{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T19:09:02Z","timestamp":1693854542782},"reference-count":24,"publisher":"Elsevier BV","issue":"14","license":[{"start":{"date-parts":[[2010,9,1]],"date-time":"2010-09-01T00:00:00Z","timestamp":1283299200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1016\/j.comcom.2010.02.023","type":"journal-article","created":{"date-parts":[[2010,3,9]],"date-time":"2010-03-09T09:48:23Z","timestamp":1268128103000},"page":"1695-1706","source":"Crossref","is-referenced-by-count":5,"title":["The impact of dynamic adversarial attacks on the stability of heterogeneous multimedia networks"],"prefix":"10.1016","volume":"33","author":[{"given":"Dimitrios","family":"Koukopoulos","sequence":"first","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.comcom.2010.02.023_bib1","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1137\/S0097539703435522","article-title":"A characterization of universal stability in the adversarial queuing model","volume":"34","author":"Alvarez","year":"2004","journal-title":"SIAM Journal on Computing"},{"key":"10.1016\/j.comcom.2010.02.023_bib2","unstructured":"C. Alvarez, M. Blesa, M. Serna, The impact of failure management on the stability of communication networks, in: Proceedings of the 10th Int\u2019l Conference on Parallel and Distributed Systems, 2004, pp. 153\u2013160."},{"issue":"1","key":"10.1016\/j.comcom.2010.02.023_bib3","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/363647.363677","article-title":"Universal stability results for greedy contention-resolution protocols","volume":"48","author":"Andrews","year":"2001","journal-title":"Journal of the ACM"},{"key":"10.1016\/j.comcom.2010.02.023_bib4","unstructured":"T. Beth, M. Borcherdingm, B. Klein, Trust relationships in secure systems \u2013 a distributed authentication perspective, IEEE Symposium in Security and Privacy, 1993."},{"key":"10.1016\/j.comcom.2010.02.023_bib5","doi-asserted-by":"crossref","unstructured":"M. Blesa, D. Calzada, A. Fern\u00e1ndez, L. L\u00f3pez, A. Mart\u00ednez, A. Santos, M. Serna, Adversarial queueing model for continuous network dynamics, in: Proceedings of the 30th Int\u2019l Symposium on Mathematical Foundations of Computer Science, 2005, LNCS 3618, pp. 144\u2013155.","DOI":"10.1007\/11549345_14"},{"issue":"1","key":"10.1016\/j.comcom.2010.02.023_bib6","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/363647.363659","article-title":"Adversarial queueing theory","volume":"48","author":"Borodin","year":"2001","journal-title":"Journal of the ACM"},{"key":"10.1016\/j.comcom.2010.02.023_bib7","unstructured":"A. Borodin, R. Ostrovsky, Y. Rabani, Stability preserving transformations: packet routing networks with edge capacities and speeds, in: Proceedings of the 12th Annual ACM-SIAM Symposium on Discrete Algorithms, Washington, DC, USA, 2001, pp. 601\u2013610."},{"key":"10.1016\/j.comcom.2010.02.023_bib8","doi-asserted-by":"crossref","first-page":"953","DOI":"10.1016\/S0169-7552(97)00009-3","article-title":"REFEREE: trust management for web applications","volume":"29","author":"Chu","year":"1997","journal-title":"Computer Networks and ISDN Systems"},{"key":"10.1016\/j.comcom.2010.02.023_bib9","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1109\/90.944338","article-title":"Difficulties in simulating the internet","author":"Floyd","year":"2001","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10.1016\/j.comcom.2010.02.023_bib10","unstructured":"A. J\u00f8sang, S.J. Knapskog, A metric for trusted systems, in: Proceedings of the 21st NIST-NCSC National Information Systems Security Conference, 1998, pp. 16\u201329."},{"key":"10.1016\/j.comcom.2010.02.023_bib11","unstructured":"D. Koukopoulos, The impact of dynamic link slowdowns on network stability, in: Proceedings of the 8th Int\u2019l Symposium on Parallel Architectures, Algorithms and Networks, 2005, pp. 340\u2013345."},{"issue":"2","key":"10.1016\/j.comcom.2010.02.023_bib12","first-page":"444","article-title":"Stability in heterogeneous multimedia networks under adversarial attacks","volume":"14","author":"Koukopoulos","year":"2009","journal-title":"Journal of Universal Computer Science"},{"key":"10.1016\/j.comcom.2010.02.023_bib13","doi-asserted-by":"crossref","unstructured":"D. Koukopoulos, M. Mavronicolas, S. Nikoletseas, P. Spirakis, On the stability of compositions of universally stable, greedy, contention-resolution protocols, in: Proceedings of the 16th Int\u2019l Symposium on Distributed Computing, 2002, LNCS 2508, pp. 88\u2013102.","DOI":"10.1007\/3-540-36108-1_6"},{"key":"10.1016\/j.comcom.2010.02.023_bib14","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1007\/s00224-004-1181-3","article-title":"The impact of network structure on the stability of greedy protocols","volume":"38","author":"Koukopoulos","year":"2005","journal-title":"Theory of Computing Systems"},{"key":"10.1016\/j.comcom.2010.02.023_bib15","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.tcs.2007.04.008","article-title":"The increase of the instability of networks due to quasi-static link capacities","volume":"381","author":"Koukopoulos","year":"2007","journal-title":"Theoretical Computer Science"},{"key":"10.1016\/j.comcom.2010.02.023_bib16","series-title":"Computer Security Handbook","article-title":"Chapt. 11 \u2013 Denial of service attacks","author":"Levine","year":"2002"},{"issue":"12","key":"10.1016\/j.comcom.2010.02.023_bib17","doi-asserted-by":"crossref","first-page":"1406","DOI":"10.1109\/9.106156","article-title":"Distributed scheduling based on due dates and buffer priorities","volume":"36","author":"Lu","year":"1991","journal-title":"IEEE Transactions on Automatic Control"},{"key":"10.1016\/j.comcom.2010.02.023_bib18","unstructured":"N. Li, J.C. Mitchell, RT: A role-based trust-management framework, in: Proceedings of the 3rd DARPA Information Survivability Conference and Exposition, 2003, pp. 201\u2013212."},{"key":"10.1016\/j.comcom.2010.02.023_bib19","series-title":"Distributed Algorithms","author":"Lynch","year":"1996"},{"issue":"2","key":"10.1016\/j.comcom.2010.02.023_bib20","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1145\/1132026.1132027","article-title":"Inferring internet denial-of-service activity","volume":"24","author":"Moore","year":"2006","journal-title":"ACM Transactions on Computer System"},{"issue":"6","key":"10.1016\/j.comcom.2010.02.023_bib21","first-page":"124","article-title":"Detection of DDoS and IDS evasion attacks in a high-speed networks environment","volume":"7","author":"Oh","year":"2005","journal-title":"International Journal of Computer Science and Network Security"},{"key":"10.1016\/j.comcom.2010.02.023_bib22","first-page":"199","article-title":"Ergodicity of stochastic processes describing the operation of open queuing networks","volume":"28","author":"Rybko","year":"1992","journal-title":"Problems of Information Transmission"},{"key":"10.1016\/j.comcom.2010.02.023_bib23","unstructured":"P. Tsaparas, Stability in adversarial queueing theory, M.Sc. Thesis, Department of Computer Science, University of Toronto, 1997."},{"issue":"1","key":"10.1016\/j.comcom.2010.02.023_bib24","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1109\/TNET.2004.842221","article-title":"Defending against distributed denial-of-service attacks with max\u2013min fair server-centric router throttles","volume":"13","author":"Yau","year":"2005","journal-title":"IEEE\/ACM Transactions on Networking"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366410000988?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366410000988?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T19:29:15Z","timestamp":1558898955000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366410000988"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9]]},"references-count":24,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2010,9]]}},"alternative-id":["S0140366410000988"],"URL":"https:\/\/doi.org\/10.1016\/j.comcom.2010.02.023","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2010,9]]}}}