{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T10:14:29Z","timestamp":1729678469059,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/cse.2015.23","type":"proceedings-article","created":{"date-parts":[[2016,1,7]],"date-time":"2016-01-07T17:17:09Z","timestamp":1452187029000},"page":"168-175","source":"Crossref","is-referenced-by-count":4,"title":["The Genetic Approach for Design of Virtual Private Networks"],"prefix":"10.1109","author":[{"given":"Igor","family":"Kotenko","sequence":"first","affiliation":[]},{"given":"Igor","family":"Saenko","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Virtual private network design: a proof of the tree routing cnnjecture on ring networks","volume":"21","author":"hurkens","year":"2004","journal-title":"SIAM 1 Discrete Math"},{"key":"ref11","first-page":"19","article-title":"Virtual Private Network Design Under Traffic Unce","author":"altm","year":"2004","journal-title":"Electronic Notes in Discrete Mathematics"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/11758471_13"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2006.879659"},{"key":"ref14","first-page":"58","article-title":"Performance Investigation of Virtual Private Networks with Different Bandwidth Allocations","volume":"7","author":"natarajan","year":"0","journal-title":"IJCSI International Journal of Computer Science Issues"},{"journal-title":"Next-Generation Virtualized Managed Services for the Enterprise with Secure-on-Network Links to the Cloud","article-title":"Secure Cloud Connectivity for Virtual Private Networks (white paper)","year":"2014","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10422-5_11"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2011.63"},{"key":"ref18","first-page":"86","article-title":"Design of Virtual Local Area Network Scheme Based on Genetic Optimization and Visual Analysis","volume":"5","author":"saenko","year":"2014","journal-title":"Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications (JoWUA)"},{"journal-title":"Queueing Systems","year":"1975","author":"kleinrock","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/316194.316209"},{"journal-title":"Cisco IOS XE Release 3S","article-title":"Flex VPN and Internet Key Exchange Version 2 Configuration Guide","year":"2015","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2007.343610"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.803918"},{"article-title":"QoS-based Virtual Private Network Design for an MPLS network","year":"2002","author":"srikitja","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/11523468_93"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/6294.939974"},{"key":"ref1","first-page":"34","article-title":"Design and Implementation of Mobility for Virtual Private Network Users","volume":"13","author":"rehman","year":"0","journal-title":"Global Journal of Computer Science and Technology Network Web & Security"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019254"},{"key":"ref20","article-title":"Fundamentals of Telecommunication Networks","author":"saadawi","year":"1997","journal-title":"Wiley Series in Telecommunications and Signal Processing"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3927.001.0001","article-title":"An Introduction to Genetic Algorithms","author":"mitchell","year":"1998"},{"journal-title":"Genetic Algorithms in Search Optimization and Machine Learning","year":"1989","author":"goldberg","key":"ref21"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14706-7_16"}],"event":{"name":"2015 IEEE 18th International Conference on Computational Science and Engineering (CSE)","start":{"date-parts":[[2015,10,21]]},"location":"Porto, Portugal","end":{"date-parts":[[2015,10,23]]}},"container-title":["2015 IEEE 18th International Conference on Computational Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7371334\/7371335\/07371370.pdf?arnumber=7371370","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:21:34Z","timestamp":1654042894000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7371370\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/cse.2015.23","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}