{"id":"https://openalex.org/W2751337603","doi":"https://doi.org/10.1109/iscc.2017.8024709","title":"Worst-case attacker models for two-layered networks based on the Minimum Overlay Cut","display_name":"Worst-case attacker models for two-layered networks based on the Minimum Overlay Cut","publication_year":2017,"publication_date":"2017-07-01","ids":{"openalex":"https://openalex.org/W2751337603","doi":"https://doi.org/10.1109/iscc.2017.8024709","mag":"2751337603"},"language":"en","primary_location":{"id":"doi:10.1109/iscc.2017.8024709","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc.2017.8024709","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019419997","display_name":"Martin Backhaus","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Martin Backhaus","raw_affiliation_strings":["Technische Universitat Ilmenau, Ilmenau, Th\u00c3\u00bcringen, DE","Technische Universitat Ilmenau, Ilmenau, Th\u00fcringen, DE"],"affiliations":[{"raw_affiliation_string":"Technische Universitat Ilmenau, Ilmenau, Th\u00c3\u00bcringen, DE","institution_ids":[]},{"raw_affiliation_string":"Technische Universitat Ilmenau, Ilmenau, Th\u00fcringen, DE","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004255611","display_name":"Guenter Schaefer","orcid":"https://orcid.org/0000-0002-3506-7702"},"institutions":[{"id":"https://openalex.org/I119449181","display_name":"Technische Universit\u00e4t Ilmenau","ror":"https://ror.org/01weqhp73","country_code":"DE","type":"education","lineage":["https://openalex.org/I119449181"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Guenter Schaefer","raw_affiliation_strings":["Telematics/Computer Networks Research Group, Technische Universit\u00e4t Ilmenau, Germany"],"affiliations":[{"raw_affiliation_string":"Telematics/Computer Networks Research Group, Technische Universit\u00e4t Ilmenau, Germany","institution_ids":["https://openalex.org/I119449181"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5019419997"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.2072,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.56503748,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"35","issue":null,"first_page":"1332","last_page":"1337"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/overlay","display_name":"Overlay","score":0.8246387839317322},{"id":"https://openalex.org/keywords/overlay-network","display_name":"Overlay network","score":0.7890204191207886},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7860684394836426},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.6202269792556763},{"id":"https://openalex.org/keywords/integer-programming","display_name":"Integer programming","score":0.6107271313667297},{"id":"https://openalex.org/keywords/underlay","display_name":"Underlay","score":0.606085479259491},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5814397931098938},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.5340510606765747},{"id":"https://openalex.org/keywords/linear-programming","display_name":"Linear programming","score":0.4818785786628723},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4575677216053009},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.43191853165626526},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.3238449990749359},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.13970103859901428},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13543236255645752},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1036054790019989}],"concepts":[{"id":"https://openalex.org/C136085584","wikidata":"https://www.wikidata.org/wiki/Q910289","display_name":"Overlay","level":2,"score":0.8246387839317322},{"id":"https://openalex.org/C169851745","wikidata":"https://www.wikidata.org/wiki/Q1331985","display_name":"Overlay network","level":3,"score":0.7890204191207886},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7860684394836426},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.6202269792556763},{"id":"https://openalex.org/C56086750","wikidata":"https://www.wikidata.org/wiki/Q6042592","display_name":"Integer programming","level":2,"score":0.6107271313667297},{"id":"https://openalex.org/C2777679929","wikidata":"https://www.wikidata.org/wiki/Q7883709","display_name":"Underlay","level":3,"score":0.606085479259491},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5814397931098938},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.5340510606765747},{"id":"https://openalex.org/C41045048","wikidata":"https://www.wikidata.org/wiki/Q202843","display_name":"Linear programming","level":2,"score":0.4818785786628723},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4575677216053009},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.43191853165626526},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.3238449990749359},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.13970103859901428},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13543236255645752},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1036054790019989},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C13944312","wikidata":"https://www.wikidata.org/wiki/Q7512748","display_name":"Signal-to-noise ratio (imaging)","level":2,"score":0.0},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscc.2017.8024709","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc.2017.8024709","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.49000000953674316,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W3976408","https://openalex.org/W86974874","https://openalex.org/W128097245","https://openalex.org/W1875112053","https://openalex.org/W2002001441","https://openalex.org/W2027480718","https://openalex.org/W2030384189","https://openalex.org/W2030670655","https://openalex.org/W2038976731","https://openalex.org/W2080541068","https://openalex.org/W2090513879","https://openalex.org/W2094410510","https://openalex.org/W2108668142","https://openalex.org/W2112521474","https://openalex.org/W2119120810","https://openalex.org/W2144553078","https://openalex.org/W2157283388","https://openalex.org/W2165274895","https://openalex.org/W2167659338","https://openalex.org/W2171957559","https://openalex.org/W2269131354","https://openalex.org/W2576483529","https://openalex.org/W2738360626","https://openalex.org/W2741330782","https://openalex.org/W4238452917","https://openalex.org/W4245143820","https://openalex.org/W6600155579","https://openalex.org/W6603532956","https://openalex.org/W6605169482","https://openalex.org/W6657924340"],"related_works":["https://openalex.org/W2470213802","https://openalex.org/W2921979903","https://openalex.org/W89955905","https://openalex.org/W2021541000","https://openalex.org/W1599626576","https://openalex.org/W1637847238","https://openalex.org/W2042060105","https://openalex.org/W1691715735","https://openalex.org/W2041341978","https://openalex.org/W1597460884"],"abstract_inverted_index":{"Appropriate":[0],"attacker":[1,25,74,83],"models":[2,26,84,166],"are":[3],"generally":[4],"known":[5],"to":[6,28,56,69,94,144],"be":[7,70],"a":[8,99,108,120,157],"fundamental":[9],"prerequisite":[10],"for":[11,127],"any":[12],"security":[13],"evaluation":[14,155],"of":[15,48,62,102,111,156,172],"complex":[16,57],"systems":[17],"or":[18,105],"networks.":[19],"This":[20],"paper":[21],"deals":[22],"with":[23,98,113,146],"worst-case":[24,82,165],"targeted":[27],"cause":[29],"maximum":[30],"damage":[31,97,112],"in":[32,50,59,73],"an":[33],"overlay":[34,53,65,160],"network":[35,44,96],"by":[36],"deliberately":[37],"disturbing":[38],"links":[39],"within":[40],"the":[41,60,87,128],"underlying":[42],"transport":[43],"topology.":[45],"The":[46],"flexibility":[47],"rerouting":[49],"underlay":[51],"and":[52,139,180],"networks":[54,148],"leads":[55],"dynamics":[58],"topology":[61],"such":[63],"two-layered":[64],"networks,":[66],"which":[67,91],"needs":[68],"appropriately":[71],"considered":[72],"modeling.":[75],"In":[76],"this":[77],"article,":[78],"we":[79,118],"present":[80],"two":[81,176],"based":[85],"on":[86],"Minimum":[88,129],"Overlay":[89],"Cut,":[90,130],"either":[92],"try":[93],"maximize":[95],"given":[100,109],"number":[101],"possible":[103],"outages,":[104],"aim":[106],"at":[107],"level":[110],"minimal":[114],"effort.":[115],"For":[116],"this,":[117],"developed":[119],"novel":[121],"Integer":[122],"Linear":[123],"Programming":[124],"(ILP)":[125],"formulation":[126],"that":[131,163],"uses":[132],"less":[133],"binary":[134],"variables":[135],"than":[136,175],"existing":[137],"approaches,":[138],"is":[140],"therefore":[141],"better":[142],"suited":[143],"deal":[145],"larger":[147],"as":[149,151],"well":[150],"multiple":[152],"demands.":[153],"An":[154],"typical":[158],"VPN":[159],"scenario":[161],"shows":[162],"our":[164],"give":[167],"significantly":[168],"more":[169],"realistic":[170],"assessments":[171],"potential":[173],"damages":[174],"alternatively":[177],"evaluated":[178],"random":[179],"greedy":[181],"strategies.":[182]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
