{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:49:41Z","timestamp":1743119381102,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030529871"},{"type":"electronic","value":"9783030529888"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-52988-8_3","type":"book-chapter","created":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T15:37:10Z","timestamp":1596123430000},"page":"20-33","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Combined Routing Path and Node Importance Network Invulnerability Evaluating Method for Ad Hoc Network"],"prefix":"10.1007","author":[{"given":"Weiling","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Bo","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhongjiang","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Mao","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,31]]},"reference":[{"issue":"3","key":"3_CR1","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1504\/IJART.2019.100420","volume":"11","author":"K Li","year":"2019","unstructured":"Li, K., Wang, H.: Research on invulnerability of scale-free network with a unified method. Int. J. Arts Technol. 11(3), 266\u2013284 (2019)","journal-title":"Int. J. Arts Technol."},{"key":"3_CR2","unstructured":"He, S., Jin, C., Wei, H., Liu, Q.: A measure method for network invulnerability based on improved albert algorithm. In: International Conference on Instrumentation (2011)"},{"issue":"1","key":"3_CR3","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1038\/35019019","volume":"340","author":"R Albert","year":"2000","unstructured":"Albert, R., Jeong, H., Barabasi, A.L.: Error and attack tolerance of complex networks. Nature 340(1), 378\u2013382 (2000)","journal-title":"Nature"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Fu, X., Yao, H., Yang, Y.: Exploring the invulnerability of wireless sensor networks against cascading failures. Inf. Sci. (2019)","DOI":"10.1016\/j.ins.2019.04.004"},{"key":"3_CR5","unstructured":"Wen, C., Zhang, X.: The invulnerability of robust communication network. In: IEEE International Conference on Communication Software & Networks (2016)"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Luo, J.-J., Feng, Y.-H., Zuo, C.: Analysis on the invulnerability of network based on scale-free network, pp. 1519\u20131522 (2018)","DOI":"10.1109\/IAEAC.2018.8577931"},{"issue":"4","key":"3_CR7","first-page":"113","volume":"30","author":"YP Rao","year":"2009","unstructured":"Rao, Y.P., Lin, J.Y., Hou, D.T.: Evaluation method for network invulnerability based on shortest route number. J. Commun. 30(4), 113\u2013117 (2009)","journal-title":"J. Commun."},{"key":"3_CR8","first-page":"1322","volume":"301\u2013303","author":"F Yun","year":"2011","unstructured":"Yun, F., Hong, L.Z., Hai, T.Y.: Research of new certain metrics of network invulnerability. Adv. Mater. Res. 301\u2013303, 1322\u20131326 (2011)","journal-title":"Adv. Mater. Res."},{"issue":"7","key":"3_CR9","first-page":"1450","volume":"40","author":"E Li","year":"2019","unstructured":"Li, E., Gong, J., Huang, J.: Analysis about functional invulnerability of convergent network based on function chain. Binggong Xuebao\/Acta Armamentarii 40(7), 1450\u20131459 (2019)","journal-title":"Binggong Xuebao\/Acta Armamentarii"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Zhao, D.J., Yang, H.T., Jian, J., Yu, H.: Modeling and simulation of the invulnerability of space information network. In: International Conference on Internet Technology & Applications (2010)","DOI":"10.1109\/ITAPP.2010.5566597"},{"issue":"11","key":"3_CR11","first-page":"167","volume":"9","author":"K Peng","year":"2015","unstructured":"Peng, K., Huang, B.: The invulnerability studies on data center network. Int. J. Secur. Appl. 9(11), 167\u2013186 (2015)","journal-title":"Int. J. Secur. Appl."},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Tian, X.W., Liu, S.Y., Zhang, Z.H., Dong, H.J.: A topology optimal algorithm for improving the invulnerability of scale-free networks. In: International Conference on Information System & Artificial Intelligence (2017)","DOI":"10.1109\/ISAI.2016.0029"},{"issue":"1","key":"3_CR13","first-page":"168","volume":"34","author":"X-C Bao","year":"2012","unstructured":"Bao, X.-C., Dai, F.-S., Han, W.-Z.: Evaluation method of network invulnerability based on disjoint paths in topology. Xi Tong Gong Cheng Yu Dian Zi Ji Shu\/Syst. Eng. Electron. 34(1), 168\u2013174 (2012)","journal-title":"Xi Tong Gong Cheng Yu Dian Zi Ji Shu\/Syst. Eng. Electron."},{"issue":"3","key":"3_CR14","first-page":"591","volume":"7","author":"H-H Chen","year":"2012","unstructured":"Chen, H.-H., Lin, A.-M.: Complex network characteristics and invulnerability simulating analysis of supply chain. J. Netw. 7(3), 591\u2013597 (2012)","journal-title":"J. Netw."},{"issue":"1","key":"3_CR15","first-page":"77","volume":"11","author":"J Wu","year":"2014","unstructured":"Wu, J., Tan, S.-Y., Tan, Y.-J., Deng, H.-Z.: Analysis of invulnerability in complex networks based on natural connectivity. Complex Syst. Complex. Sci. 11(1), 77\u201386 (2014)","journal-title":"Complex Syst. Complex. Sci."},{"issue":"4","key":"3_CR16","doi-asserted-by":"publisher","first-page":"1242","DOI":"10.12928\/telkomnika.v13i4.3104","volume":"13","author":"L Jiang","year":"2015","unstructured":"Jiang, L., Zhang, F., Yang, R., Xu, K.: Influence of sensor nodes on the invulnerability of tree network. Telkomnika (Telecommun. Comput. Electron. Control) 13(4), 1242\u20131250 (2015)","journal-title":"Telkomnika (Telecommun. Comput. Electron. Control)"},{"key":"3_CR17","unstructured":"Fu, X., Li, W., Fortino, G.: Empowering the invulnerability of wireless sensor networks through super wires and super nodes, pp. 561\u2013568 (2013)"},{"key":"3_CR18","unstructured":"Feng, H., Li, C., Xu, Y.: Invulnerability analysis of vehicular ad hoc networks based on temporal networks. In: IEEE International Conference on Computer & Communications (2017)"},{"issue":"7","key":"3_CR19","first-page":"1789","volume":"36","author":"H-F Feng","year":"2016","unstructured":"Feng, H.-F., Li, C.-H.: Invulnerability analysis of vehicle self-organizing network based on complex network. Comput. Appl. 36(7), 1789\u20131792 (2016)","journal-title":"Comput. Appl."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Wireless Internet"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-52988-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,31]],"date-time":"2020-07-31T01:04:59Z","timestamp":1596157499000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-52988-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030529871","9783030529888"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-52988-8_3","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"31 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WiCON","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Wireless Internet Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"TaiChung","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wicon2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wicon2019.eai-conferences.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}