{"id":"https://openalex.org/W1540177876","doi":"https://doi.org/10.1007/978-3-540-75853-2_9","title":"Distributed Dynamic Protection of Services on Ad Hoc and Peer to Peer Networks","display_name":"Distributed Dynamic Protection of Services on Ad Hoc and Peer to Peer Networks","publication_year":2007,"publication_date":"2007-11-03","ids":{"openalex":"https://openalex.org/W1540177876","doi":"https://doi.org/10.1007/978-3-540-75853-2_9","mag":"1540177876"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-75853-2_9","pdf_url":null,"source":{"id":"https://openalex.org/S4306420379","display_name":"IP Operations and Management","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"book-chapter","type_crossref":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003970802","display_name":"Jimmy McGibney","orcid":"https://orcid.org/0000-0003-4541-1420"},"institutions":[{"id":"https://openalex.org/I7478328","display_name":"Waterford Institute of Technology","ror":"https://ror.org/03ypxwh20","country_code":"IE","type":"nonprofit","lineage":["https://openalex.org/I7478328"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Jimmy McGibney","raw_affiliation_strings":["Telecommunications Software & Systems Group, Waterford Institute of Technology, Waterford, Ireland"],"affiliations":[{"raw_affiliation_string":"Telecommunications Software & Systems Group, Waterford Institute of Technology, Waterford, Ireland","institution_ids":["https://openalex.org/I7478328"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5105521501","display_name":"Dmitri Botvich","orcid":null},"institutions":[{"id":"https://openalex.org/I7478328","display_name":"Waterford Institute of Technology","ror":"https://ror.org/03ypxwh20","country_code":"IE","type":"nonprofit","lineage":["https://openalex.org/I7478328"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Dmitri Botvich","raw_affiliation_strings":["Telecommunications Software & Systems Group, Waterford Institute of Technology, Waterford, Ireland"],"affiliations":[{"raw_affiliation_string":"Telecommunications Software & Systems Group, Waterford Institute of Technology, Waterford, Ireland","institution_ids":["https://openalex.org/I7478328"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":4.625,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.681568,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":74,"max":76},"biblio":{"volume":null,"issue":null,"first_page":"95","last_page":"106"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9988,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness","score":0.6255475},{"id":"https://openalex.org/keywords/overlay-network","display_name":"Overlay network","score":0.43449295},{"id":"https://openalex.org/keywords/reputation-system","display_name":"Reputation system","score":0.42607835}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7517985},{"id":"https://openalex.org/C136085584","wikidata":"https://www.wikidata.org/wiki/Q910289","display_name":"Overlay","level":2,"score":0.6639905},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.6361284},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6255475},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.58662},{"id":"https://openalex.org/C534932454","wikidata":"https://www.wikidata.org/wiki/Q161410","display_name":"Peer-to-peer","level":2,"score":0.5303137},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.51247007},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4990065},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4974909},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.48209527},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.44231465},{"id":"https://openalex.org/C169851745","wikidata":"https://www.wikidata.org/wiki/Q1331985","display_name":"Overlay network","level":3,"score":0.43449295},{"id":"https://openalex.org/C2781218421","wikidata":"https://www.wikidata.org/wiki/Q2892532","display_name":"Reputation system","level":3,"score":0.42607835},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13941398},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11678901},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.099267095},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.094638646},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-75853-2_9","pdf_url":null,"source":{"id":"https://openalex.org/S4306420379","display_name":"IP Operations and Management","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":23,"referenced_works":["https://openalex.org/W1033860095","https://openalex.org/W1480118979","https://openalex.org/W1500109124","https://openalex.org/W1520914943","https://openalex.org/W1590111181","https://openalex.org/W1854214752","https://openalex.org/W1891363781","https://openalex.org/W1898447907","https://openalex.org/W1984101748","https://openalex.org/W1987710704","https://openalex.org/W1994181344","https://openalex.org/W2000432379","https://openalex.org/W2097726984","https://openalex.org/W2099852195","https://openalex.org/W2101107874","https://openalex.org/W2105141760","https://openalex.org/W2120611165","https://openalex.org/W2156523427","https://openalex.org/W2158923961","https://openalex.org/W2163498454","https://openalex.org/W230251164","https://openalex.org/W2561675875","https://openalex.org/W4254761308"],"related_works":["https://openalex.org/W89955905","https://openalex.org/W4210965064","https://openalex.org/W2749656779","https://openalex.org/W2134691083","https://openalex.org/W2126533264","https://openalex.org/W2122565901","https://openalex.org/W2042060105","https://openalex.org/W2041341978","https://openalex.org/W1691715735","https://openalex.org/W1637847238"],"abstract_inverted_index":{"A":[0,45],"collaborative":[1],"system":[2,27,85,107],"for":[3],"dynamic":[4,106],"refinement":[5],"of":[6,76,78,81,84,91,123],"security":[7,113],"in":[8,17,40],"peer-to-peer":[9],"and":[10,51,88,99,114,118],"mobile":[11],"ad":[12],"hoc":[13],"networks":[14],"is":[15,21,102],"described":[16],"this":[18,54,57,82,105],"paper.":[19],"This":[20],"based":[22],"on":[23],"a":[24,41,89],"closed":[25],"loop":[26],"where":[28],"live":[29],"distributed":[30],"trust":[31,48,62,96],"measures":[32],"are":[33,86,97],"used":[34],"to":[35,94,111,132],"modify":[36],"access":[37,115],"control":[38,116],"settings":[39],"changing":[42],"threat":[43],"environment.":[44],"service":[46],"oriented":[47],"overlay":[49],"architecture":[50],"model":[52],"underlies":[53],"system.":[55,135],"In":[56],"model,":[58],"services":[59],"have":[60],"associated":[61],"thresholds":[63],"\u2013":[64],"the":[65,68,70,72,79,109,134],"more":[66],"sensitive":[67],"service,":[69],"higher":[71],"threshold.":[73],"The":[74],"results":[75],"simulations":[77],"dynamics":[80],"kind":[83],"presented":[87],"variety":[90],"algorithmic":[92],"approaches":[93],"managing":[95],"analysed":[98],"discussed.":[100],"It":[101],"demonstrated":[103],"that":[104,119,130],"has":[108],"potential":[110],"enhance":[112],"efficiency":[117],"it":[120],"displays":[121],"properties":[122],"robustness":[124],"when":[125],"faced":[126],"with":[127],"malicious":[128],"entities":[129],"attempt":[131],"corrupt":[133]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1540177876","counts_by_year":[],"updated_date":"2025-04-17T23:31:53.509821","created_date":"2016-06-24"}