A Review of Several Optimization Problems Related to Security in Networked System View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2017-03-15

AUTHORS

Bhaskar DasGupta , Venkatkumar Srinivasan

ABSTRACT

Security issues are becoming more and more important to activities of individuals, organizations, and the society in our modern networked computerized world. In this chapter we survey a few optimization frameworks for problems related to security of various networked system such as the internet or the power grid system.

PAGES

155-166

Book

TITLE

Operations Research, Engineering, and Cyber Security

ISBN

978-3-319-51498-7
978-3-319-51500-7

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-51500-7_8

DOI

http://dx.doi.org/10.1007/978-3-319-51500-7_8

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1084674740


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/01", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Mathematical Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0103", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Numerical and Computational Mathematics", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Department of Computer Science, University of Illinois at Chicago, 50507, Chicago, IL, USA", 
          "id": "http://www.grid.ac/institutes/grid.185648.6", 
          "name": [
            "Department of Computer Science, University of Illinois at Chicago, 50507, Chicago, IL, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "DasGupta", 
        "givenName": "Bhaskar", 
        "id": "sg:person.0763403270.10", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0763403270.10"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computer Science, University of Illinois at Chicago, 50507, Chicago, IL, USA", 
          "id": "http://www.grid.ac/institutes/grid.185648.6", 
          "name": [
            "Department of Computer Science, University of Illinois at Chicago, 50507, Chicago, IL, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Srinivasan", 
        "givenName": "Venkatkumar", 
        "id": "sg:person.011742741035.11", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011742741035.11"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2017-03-15", 
    "datePublishedReg": "2017-03-15", 
    "description": "Security issues are becoming more and more important to activities of individuals, organizations, and the society in our modern networked computerized world. In this chapter we survey a few optimization frameworks for problems related to security of various networked system such as the internet or the power grid\u00a0system.", 
    "editor": [
      {
        "familyName": "Daras", 
        "givenName": "Nicholas J.", 
        "type": "Person"
      }, 
      {
        "familyName": "Rassias", 
        "givenName": "Themistocles M.", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-51500-7_8", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-319-51498-7", 
        "978-3-319-51500-7"
      ], 
      "name": "Operations Research, Engineering, and Cyber Security", 
      "type": "Book"
    }, 
    "keywords": [
      "networked systems", 
      "optimization problem", 
      "power grid", 
      "problem", 
      "optimization", 
      "system", 
      "grid", 
      "computerized world", 
      "chapter", 
      "activities of individuals", 
      "security", 
      "Internet", 
      "issues", 
      "security issues", 
      "world", 
      "review", 
      "society", 
      "organization", 
      "individuals", 
      "activity"
    ], 
    "name": "A Review of Several Optimization Problems Related to Security in Networked System", 
    "pagination": "155-166", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1084674740"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-51500-7_8"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-51500-7_8", 
      "https://app.dimensions.ai/details/publication/pub.1084674740"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-05-20T07:42", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220519/entities/gbq_results/chapter/chapter_156.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-319-51500-7_8"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-51500-7_8'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-51500-7_8'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-51500-7_8'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-51500-7_8'


 

This table displays all metadata directly associated to this object as RDF triples.

92 TRIPLES      23 PREDICATES      44 URIs      37 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-51500-7_8 schema:about anzsrc-for:01
2 anzsrc-for:0103
3 schema:author Nf5179f6adc32477a96a5dce1ff88cce5
4 schema:datePublished 2017-03-15
5 schema:datePublishedReg 2017-03-15
6 schema:description Security issues are becoming more and more important to activities of individuals, organizations, and the society in our modern networked computerized world. In this chapter we survey a few optimization frameworks for problems related to security of various networked system such as the internet or the power grid system.
7 schema:editor N5ecbace61b544b5e868e986257ad7f2c
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf Nb14c7bd54e39422983247329470ad61c
12 schema:keywords Internet
13 activities of individuals
14 activity
15 chapter
16 computerized world
17 grid
18 individuals
19 issues
20 networked systems
21 optimization
22 optimization problem
23 organization
24 power grid
25 problem
26 review
27 security
28 security issues
29 society
30 system
31 world
32 schema:name A Review of Several Optimization Problems Related to Security in Networked System
33 schema:pagination 155-166
34 schema:productId N9ce085f2f6054c5eb4ab368cf50100da
35 Nb6d45234aab148d8848918a97dd5b4df
36 schema:publisher Nd44376380241419381de35dd57380eda
37 schema:sameAs https://app.dimensions.ai/details/publication/pub.1084674740
38 https://doi.org/10.1007/978-3-319-51500-7_8
39 schema:sdDatePublished 2022-05-20T07:42
40 schema:sdLicense https://scigraph.springernature.com/explorer/license/
41 schema:sdPublisher N74a4ab5f37a94bcbb268fa7d53f3e29a
42 schema:url https://doi.org/10.1007/978-3-319-51500-7_8
43 sgo:license sg:explorer/license/
44 sgo:sdDataset chapters
45 rdf:type schema:Chapter
46 N27d03ba6079343ecb6f50e77bb21c8bc schema:familyName Daras
47 schema:givenName Nicholas J.
48 rdf:type schema:Person
49 N5ecbace61b544b5e868e986257ad7f2c rdf:first N27d03ba6079343ecb6f50e77bb21c8bc
50 rdf:rest N76b5166dfcba49a19bdeba5373d3d2c1
51 N74a4ab5f37a94bcbb268fa7d53f3e29a schema:name Springer Nature - SN SciGraph project
52 rdf:type schema:Organization
53 N76b5166dfcba49a19bdeba5373d3d2c1 rdf:first Nf6057170b8f04e0089c0dd67f0163d98
54 rdf:rest rdf:nil
55 N9ce085f2f6054c5eb4ab368cf50100da schema:name doi
56 schema:value 10.1007/978-3-319-51500-7_8
57 rdf:type schema:PropertyValue
58 Nb14c7bd54e39422983247329470ad61c schema:isbn 978-3-319-51498-7
59 978-3-319-51500-7
60 schema:name Operations Research, Engineering, and Cyber Security
61 rdf:type schema:Book
62 Nb6d45234aab148d8848918a97dd5b4df schema:name dimensions_id
63 schema:value pub.1084674740
64 rdf:type schema:PropertyValue
65 Nd44376380241419381de35dd57380eda schema:name Springer Nature
66 rdf:type schema:Organisation
67 Ne30a0ac238d3457cb4b7e236e455b176 rdf:first sg:person.011742741035.11
68 rdf:rest rdf:nil
69 Nf5179f6adc32477a96a5dce1ff88cce5 rdf:first sg:person.0763403270.10
70 rdf:rest Ne30a0ac238d3457cb4b7e236e455b176
71 Nf6057170b8f04e0089c0dd67f0163d98 schema:familyName Rassias
72 schema:givenName Themistocles M.
73 rdf:type schema:Person
74 anzsrc-for:01 schema:inDefinedTermSet anzsrc-for:
75 schema:name Mathematical Sciences
76 rdf:type schema:DefinedTerm
77 anzsrc-for:0103 schema:inDefinedTermSet anzsrc-for:
78 schema:name Numerical and Computational Mathematics
79 rdf:type schema:DefinedTerm
80 sg:person.011742741035.11 schema:affiliation grid-institutes:grid.185648.6
81 schema:familyName Srinivasan
82 schema:givenName Venkatkumar
83 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011742741035.11
84 rdf:type schema:Person
85 sg:person.0763403270.10 schema:affiliation grid-institutes:grid.185648.6
86 schema:familyName DasGupta
87 schema:givenName Bhaskar
88 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0763403270.10
89 rdf:type schema:Person
90 grid-institutes:grid.185648.6 schema:alternateName Department of Computer Science, University of Illinois at Chicago, 50507, Chicago, IL, USA
91 schema:name Department of Computer Science, University of Illinois at Chicago, 50507, Chicago, IL, USA
92 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...