapegoating Attack in Network Tomography"],"prefix":"10.1007","author":[{"given":"Xiaojia","family":"Xu","sequence":"first","affiliation":[]},{"given":"Yongcai","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Deying","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,18]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Chen, A., Cao, J., Bu, T.: Network Tomography: Identifiability and Fourier Domain Estimation, December 2007","DOI":"10.1109\/INFCOM.2007.218"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Chiu, C.C., He, T.: Stealthy DGoS attack: degrading of service under the watch of network tomography. In: IEEE INFOCOM 2020 - IEEE Conference on Computer Communications, pp. 367\u2013376. IEEE Press, Toronto, ON, Canada, July 2020","DOI":"10.1109\/INFOCOM41043.2020.9155344"},{"key":"15_CR3","unstructured":"Constantin, L.: Attackers slip rogue, backdoored firmware onto Cisco routers | PCWorld. https:\/\/www.pcworld.com\/article\/2984084\/attackers-install-highly-persistent-malware-implants-on-cisco-routers.html"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Duffield, N., Presti, F.L., Paxson, V., Towsley, D.: Network loss tomography using striped unicast probes. IEEE\/ACM Trans. Networking 14(4), 697\u2013710 (2006). Conference name: IEEE\/ACM Transactions on Networking","DOI":"10.1109\/TNET.2006.880182"},{"key":"15_CR5","first-page":"17","volume":"5","author":"P Erd\u00f6s","year":"1960","unstructured":"Erd\u00f6s, P., R\u00e9nyi, A.: On the evolution of random graphs. Publ. Mah. Inst. Hung. Acad. Sci 5, 17\u201360 (1960)","journal-title":"Publ. Mah. Inst. Hung. Acad. Sci"},{"issue":"9","key":"15_CR6","doi-asserted-by":"publisher","first-page":"1765","DOI":"10.1109\/JSAC.2011.111002","volume":"29","author":"S Knight","year":"2011","unstructured":"Knight, S., Nguyen, H.X., Falkner, N., Bowden, R., Roughan, M.: The internet topology zoo. IEEE J. Sel. Areas Commun. 29(9), 1765\u20131775 (2011)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Ma, L., He, T., Leung, K.K., Swami, A., Towsley, D.: Monitor placement for maximal identifiability in network tomography. In: IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, pp. 1447\u20131455, April 2014. ISSN: 0743-166X","DOI":"10.1109\/INFOCOM.2014.6848079"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Ma, L., He, T., Leung, K., Swami, A., Towsley, D.: Identifiability of link metrics based on end-to-end path measurements, pp. 391\u2013404, October 2013","DOI":"10.1145\/2504730.2504738"},{"issue":"4","key":"15_CR9","doi-asserted-by":"publisher","first-page":"1351","DOI":"10.1109\/TNET.2014.2328668","volume":"22","author":"L Ma","year":"2014","unstructured":"Ma, L., He, T., Leung, K.K., Swami, A., Towsley, D.: Inferring link metrics from end-to-end path measurements: identifiability and monitor placement. IEEE\/ACM Trans. Networking 22(4), 1351\u20131368 (2014)","journal-title":"IEEE\/ACM Trans. Networking"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Ma, L., He, T., Leung, K.K., Towsley, D., Swami, A.: Efficient identification of additive link metrics via network tomography. In: Proceedings - 2013 IEEE 33rd International Conference on Distributed Computing Systems, ICDCS 2013, pp. 581\u2013590, December 2013","DOI":"10.1109\/ICDCS.2013.24"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Ma, L., He, T., Swami, A., Towsley, D., Leung, K.K.: On optimal monitor placement for localizing node failures via network tomography. In: Performance Evaluation. Elsevier Science Publishers B. V. PUB568 Amsterdam, The Netherlands, The Netherlands, September 2015","DOI":"10.1016\/j.peva.2015.06.003"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Nguyen, H.X., Thiran, P.: The boolean solution to the congested IP link location problem: theory and practice. In: IEEE INFOCOM 2007\u201326th IEEE International Conference on Computer Communications, pp. 2117\u20132125, May 2007. ISSN: 0743-166X","DOI":"10.1109\/INFCOM.2007.245"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Pepe, T., Puleri, M.: Network tomography: a novel algorithm for probing path selection. In: 2015 IEEE International Conference on Communications (ICC) (2015)","DOI":"10.1109\/ICC.2015.7249172"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Qiao, Y., Jiao, J., Rao, Y., Ma, H.: Adaptive path selection for link loss inference in network tomography applications. PLOS ONE 11(10), e0163706 (2016). Public Library of Science","DOI":"10.1371\/journal.pone.0163706"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Tague, P., Poovendran, R.: Modeling node capture attacks in wireless sensor networks. In: 2008 46th Annual Allerton Conference on Communication, Control, and Computing, pp. 1221\u20131224, September 2008","DOI":"10.1109\/ALLERTON.2008.4797699"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Tati, S., Silvestri, S., He, T., Porta, T.L.: Robust network tomography in the presence of failures. In: 2014 IEEE 34th International Conference on Distributed Computing Systems, pp. 481\u2013492, June 2014. ISSN: 1063-6927","DOI":"10.1109\/ICDCS.2014.56"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Tati, S., Silvestri, S., He, T., Porta, T.L.: Robust network tomography in the presence of failures. In: 2014 IEEE 34th International Conference on Distributed Computing Systems, pp. 481\u2013492 (2014)","DOI":"10.1109\/ICDCS.2014.56"},{"key":"15_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04565-7","volume-title":"Approximation Algorithms","author":"VV Vazirani","year":"2001","unstructured":"Vazirani, V.V.: Approximation Algorithms. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/978-3-662-04565-7"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Xu, X., Wang, Y., Xu, L., Li, D.: Locate vulnerable link set to launch minimum cost scapegoating attack in network tomography. Under review (2022)","DOI":"10.1109\/TNSE.2023.3271135"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Zhao, S., Lu, Z., Wang, C.: When seeing isn\u2019t believing: on feasibility and detectability of scapegoating in network tomography. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 172\u2013182, June 2017. ISSN: 1063-6927","DOI":"10.1109\/ICDCS.2017.23"},{"key":"15_CR21","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1145\/510726.510738","volume":"32","author":"Y Zhao","year":"2001","unstructured":"Zhao, Y., Govindan, R., Estrin, D.: Sensor network tomography: monitoring wireless sensor networks. ACM SIGCOMM Comput. Commun. Rev. 32, 64 (2001)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."}],"container-title":["Lecture Notes in Computer Science","Algorithmic Aspects in Information and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-16081-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T03:59:38Z","timestamp":1701057578000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-16081-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031160806","9783031160813"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-16081-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"18 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AAIM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithmic Applications in Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 August 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 August 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aaim2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Springer Nature EquinOCS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"59","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"69% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}