{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2015:GTYXCPJRGJSMRYBQPN3FPQKUT3","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"28e5b323a423ade7ddebc64f0ba8c3572219a11774b4accc8a2c8440cc35a492","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-12-09T05:41:34Z","title_canon_sha256":"30864fca4c67fe2b7f42ce6f6ed691f34ff9cbb7e2d6a9790ef88e01cb17a8ac"},"schema_version":"1.0","source":{"id":"1512.02756","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1512.02756","created_at":"2026-05-18T01:24:43Z"},{"alias_kind":"arxiv_version","alias_value":"1512.02756v1","created_at":"2026-05-18T01:24:43Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1512.02756","created_at":"2026-05-18T01:24:43Z"},{"alias_kind":"pith_short_12","alias_value":"GTYXCPJRGJSM","created_at":"2026-05-18T12:29:22Z"},{"alias_kind":"pith_short_16","alias_value":"GTYXCPJRGJSMRYBQ","created_at":"2026-05-18T12:29:22Z"},{"alias_kind":"pith_short_8","alias_value":"GTYXCPJR","created_at":"2026-05-18T12:29:22Z"}],"graph_snapshots":[{"event_id":"sha256:fe54b6d49092d195e61bdc2c0d7c5e9d35fc6b8554ed8149bc8a859a769d2372","target":"graph","created_at":"2026-05-18T01:24:43Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"As a novel technology, cloud computing attracts more and more people including technology enthusiasts and malicious users. Different from the classical network architecture, cloud environment has many its own features which make the traditional defense mechanism invalid. To make the network more robust against a malicious attack, we introduce a new method to mitigate this risk efficiently and systematically. In this paper, we first propose a coupled networks model which adequately considers the interactions between physical layer and virtual layer in a practical cloud computing environment. Ba","authors_text":"Jing Yuan, Zibin Su","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-12-09T05:41:34Z","title":"Robustness enhancement of cloud computing network based on coupled networks model"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1512.02756","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:9efc98aecd365d632bad81bbe941d41ac6d1fbf05ccacdaa20388a9be2413f68","target":"record","created_at":"2026-05-18T01:24:43Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"28e5b323a423ade7ddebc64f0ba8c3572219a11774b4accc8a2c8440cc35a492","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-12-09T05:41:34Z","title_canon_sha256":"30864fca4c67fe2b7f42ce6f6ed691f34ff9cbb7e2d6a9790ef88e01cb17a8ac"},"schema_version":"1.0","source":{"id":"1512.02756","kind":"arxiv","version":1}},"canonical_sha256":"34f1713d313264c8e0307b7657c1549ed1c5fb350aae0791f4cd55b2a9d70357","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"34f1713d313264c8e0307b7657c1549ed1c5fb350aae0791f4cd55b2a9d70357","first_computed_at":"2026-05-18T01:24:43.193534Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T01:24:43.193534Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"LaIRsPxrGhPvNN/kY7gpVNv6FfPjlSP1gwB6eyXOdIFsKsXN5fXesti4JmvBr1xiJH1PzkAecPZbBSzd2HrSCQ==","signature_status":"signed_v1","signed_at":"2026-05-18T01:24:43.193967Z","signed_message":"canonical_sha256_bytes"},"source_id":"1512.02756","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:9efc98aecd365d632bad81bbe941d41ac6d1fbf05ccacdaa20388a9be2413f68","sha256:fe54b6d49092d195e61bdc2c0d7c5e9d35fc6b8554ed8149bc8a859a769d2372"],"state_sha256":"3b9b9f99cb7ba733edd1b9b1026780bc1c193105b2aa593583e23c6ca090baed"}