{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:17Z","timestamp":1750306757249,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":66,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,3]],"date-time":"2013-11-03T00:00:00Z","timestamp":1383436800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,3]]},"DOI":"10.1145\/2508222.2508235","type":"proceedings-article","created":{"date-parts":[[2013,11,6]],"date-time":"2013-11-06T19:30:29Z","timestamp":1383766229000},"page":"73-80","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["A survey on resiliency assessment techniques for wireless sensor networks"],"prefix":"10.1145","author":[{"given":"Marcello","family":"Cinque","sequence":"first","affiliation":[{"name":"University of Naples, Napoli, Italy"}]},{"given":"Antonio","family":"Coronato","sequence":"additional","affiliation":[{"name":"Institute for High Performance Computing and Networking, Napoli, Italy"}]},{"given":"Alessandro","family":"Testa","sequence":"additional","affiliation":[{"name":"Institute for High Performance Computing and Networking, Napoli, Italy"}]},{"given":"Catello","family":"Di Martino","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana Champaign, Urbana--Champaign, Illinois, USA"}]}],"member":"320","published-online":{"date-parts":[[2013,11,3]]},"reference":[{"issue":"1","key":"e_1_3_2_1_1_1","first-page":"145","article-title":"Computing reliability and message delay for cooperative wireless distributed sensor networks subject to random failures. Reliability","volume":"54","author":"AboElFotoh H.","year":"2005","unstructured":"H. AboElFotoh , S. Iyengar , and K. Chakrabarty . Computing reliability and message delay for cooperative wireless distributed sensor networks subject to random failures. Reliability , IEEE Transactions on , 54 ( 1 ): 145 -- 155 , march 2005 . H. AboElFotoh, S. Iyengar, and K. Chakrabarty. Computing reliability and message delay for cooperative wireless distributed sensor networks subject to random failures. Reliability, IEEE Transactions on, 54(1):145--155, march 2005.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.44380"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.54853"},{"key":"e_1_3_2_1_5_1","volume-title":"Bounded model checking","author":"Biere A.","year":"2003","unstructured":"A. Biere , A. Cimatti , E. M. Clarke , O. Strichman , and Y. Zhu . Bounded model checking , volume 58 . Elsevier , 2003 . A. Biere, A. Cimatti, E. M. Clarke, O. Strichman, and Y. Zhu. Bounded model checking, volume 58. Elsevier, 2003."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxp129"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1322263.1322318"},{"key":"e_1_3_2_1_8_1","first-page":"277","volume-title":"Information Processing in Sensor Networks, 2009. IPSN 2009. International Conference on","author":"Ceriotti M.","year":"2009","unstructured":"M. Ceriotti , L. Mottola , G. Picco , A. Murphy , S. Guna , M. Corra , M. Pozzi , D. Zonta , and P. Zanon . Monitoring heritage buildings with wireless sensor networks: The torre aquila deployment . In Information Processing in Sensor Networks, 2009. IPSN 2009. International Conference on , pages 277 -- 288 , 2009 . M. Ceriotti, L. Mottola, G. Picco, A. Murphy, S. Guna, M. Corra, M. Pozzi, D. Zonta, and P. Zanon. Monitoring heritage buildings with wireless sensor networks: The torre aquila deployment. In Information Processing in Sensor Networks, 2009. IPSN 2009. International Conference on, pages 277--288, 2009."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNSR.2007.58"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2005.11010"},{"key":"e_1_3_2_1_11_1","first-page":"4","volume-title":"INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies","volume":"1","author":"Chiasserini C.-F.","unstructured":"C.-F. Chiasserini and M. Garetto . Modeling the performance of wireless sensor networks . In INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies , volume 1 , pages 4 vol. (xxxv+2866), march 2004. C.-F. Chiasserini and M. Garetto. Modeling the performance of wireless sensor networks. In INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies, volume 1, pages 4 vol. (xxxv+2866), march 2004."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869983.1869999"},{"key":"e_1_3_2_1_13_1","first-page":"8","volume-title":"International Workshop on Applied Software Reliability (WASR 2006","author":"Cinque M.","year":"2006","unstructured":"M. Cinque , D. Cotroneo , G. De Caro , and M. Pelella . Reliability requirements of wireless sensor networks for dynamic structural monitoring . In International Workshop on Applied Software Reliability (WASR 2006 ), pages 8 -- 13 , 2006 . M. Cinque, D. Cotroneo, G. De Caro, and M. Pelella. Reliability requirements of wireless sensor networks for dynamic structural monitoring. In International Workshop on Applied Software Reliability (WASR 2006), pages 8--13, 2006."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2009.5160907"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2010.5546777"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1568173.1568179"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2012.6314366"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/EESMS.2012.6348392"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.96"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.4018\/jaras.2010040103"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/UKSim.2012.87"},{"key":"e_1_3_2_1_22_1","first-page":"1","volume-title":"Mobile Adhoc and Sensor Systems, 2007. MASS 2007. IEEE Internatonal Conference on","author":"Evers L.","year":"2007","unstructured":"L. Evers and P. Havinga . Supply chain management automation using wireless sensor networks . In Mobile Adhoc and Sensor Systems, 2007. MASS 2007. IEEE Internatonal Conference on , pages 1 -- 3 , 2007 . L. Evers and P. Havinga. Supply chain management automation using wireless sensor networks. In Mobile Adhoc and Sensor Systems, 2007. MASS 2007. IEEE Internatonal Conference on, pages 1--3, 2007."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2007.126"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.4236\/wsn.2011.34014"},{"key":"e_1_3_2_1_25_1","first-page":"1","volume-title":"Pervasive Computing Technologies for Healthcare (PervasiveHealth), 2010 4th International Conference on-NO PERMISSIONS","author":"Ferna\u00cc H.","year":"2010","unstructured":"H. Ferna\u00cc ,Andez-Lo\u00cc, Apez, J. Afonso , J. Correia , and R. Simo\u00cc Ces . Hm4all: A vital signs monitoring system based in spatially distributed zigbee networks . In Pervasive Computing Technologies for Healthcare (PervasiveHealth), 2010 4th International Conference on-NO PERMISSIONS , pages 1 -- 4 , 2010 . H. Ferna\u00cc,Andez-Lo\u00cc, Apez, J. Afonso, J. Correia, and R. Simo\u00cc Ces. Hm4all: A vital signs monitoring system based in spatially distributed zigbee networks. In Pervasive Computing Technologies for Healthcare (PervasiveHealth), 2010 4th International Conference on-NO PERMISSIONS, pages 1--4, 2010."},{"key":"e_1_3_2_1_26_1","first-page":"269","volume-title":"Languages and Programming","author":"Hafer T.","year":"1987","unstructured":"T. Hafer and W. Thomas . Computation tree logic ctl and path quantifiers in the monadic theory of the binary tree. Automata , Languages and Programming , pages 269 -- 279 , 1987 . T. Hafer and W. Thomas. Computation tree logic ctl and path quantifiers in the monadic theory of the binary tree. Automata, Languages and Programming, pages 269--279, 1987."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.3390\/s6091102"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1088\/0967-3334\/29\/11\/R01"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/820264.820485"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.585157"},{"key":"e_1_3_2_1_31_1","volume-title":"IPP-HURRAY!","author":"Jur\u010d\u00edk P.","year":"2007","unstructured":"P. Jur\u010d\u00edk and A. Koub\u00e2a . The ieee 802.15.4 opnet simulation model: Reference guide v2.0. Technical report , IPP-HURRAY! , May 2007 . P. Jur\u010d\u00edk and A. Koub\u00e2a. The ieee 802.15.4 opnet simulation model: Reference guide v2.0. Technical report, IPP-HURRAY!, May 2007."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.364536"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/1802340.1802370"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1814539.1814550"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSENS.2003.1279088"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF03037383"},{"key":"e_1_3_2_1_37_1","first-page":"G8","volume-title":"38th IEEE\/IFIP Int. Conf. On Dependable Systems and Networks","author":"Laprie J. C.","year":"2008","unstructured":"J. C. Laprie . From dependability to resilience . 38th IEEE\/IFIP Int. Conf. On Dependable Systems and Networks , Anchorage, Alaska , June 2008 , Sup. Vol., pp. G8 - G9 , 2008. J. C. Laprie. From dependability to resilience. 38th IEEE\/IFIP Int. Conf. On Dependable Systems and Networks, Anchorage, Alaska, June 2008, Sup. Vol., pp. G8-G9, 2008."},{"key":"e_1_3_2_1_38_1","first-page":"169","volume-title":"Proceedings of SPIE","volume":"5440","author":"Lee J.-J.","year":"2004","unstructured":"J.-J. Lee , B. Krishnamachari , and C.-C. J. Kuo . Impact of energy depletion and reliability on wireless sensor network connectivity . In Proceedings of SPIE , volume 5440 , pages 169 -- 180 , 2004 . J.-J. Lee, B. Krishnamachari, and C.-C. J. Kuo. Impact of energy depletion and reliability on wireless sensor network connectivity. In Proceedings of SPIE, volume 5440, pages 169--180, 2004."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlap.2008.08.004"},{"key":"e_1_3_2_1_40_1","volume-title":"Tossim: A simulator for tinyos networks, page 24","author":"Levis P.","year":"2003","unstructured":"P. Levis and N. Lee . Tossim: A simulator for tinyos networks, page 24 . 2003 . P. Levis and N. Lee. Tossim: A simulator for tinyos networks, page 24. 2003."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958506"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1498915.1498916"},{"key":"e_1_3_2_1_43_1","first-page":"135","volume-title":"Conference on Dependable Computing for Critical Applications","author":"Madeira H.","year":"1995","unstructured":"H. Madeira and J. G. Silva . Xception: Software fault injection and monitoring in processor functional units. In in Processor Functional Units, DCCA-5 , Conference on Dependable Computing for Critical Applications , pages 135 -- 149 , 1995 . H. Madeira and J. G. Silva. Xception: Software fault injection and monitoring in processor functional units. In in Processor Functional Units, DCCA-5, Conference on Dependable Computing for Critical Applications, pages 135--149, 1995."},{"key":"e_1_3_2_1_44_1","unstructured":"C. Mallanda A. Suri V. Kunchakarra S. S. Iyengar R. Kannan A. Durresi and S. Sastry. Simulating Wireless Sensor Networks with OMNeT++.  C. Mallanda A. Suri V. Kunchakarra S. S. Iyengar R. Kannan A. Durresi and S. Sastry. Simulating Wireless Sensor Networks with OMNeT++."},{"key":"e_1_3_2_1_45_1","first-page":"730","volume-title":"Tepawsn - a tool environment for wireless sensor networks. Industrial Electronics and Applications","author":"Man K. L.","year":"2009","unstructured":"K. L. Man , T. Vallee , H. Leung , M. Mercaldi , J. van der Wulp , M. Donno , and M. Pastrnak . Tepawsn - a tool environment for wireless sensor networks. Industrial Electronics and Applications , 2009 . ICIEA 2009. 4th IEEE Conference on, pages 730 -- 733 , May. K. L. Man, T. Vallee, H. Leung, M. Mercaldi, J. van der Wulp, M. Donno, and M. Pastrnak. Tepawsn - a tool environment for wireless sensor networks. Industrial Electronics and Applications, 2009. ICIEA 2009. 4th IEEE Conference on, pages 730--733, May."},{"key":"e_1_3_2_1_46_1","first-page":"23","volume-title":"In IV Workshop de Comunicao sem Fio e Computao Mvel. So Paulo","author":"Mini A. F.","year":"2002","unstructured":"A. F. Mini , B. Nath , and A. A. F. Loureiro . A probabilistic approach to predict the energy consumption in wireless sensor networks . In In IV Workshop de Comunicao sem Fio e Computao Mvel. So Paulo , pages 23 -- 25 , 2002 . A. F. Mini, B. Nath, and A. A. F. Loureiro. A probabilistic approach to predict the energy consumption in wireless sensor networks. In In IV Workshop de Comunicao sem Fio e Computao Mvel. So Paulo, pages 23--25, 2002."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2008.68"},{"key":"e_1_3_2_1_48_1","unstructured":"The Network Simulator NS-2. https:\/\/linproxy.fan.workers.dev:443\/http\/www.isi.edu\/nsnam\/ns\/.  The Network Simulator NS-2. https:\/\/linproxy.fan.workers.dev:443\/http\/www.isi.edu\/nsnam\/ns\/."},{"key":"e_1_3_2_1_49_1","first-page":"354","volume-title":"Specification and analysis of real-time systems using real-time maude. Fundamental Approaches to Software Engineering","author":"\u00d6lveczky P.","year":"2004","unstructured":"P. \u00d6lveczky and J. Meseguer . Specification and analysis of real-time systems using real-time maude. Fundamental Approaches to Software Engineering , pages 354 -- 358 , 2004 . P. \u00d6lveczky and J. Meseguer. Specification and analysis of real-time systems using real-time maude. Fundamental Approaches to Software Engineering, pages 354--358, 2004."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2005.1615645"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SESENA.2012.6225728"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SENSORCOMM.2009.95"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.3390\/s100403718"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1530748.1530802"},{"key":"e_1_3_2_1_55_1","first-page":"1","volume-title":"ICTTA 2008. 3rd International Conference on","author":"Romadi R.","year":"2008","unstructured":"R. Romadi and H. Berbia . Wireless sensor network a specification method based on reactive decisional agents. In Information and Communication Technologies: From Theory to Applications, 2008 . ICTTA 2008. 3rd International Conference on , pages 1 -- 5 , april 2008 . R. Romadi and H. Berbia. Wireless sensor network a specification method based on reactive decisional agents. In Information and Communication Technologies: From Theory to Applications, 2008. ICTTA 2008. 3rd International Conference on, pages 1--5, april 2008."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.5555\/1805750.1805767"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1988051.1988058"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2006.31"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD-SAWN.2006.22"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.5555\/857196.857849"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031521"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/SITIS.2012.90"},{"key":"e_1_3_2_1_63_1","volume-title":"Handbook Of Knowledge Representation. Foundations of Artificial Intelligence","author":"Van Harmelen F.","year":"2008","unstructured":"F. Van Harmelen , V. Lifschitz , and B. Porter . Handbook Of Knowledge Representation. Foundations of Artificial Intelligence . Elsevier , 2008 . F. Van Harmelen, V. Lifschitz, and B. Porter. Handbook Of Knowledge Representation. Foundations of Artificial Intelligence. Elsevier, 2008."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.264"},{"key":"e_1_3_2_1_65_1","first-page":"15","article-title":"Channel model for body area network (ban)","author":"Yazdandoost K. Y.","year":"2009","unstructured":"K. Y. Yazdandoost , K. Sayrafian-Pour , Channel model for body area network (ban) . IEEE P802 , 15 , 2009 . K. Y. Yazdandoost, K. Sayrafian-Pour, et al. Channel model for body area network (ban). IEEE P802, 15, 2009.","journal-title":"IEEE P802"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2010.2095463"}],"event":{"name":"MSWiM '13: 16th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Barcelona Spain","acronym":"MSWiM '13"},"container-title":["Proceedings of the 11th ACM international symposium on Mobility management and wireless access"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/2508222.2508235","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/pdf\/10.1145\/2508222.2508235","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:38Z","timestamp":1750231718000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/2508222.2508235"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,3]]},"references-count":66,"alternative-id":["10.1145\/2508222.2508235","10.1145\/2508222"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/2508222.2508235","relation":{},"subject":[],"published":{"date-parts":[[2013,11,3]]},"assertion":[{"value":"2013-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}