{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T17:42:40Z","timestamp":1747158160491,"version":"3.40.5"},"reference-count":32,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T00:00:00Z","timestamp":1533081600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1016\/j.comnet.2018.05.015","type":"journal-article","created":{"date-parts":[[2018,5,18]],"date-time":"2018-05-18T12:43:42Z","timestamp":1526647422000},"page":"92-101","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":9,"special_numbering":"C","title":["Content search and routing under custodian unavailability in information-centric networks"],"prefix":"10.1016","volume":"141","author":[{"given":"Anubhab","family":"Banerjee","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8165-5735","authenticated-orcid":false,"given":"Bitan","family":"Banerjee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4559-7886","authenticated-orcid":false,"given":"Anand","family":"Seetharam","sequence":"additional","affiliation":[]},{"given":"Chintha","family":"Tellambura","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"unstructured":"Wikipedia report, (https:\/\/en.wikipedia.org\/wiki\/2016_Dyn_cyberattack).","key":"10.1016\/j.comnet.2018.05.015_bib0001"},{"key":"10.1016\/j.comnet.2018.05.015_bib0002","series-title":"ACM CoNEXT","first-page":"1","article-title":"Networking named content","author":"Jacobson","year":"2009"},{"key":"10.1016\/j.comnet.2018.05.015_bib0003","series-title":"ACM ICST","first-page":"66","article-title":"Icarus: a caching simulator for information centric networking (ICN)","author":"Saino","year":"2014"},{"issue":"7","key":"10.1016\/j.comnet.2018.05.015_bib0004","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1016\/j.peva.2005.05.003","article-title":"The LCD interconnection of LRU caches and its analysis","volume":"63","author":"Laoutaris","year":"2006","journal-title":"Elsevier Perform. Eval."},{"issue":"7","key":"10.1016\/j.comnet.2018.05.015_sbref0004","doi-asserted-by":"crossref","first-page":"758","DOI":"10.1016\/j.comcom.2013.01.007","article-title":"Cache less for more in information-centric networks","volume":"36","author":"Chai","year":"2013","journal-title":"Elsevier Comput. Commun."},{"key":"10.1016\/j.comnet.2018.05.015_bib0006","series-title":"ACM ICN","first-page":"55","article-title":"Probabilistic in-network caching for information-centric networks","author":"Psaras","year":"2012"},{"key":"10.1016\/j.comnet.2018.05.015_bib0007","series-title":"Local Computer Networks (LCN), 2015 IEEE 40th Conference on","first-page":"193","article-title":"Towards exploring the benefits of scope-flooding in information-centric networks","author":"Ioannou","year":"2015"},{"key":"10.1016\/j.comnet.2018.05.015_bib0008","series-title":"Proceedings of the Second Edition of the ICN Workshop on Information-Centric Networking","first-page":"49","article-title":"Catt: potential based routing with content caching for icn","author":"Eum","year":"2012"},{"key":"10.1016\/j.comnet.2018.05.015_bib0009","doi-asserted-by":"crossref","first-page":"4595","DOI":"10.1109\/ACCESS.2017.2676341","article-title":"Advanced perceptive forwarding in content-centric networks","volume":"5","author":"Li","year":"2017","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2018.05.015_sbref0009","series-title":"2016 International Conference on Computing, Networking and Communications (ICNC)","first-page":"1","article-title":"Characteristic time based routing in information centric networks","author":"Bandyopadhyay","year":"2016"},{"key":"10.1016\/j.comnet.2018.05.015_bib0011","series-title":"ACM ICN","first-page":"37","article-title":"Congestion-aware caching and search in information-centric networks","author":"Badov","year":"2014"},{"key":"10.1016\/j.comnet.2018.05.015_bib0012","series-title":"IEEE ICC","first-page":"2655","article-title":"A chunk caching location and searching scheme in content centric networking","author":"Li","year":"2012"},{"key":"10.1016\/j.comnet.2018.05.015_bib0013","series-title":"Computer Communications Workshops (INFOCOM WKSHPS), 2014 IEEE Conference on","first-page":"428","article-title":"Information-centric delay-tolerant mobile ad-hoc networks","author":"Lu","year":"2014"},{"issue":"16","key":"10.1016\/j.comnet.2018.05.015_bib0014","doi-asserted-by":"crossref","first-page":"3154","DOI":"10.1016\/j.comnet.2013.08.010","article-title":"Potential based routing as a secondary best-effort routing for information centric networking (ICN)","volume":"57","author":"Eum","year":"2013","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comnet.2018.05.015_bib0015","series-title":"IEEE INFOCOM","first-page":"2631","article-title":"Breadcrumbs: efficient, best-effort content location in cache networks","author":"Rosensweig","year":"2009"},{"key":"10.1016\/j.comnet.2018.05.015_bib0016","series-title":"P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2013 Eighth International Conference on","first-page":"186","article-title":"Enabling a metric space for content search in information-centric networks","author":"Truong","year":"2013"},{"key":"10.1016\/j.comnet.2018.05.015_bib0017","series-title":"Proceedings of the 3rd ACM SIGCOMM workshop on Information-centric networking","first-page":"9","article-title":"Inform: a dynamic interest forwarding mechanism for information centric networking","author":"Chiocchetti","year":"2013"},{"key":"10.1016\/j.comnet.2018.05.015_bib0018","series-title":"IFIP Networking Conference (IFIP Networking), 2015","first-page":"1","article-title":"Information resilience through user-assisted caching in disruptive content-centric networks","author":"Sourlas","year":"2015"},{"key":"10.1016\/j.comnet.2018.05.015_bib0019","series-title":"Local and Metropolitan Area Networks (LANMAN), 2016 IEEE International Symposium on","first-page":"1","article-title":"Opportunistic off-path content discovery in information-centric networks","author":"Ascigil","year":"2016"},{"key":"10.1016\/j.comnet.2018.05.015_bib0020","series-title":"Proceedings of the 3rd ACM SIGCOMM Workshop on Information-Centric Networking","first-page":"27","article-title":"Hash-routing schemes for information centric networking","author":"Saino","year":"2013"},{"key":"10.1016\/j.comnet.2018.05.015_bib0021","series-title":"Local Computer Networks (LCN), 2014 IEEE 39th Conference on","first-page":"414","article-title":"Optimal cooperative routing protocol based on prefix popularity for content centric networking","author":"Tarnoi","year":"2014"},{"key":"10.1016\/j.comnet.2018.05.015_bib0022","series-title":"Proceedings of the 2nd International Conference on Information-Centric Networking","first-page":"9","article-title":"Pro-diluvian: Understanding scoped-flooding for content discovery in information-centric networking","author":"Wang","year":"2015"},{"issue":"4","key":"10.1016\/j.comnet.2018.05.015_bib0023","doi-asserted-by":"crossref","first-page":"2847","DOI":"10.1109\/COMST.2016.2565541","article-title":"A survey of caching policies and forwarding mechanisms in information-centric networking","volume":"18","author":"Ioannou","year":"2016","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"12","key":"10.1016\/j.comnet.2018.05.015_bib0024","doi-asserted-by":"crossref","DOI":"10.1109\/MCOM.2012.6384450","article-title":"A survey of naming and routing in information-centric networks","volume":"50","author":"Bari","year":"2012","journal-title":"IEEE Commun. Mag."},{"issue":"16","key":"10.1016\/j.comnet.2018.05.015_bib0025","doi-asserted-by":"crossref","first-page":"3142","DOI":"10.1016\/j.comnet.2013.07.008","article-title":"User-assisted in-network caching in information-centric networking","volume":"57","author":"Lee","year":"2013","journal-title":"Comput. Networks"},{"unstructured":"M. Mosko, I. Solis, C.A. Wood, Content-centric networking-architectural overview and protocol description, arXiv:1706.07165 (2017).","key":"10.1016\/j.comnet.2018.05.015_bib0026"},{"key":"10.1016\/j.comnet.2018.05.015_bib0027","series-title":"Proceedings of the ACM SIGCOMM workshop on Information-centric networking","first-page":"50","article-title":"Conet: a content centric inter-networking architecture","author":"Detti","year":"2011"},{"issue":"3","key":"10.1016\/j.comnet.2018.05.015_bib0028","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/2656877.2656887","article-title":"Named data networking","volume":"44","author":"Zhang","year":"2014","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"7","key":"10.1016\/j.comnet.2018.05.015_bib0029","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1016\/j.comcom.2013.01.009","article-title":"Network of information (netinf)\u2013an information-centric networking architecture","volume":"36","author":"Dannewitz","year":"2013","journal-title":"Comput. Commun."},{"unstructured":"Code for paper, (https:\/\/tinyurl.com\/y7n8gus7).","key":"10.1016\/j.comnet.2018.05.015_bib0030"},{"key":"10.1016\/j.comnet.2018.05.015_bib0031","series-title":"New Technologies, Mobility and Security (NTMS), 2012 5th International Conference on","first-page":"1","article-title":"Globetraff: a traffic workload generator for the performance evaluation of future internet architectures","author":"Katsaros","year":"2012"},{"issue":"5439","key":"10.1016\/j.comnet.2018.05.015_bib0032","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","article-title":"Emergence of scaling in random networks","volume":"286","author":"Barab\u00e1si","year":"1999","journal-title":"Science"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128618302391?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128618302391?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,6,29]],"date-time":"2018-06-29T17:59:13Z","timestamp":1530295153000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128618302391"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":32,"alternative-id":["S1389128618302391"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2018.05.015","relation":{},"ISSN":["1389-1286"],"issn-type":[{"type":"print","value":"1389-1286"}],"subject":[],"published":{"date-parts":[[2018,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Content search and routing under custodian unavailability in information-centric networks","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2018.05.015","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2018 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}