{"id":"https://openalex.org/W21161113","doi":"https://doi.org/10.1007/978-3-642-23971-7_36","title":"The Strategy of Proactive-Reactive Intrusion Tolerance Recovery Based on Hierarchical Model","display_name":"The Strategy of Proactive-Reactive Intrusion Tolerance Recovery Based on Hierarchical Model","publication_year":2011,"publication_date":"2011-01-01","ids":{"openalex":"https://openalex.org/W21161113","doi":"https://doi.org/10.1007/978-3-642-23971-7_36","mag":"21161113"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-23971-7_36","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-23971-7_36","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034774472","display_name":"Jianhua Huang","orcid":"https://orcid.org/0000-0003-4124-184X"},"institutions":[{"id":"https://openalex.org/I143593769","display_name":"East China University of Science and Technology","ror":"https://ror.org/01vyrm377","country_code":"CN","type":"education","lineage":["https://openalex.org/I143593769"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jian-hua Huang","raw_affiliation_strings":["School of Information Science and Engineering, East China University of Science and Technology, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, East China University of Science and Technology, Shanghai, China","institution_ids":["https://openalex.org/I143593769"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100442817","display_name":"Feifei Wang","orcid":"https://orcid.org/0000-0002-4878-0638"},"institutions":[{"id":"https://openalex.org/I1877545","display_name":"Saint Francis University","ror":"https://ror.org/01wcz2f33","country_code":"HK","type":"education","lineage":["https://openalex.org/I1877545"]},{"id":"https://openalex.org/I143593769","display_name":"East China University of Science and Technology","ror":"https://ror.org/01vyrm377","country_code":"CN","type":"education","lineage":["https://openalex.org/I143593769"]}],"countries":["CN","HK"],"is_corresponding":false,"raw_author_name":"Fei-fei Wang","raw_affiliation_strings":["Department of Business Administration, Caritas Institute of Higher Education, 18 Chui Ling Road, Tseung Kwan O, Hong Kong, China","School of Information Science and Engineering, East China University of Science and Technology, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Business Administration, Caritas Institute of Higher Education, 18 Chui Ling Road, Tseung Kwan O, Hong Kong, China","institution_ids":["https://openalex.org/I1877545"]},{"raw_affiliation_string":"School of Information Science and Engineering, East China University of Science and Technology, Shanghai, China","institution_ids":["https://openalex.org/I143593769"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5034774472"],"corresponding_institution_ids":["https://openalex.org/I143593769"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.3429,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.79156614,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"283","last_page":"293"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9775000214576721,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9775000214576721,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9746000170707703,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9417999982833862,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7905712127685547},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.6796404719352722},{"id":"https://openalex.org/keywords/intrusion-tolerance","display_name":"Intrusion tolerance","score":0.6485900282859802},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.626451849937439},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.5584408044815063},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5462985038757324},{"id":"https://openalex.org/keywords/hierarchical-database-model","display_name":"Hierarchical database model","score":0.4407196044921875},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4152769446372986},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.29502302408218384},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.17886129021644592},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08836477994918823}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7905712127685547},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.6796404719352722},{"id":"https://openalex.org/C196903269","wikidata":"https://www.wikidata.org/wiki/Q6059063","display_name":"Intrusion tolerance","level":3,"score":0.6485900282859802},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.626451849937439},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.5584408044815063},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5462985038757324},{"id":"https://openalex.org/C144986985","wikidata":"https://www.wikidata.org/wiki/Q871236","display_name":"Hierarchical database model","level":2,"score":0.4407196044921875},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4152769446372986},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.29502302408218384},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.17886129021644592},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08836477994918823},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-642-23971-7_36","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-23971-7_36","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/2","display_name":"Zero hunger","score":0.4300000071525574}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2083736014","https://openalex.org/W2100562765","https://openalex.org/W2113958005","https://openalex.org/W2118457011","https://openalex.org/W2127922713","https://openalex.org/W2133777451","https://openalex.org/W2137459517","https://openalex.org/W2137650896","https://openalex.org/W2778703290","https://openalex.org/W6676867372"],"related_works":["https://openalex.org/W2360086328","https://openalex.org/W2105771010","https://openalex.org/W1995279289","https://openalex.org/W2352562479","https://openalex.org/W2356891656","https://openalex.org/W34565110","https://openalex.org/W2347413713","https://openalex.org/W136910588","https://openalex.org/W2331061220","https://openalex.org/W2377937144"],"abstract_inverted_index":null,"counts_by_year":[{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
