{"id":"https://openalex.org/W2100843663","doi":"https://doi.org/10.1109/dsn.2010.5544292","title":"Combined performance and risk analysis for border management applications","display_name":"Combined performance and risk analysis for border management applications","publication_year":2010,"publication_date":"2010-06-01","ids":{"openalex":"https://openalex.org/W2100843663","doi":"https://doi.org/10.1109/dsn.2010.5544292","mag":"2100843663"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsn.2010.5544292","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000627653","display_name":"Mayra Sacanamboy","orcid":null},"institutions":[{"id":"https://openalex.org/I12097938","display_name":"West Virginia University","ror":"https://ror.org/011vxgd24","country_code":"US","type":"funder","lineage":["https://openalex.org/I12097938"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mayra Sacanamboy","raw_affiliation_strings":["Lane Department of CSEE, West Virginia University, US"],"affiliations":[{"raw_affiliation_string":"Lane Department of CSEE, West Virginia University, US","institution_ids":["https://openalex.org/I12097938"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015369081","display_name":"Bojan \u010cuki\u0107","orcid":"https://orcid.org/0000-0001-7130-9054"},"institutions":[{"id":"https://openalex.org/I12097938","display_name":"West Virginia University","ror":"https://ror.org/011vxgd24","country_code":"US","type":"funder","lineage":["https://openalex.org/I12097938"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bojan Cukic","raw_affiliation_strings":["Lane Department of CSEE, West Virginia University, US"],"affiliations":[{"raw_affiliation_string":"Lane Department of CSEE, West Virginia University, US","institution_ids":["https://openalex.org/I12097938"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.807,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":12,"citation_normalized_percentile":{"value":0.750161,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":85,"max":86},"biblio":{"volume":"5","issue":null,"first_page":"403","last_page":"412"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9971,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/security-management","display_name":"Security management","score":0.5589313},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security Analysis","score":0.43364534}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7341633},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.603444},{"id":"https://openalex.org/C22684755","wikidata":"https://www.wikidata.org/wiki/Q847526","display_name":"Queueing theory","level":2,"score":0.58855987},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.5589313},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.5404722},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.47952485},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.43364534},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.42467317},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.42195815},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34693706},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.103735805},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.07920301},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsn.2010.5544292","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":20,"referenced_works":["https://openalex.org/W1486258796","https://openalex.org/W1513732820","https://openalex.org/W1539705164","https://openalex.org/W1555832859","https://openalex.org/W1570250031","https://openalex.org/W1976526581","https://openalex.org/W2015677718","https://openalex.org/W2033406822","https://openalex.org/W2055136026","https://openalex.org/W2073781861","https://openalex.org/W2091617097","https://openalex.org/W2097691224","https://openalex.org/W2098321443","https://openalex.org/W2115650093","https://openalex.org/W2140531109","https://openalex.org/W2141204324","https://openalex.org/W2165439624","https://openalex.org/W2293748320","https://openalex.org/W2789848387","https://openalex.org/W6540341"],"related_works":["https://openalex.org/W4246428902","https://openalex.org/W3099433986","https://openalex.org/W3037285711","https://openalex.org/W2744631404","https://openalex.org/W2498628942","https://openalex.org/W2392498762","https://openalex.org/W2378688856","https://openalex.org/W2350820032","https://openalex.org/W2062353301","https://openalex.org/W1623393394"],"abstract_inverted_index":{"When":[0],"designing":[1],"critical":[2],"applications,":[3],"trade":[4],"offs":[5],"between":[6],"different":[7],"security":[8,43,68,72,76],"solutions":[9],"and":[10,42,70],"their":[11],"performance":[12,41,60],"implications":[13,20],"are":[14],"common.":[15],"Unfortunately,":[16],"understanding":[17],"the":[18,26],"precise":[19],"of":[21,40,67,91],"such":[22],"tradeoffs":[23],"early":[24],"in":[25],"system":[27,47],"development":[28],"lifecycle":[29],"is":[30,84],"difficult.":[31],"This":[32],"paper":[33],"proposes":[34],"a":[35,50,65,87,92],"methodology":[36],"for":[37],"combined":[38],"analysis":[39,61],"risk.":[44],"We":[45,74],"transform":[46],"requirements":[48],"into":[49],"Layered":[51],"Queueing":[52],"Network":[53],"(LQN)":[54],"model":[55],"that":[56],"subsequently":[57],"provides":[58],"analytical":[59],"feedback":[62],"when":[63],"considering":[64],"set":[66],"mechanisms":[69],"incurred":[71],"risks.":[73],"quantify":[75],"risks":[77],"using":[78],"cost":[79],"curves.":[80],"The":[81],"proposed":[82],"approach":[83],"illustrated":[85],"through":[86],"realistic":[88],"case":[89],"study":[90],"border":[93],"management":[94],"application.":[95]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2100843663","counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-04-21T13:02:36.962440","created_date":"2016-06-24"}