{"id":"https://openalex.org/W2117873906","doi":"https://doi.org/10.1145/2491185.2491211","title":"Global network modelling based on mininet approach.","display_name":"Global network modelling based on mininet approach.","publication_year":2013,"publication_date":"2013-08-16","ids":{"openalex":"https://openalex.org/W2117873906","doi":"https://doi.org/10.1145/2491185.2491211","mag":"2117873906"},"language":"en","primary_location":{"id":"doi:10.1145/2491185.2491211","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2491185.2491211","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/2491185.2491211","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/2491185.2491211","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070765218","display_name":"Vitaly Antonenko","orcid":"https://orcid.org/0000-0002-5245-4763"},"institutions":[{"id":"https://openalex.org/I4210150146","display_name":"Moscow State University","ror":"https://ror.org/050a13t43","country_code":"TJ","type":"education","lineage":["https://openalex.org/I4210150146"]},{"id":"https://openalex.org/I19880235","display_name":"Lomonosov Moscow State University","ror":"https://ror.org/010pmpe69","country_code":"RU","type":"education","lineage":["https://openalex.org/I19880235"]}],"countries":["RU","TJ"],"is_corresponding":true,"raw_author_name":"Vitaly Antonenko","raw_affiliation_strings":["Moscow State University, Moscow, Russian Fed"],"affiliations":[{"raw_affiliation_string":"Moscow State University, Moscow, Russian Fed","institution_ids":["https://openalex.org/I4210150146","https://openalex.org/I19880235"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089087382","display_name":"R. L. Smelyanskiy","orcid":"https://orcid.org/0000-0003-2311-4513"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ruslan Smelyanskiy","raw_affiliation_strings":["Moscow State University, Moscow , Russian Fed"],"affiliations":[{"raw_affiliation_string":"Moscow State University, Moscow , Russian Fed","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5070765218"],"corresponding_institution_ids":["https://openalex.org/I19880235","https://openalex.org/I4210150146"],"apc_list":null,"apc_paid":null,"fwci":4.1469,"has_fulltext":true,"cited_by_count":41,"citation_normalized_percentile":{"value":0.9460819,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"46","issue":null,"first_page":"145","last_page":"146"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.79561448097229},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.6785221099853516},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.532398521900177},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.43986836075782776},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3529077470302582},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2052381932735443},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14277097582817078}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.79561448097229},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.6785221099853516},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.532398521900177},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.43986836075782776},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3529077470302582},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2052381932735443},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14277097582817078}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2491185.2491211","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2491185.2491211","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/2491185.2491211","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.413.4296","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.413.4296","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://conferences.sigcomm.org/sigcomm/2013/papers/hotsdn/p145.pdf","raw_type":"text"}],"best_oa_location":{"id":"doi:10.1145/2491185.2491211","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2491185.2491211","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/2491185.2491211","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.4099999964237213,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321079","display_name":"Russian Foundation for Basic Research","ror":"https://ror.org/02mh1ke95"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2117873906.pdf","grobid_xml":"https://content.openalex.org/works/W2117873906.grobid-xml"},"referenced_works_count":4,"referenced_works":["https://openalex.org/W1980065740","https://openalex.org/W2136451165","https://openalex.org/W2147118406","https://openalex.org/W2166576749"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W3152891574","https://openalex.org/W2249809453","https://openalex.org/W4284893819"],"abstract_inverted_index":{"The":[0],"problem":[1,22],"of":[2,11,25],"the":[3,29],"Global":[4,30],"network":[5],"operation":[6],"analysis":[7],"has":[8],"a":[9],"variety":[10],"applications.":[12],"In":[13],"this":[14,21],"paper":[15],"we":[16],"show":[17],"an":[18],"approach":[19],"to":[20],"on":[23],"example":[24],"malware":[26],"propagation":[27],"in":[28],"networks":[31],"(Wide":[32],"Area":[33],"Network).":[34]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":10},{"year":2017,"cited_by_count":10},{"year":2016,"cited_by_count":7},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":3}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
