{"id":"https://openalex.org/W1488245248","doi":"https://doi.org/10.1007/978-3-540-30483-8_20","title":"Availability Analysis and Comparison of Different Intrusion-Tolerant Systems","display_name":"Availability Analysis and Comparison of Different Intrusion-Tolerant Systems","publication_year":2004,"publication_date":"2004-01-01","ids":{"openalex":"https://openalex.org/W1488245248","doi":"https://doi.org/10.1007/978-3-540-30483-8_20","mag":"1488245248"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-30483-8_20","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-30483-8_20","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100407081","display_name":"Chao Wang","orcid":"https://orcid.org/0000-0003-0187-6453"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chao Wang","raw_affiliation_strings":["Key Laboratory of Computer Networks and Information Security, Xidian University, Ministry of Education, 710071, Xi\u2019an, P.R. China","Key Laboratory of Computer Networks and Information Security, Xidian University, Ministry of Education, 710071, Xi'an, P.R. China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Computer Networks and Information Security, Xidian University, Ministry of Education, 710071, Xi\u2019an, P.R. China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Key Laboratory of Computer Networks and Information Security, Xidian University, Ministry of Education, 710071, Xi'an, P.R. China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012016098","display_name":"Jianfeng Ma","orcid":"https://orcid.org/0000-0003-4251-1143"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian-Feng Ma","raw_affiliation_strings":["Key Laboratory of Computer Networks and Information Security, Xidian University, Ministry of Education, 710071, Xi\u2019an, P.R. China","Key Laboratory of Computer Networks and Information Security, Xidian University, Ministry of Education, 710071, Xi'an, P.R. China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Computer Networks and Information Security, Xidian University, Ministry of Education, 710071, Xi\u2019an, P.R. China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Key Laboratory of Computer Networks and Information Security, Xidian University, Ministry of Education, 710071, Xi'an, P.R. China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100407081"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.3152,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.54668957,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"161","last_page":"166"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11125","display_name":"Petri Nets in System Modeling","score":0.9850000143051147,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.9151244163513184},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.804273247718811},{"id":"https://openalex.org/keywords/stochastic-petri-net","display_name":"Stochastic Petri net","score":0.6283363103866577},{"id":"https://openalex.org/keywords/petri-net","display_name":"Petri net","score":0.5876665115356445},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.562066376209259},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5111671090126038},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.42085108160972595},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.35690054297447205},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3028278052806854},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10349437594413757}],"concepts":[{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.9151244163513184},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.804273247718811},{"id":"https://openalex.org/C197551870","wikidata":"https://www.wikidata.org/wiki/Q7617809","display_name":"Stochastic Petri net","level":3,"score":0.6283363103866577},{"id":"https://openalex.org/C38677869","wikidata":"https://www.wikidata.org/wiki/Q724168","display_name":"Petri net","level":2,"score":0.5876665115356445},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.562066376209259},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5111671090126038},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.42085108160972595},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35690054297447205},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3028278052806854},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10349437594413757},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-540-30483-8_20","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-30483-8_20","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W2137650896","https://openalex.org/W2139102556","https://openalex.org/W2170590256","https://openalex.org/W4254526136"],"related_works":["https://openalex.org/W1543378523","https://openalex.org/W1491709828","https://openalex.org/W2916743419","https://openalex.org/W2381491984","https://openalex.org/W2257573499","https://openalex.org/W1980200158","https://openalex.org/W1513546254","https://openalex.org/W2148229336","https://openalex.org/W2091203523","https://openalex.org/W2125164140"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
