{"id":"https://openalex.org/W4233546894","doi":"https://doi.org/10.1109/ipsn.2005.1440924","title":"Lifetime-aware intrusion detection under safeguarding constraints","display_name":"Lifetime-aware intrusion detection under safeguarding constraints","publication_year":2005,"publication_date":"2005-06-15","ids":{"openalex":"https://openalex.org/W4233546894","doi":"https://doi.org/10.1109/ipsn.2005.1440924"},"language":"en","primary_location":{"id":"doi:10.1109/ipsn.2005.1440924","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ipsn.2005.1440924","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026108898","display_name":"A. Iranli","orcid":null},"institutions":[{"id":"https://openalex.org/I1174212","display_name":"University of Southern California","ror":"https://ror.org/03taz7m60","country_code":"US","type":"education","lineage":["https://openalex.org/I1174212"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"A. Iranli","raw_affiliation_strings":["Department of Electrical Engineering, University of Southern California, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, University of Southern California, USA","institution_ids":["https://openalex.org/I1174212"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013498415","display_name":"H. Fatemi","orcid":null},"institutions":[{"id":"https://openalex.org/I1174212","display_name":"University of Southern California","ror":"https://ror.org/03taz7m60","country_code":"US","type":"education","lineage":["https://openalex.org/I1174212"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"H. Fatemi","raw_affiliation_strings":["Department of Electrical Engineering, University of Southern California, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, University of Southern California, USA","institution_ids":["https://openalex.org/I1174212"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054373716","display_name":"M. Pedram","orcid":null},"institutions":[{"id":"https://openalex.org/I1174212","display_name":"University of Southern California","ror":"https://ror.org/03taz7m60","country_code":"US","type":"education","lineage":["https://openalex.org/I1174212"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"M. Pedram","raw_affiliation_strings":["Department of Electrical Engineering, University of Southern California, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, University of Southern California, USA","institution_ids":["https://openalex.org/I1174212"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5026108898"],"corresponding_institution_ids":["https://openalex.org/I1174212"],"apc_list":null,"apc_paid":null,"fwci":3.5615,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.92723664,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"17","issue":null,"first_page":"189","last_page":"194"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interdiction","display_name":"Interdiction","score":0.8463022708892822},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7438873052597046},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6349108219146729},{"id":"https://openalex.org/keywords/safeguarding","display_name":"Safeguarding","score":0.5824952125549316},{"id":"https://openalex.org/keywords/scheduling","display_name":"Scheduling (production processes)","score":0.5624473690986633},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5080468654632568},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.398134708404541},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.3469524085521698},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2607235312461853},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.16005462408065796},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08672007918357849}],"concepts":[{"id":"https://openalex.org/C124119293","wikidata":"https://www.wikidata.org/wiki/Q6046081","display_name":"Interdiction","level":2,"score":0.8463022708892822},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7438873052597046},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6349108219146729},{"id":"https://openalex.org/C2776743756","wikidata":"https://www.wikidata.org/wiki/Q5097921","display_name":"Safeguarding","level":2,"score":0.5824952125549316},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.5624473690986633},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5080468654632568},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.398134708404541},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.3469524085521698},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2607235312461853},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.16005462408065796},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08672007918357849},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C159110408","wikidata":"https://www.wikidata.org/wiki/Q121176","display_name":"Nursing","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ipsn.2005.1440924","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ipsn.2005.1440924","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005.","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.77.2612","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.77.2612","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://atrak.usc.edu/~massoud/Papers/lids-ipsn05.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.46000000834465027,"display_name":"Climate action","id":"https://metadata.un.org/sdg/13"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W2059100426","https://openalex.org/W2074699156","https://openalex.org/W2133494553","https://openalex.org/W4230937734"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W2011893084"],"abstract_inverted_index":{"This":[0],"paper":[1],"addresses":[2],"the":[3,7,17,20,41,48,53,64,71,79,82],"problem":[4,23,39,73],"of":[5,10,19,30,37,44,81],"maximizing":[6],"service":[8],"lifetime":[9],"a":[11,35],"distributed":[12],"battery-powered":[13],"sensor":[14],"network":[15,21],"in":[16,61],"context":[18],"interdiction":[22],"under":[24],"user-specified":[25],"initial":[26],"energy":[27],"and":[28,69],"probability":[29,42],"detection":[31],"constraints.":[32],"We":[33],"consider":[34],"version":[36],"this":[38],"where":[40],"distribution":[43],"selecting":[45],"paths":[46],"by":[47],"intruder":[49],"is":[50,59,74],"known":[51],"to":[52],"interdictor.":[54],"A":[55],"two-step":[56,84],"solution":[57],"technique":[58],"proposed":[60,83],"whereby":[62],"first":[63],"safeguarding":[65],"constraints":[66],"are":[67],"satisfied":[68],"then":[70],"scheduling":[72],"solved.":[75],"Experimental":[76],"results":[77],"demonstrate":[78],"effectiveness":[80],"approach.":[85]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
