{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T04:22:17Z","timestamp":1751516537847,"version":"3.41.0"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030780944"},{"type":"electronic","value":"9783030780951"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-78095-1_26","type":"book-chapter","created":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T23:20:19Z","timestamp":1625268019000},"page":"358-366","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Networks to Stop the Epidemic Spreading"],"prefix":"10.1007","author":[{"given":"Vincenzo","family":"Fioriti","sequence":"first","affiliation":[]},{"given":"Marta","family":"Chinnici","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Arbore","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Sigismondi","sequence":"additional","affiliation":[]},{"given":"Ivan","family":"Roselli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,3]]},"reference":[{"key":"26_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03518-5","volume-title":"Networks of Networks: The Last Frontier of Complexity","author":"G D\u2019Agostino","year":"2014","unstructured":"D\u2019Agostino, G., Scala, A.: Networks of Networks: The Last Frontier of Complexity. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-319-03518-5"},{"issue":"6","key":"26_CR2","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1177\/016555150202800601","volume":"28","author":"E Otte","year":"2002","unstructured":"Otte, E., Rousseau, R.: Social network analysis: a powerful strategy, also for the information sciences. J. Inf. Sci. 28(6), 441\u2013453 (2002)","journal-title":"J. Inf. Sci."},{"key":"26_CR3","doi-asserted-by":"publisher","first-page":"50006","DOI":"10.1209\/0295-5075\/108\/50006","volume":"108","author":"V Fioriti","year":"2014","unstructured":"Fioriti, V., Chinnici, M.: Identifying sparse and dense sub-graphs in large graphs with a fast algorithm. EPL 108, 50006 (2014)","journal-title":"EPL"},{"key":"26_CR4","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1093\/comnet\/cnt007","volume":"1","author":"M Benzi","year":"2013","unstructured":"Benzi, M., Klymko, C.: J. Complex Netw. 1, 124 (2013)","journal-title":"J. Complex Netw."},{"key":"26_CR5","doi-asserted-by":"publisher","first-page":"056103","DOI":"10.1103\/PhysRevE.71.056103","volume":"71","author":"E Estrada","year":"2005","unstructured":"Estrada, E., Rodr\u0131guez-Velazquez, J.A.: Phys. Rev. E 71, 056103 (2005)","journal-title":"Phys. Rev. E"},{"key":"26_CR6","first-page":"10","volume":"20","author":"B Miller","year":"2013","unstructured":"Miller, B., et al.: Lincoln Lab. J. 20, 10 (2013)","journal-title":"Lincoln Lab. J."},{"key":"26_CR7","unstructured":"Miller, B., Bliss, N., Wolfe, P.J.: A spectral framework for anomalous subgraph detection. ArXiv:1401.7702v1 [cs.SI] (2014). Accessed 29 Jan 2014"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Miller, B., Beard, M.S., Bliss, N.T.: Matched filtering for subgraph detection in dynamic networks. In: IEEE Statistical Signal Processing Workshop (2011)","DOI":"10.1109\/SSP.2011.5967745"},{"key":"26_CR9","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.ijid.2017.07.020","volume":"63","author":"SJ Yan","year":"2017","unstructured":"Yan, S.J., Chughtai, A.A., Macintyre, C.R.: Utility and potential of rapid epidemic intelligence from internet-based sources. Int. J. Infect. Dis. 63, 77\u201387 (2017)","journal-title":"Int. J. Infect. Dis."},{"key":"26_CR10","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1038\/nphys2160","volume":"8","author":"A Vespignani","year":"2012","unstructured":"Vespignani, A.: Modelling dynamical processes in complex socio-technical systems. Nat. Phys. 8, 32\u201339 (2012)","journal-title":"Nat. Phys."},{"issue":"14","key":"26_CR11","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1103\/PhysRevLett.86.3200","volume":"86","author":"R Pastor-Satorras","year":"2001","unstructured":"Pastor-Satorras, R., Vespignani, A.: Epidemic spreading in scale-free networks. Phys. Rev. Lett. 86(14), 320\u20133203 (2001)","journal-title":"Phys. Rev. Lett."},{"issue":"4","key":"26_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1284680.1284681","volume":"10","author":"D Chakrabarti","year":"2008","unstructured":"Chakrabarti, D., Wang, Y., Wang, C., Leskovec, J., Faloutsos, C.: Epidemic thresholds in real networks. ACM Trans. Inf. Syst. Secur. 10(4), 1\u201326 (2008)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"26_CR13","unstructured":"Wang, Y., Chakrabarti, D., Wang, C., Faloutsos, C.: Epidemic spreading in real networks: an eigenvalue viewpoint. In: SRDS Conference (2003)"},{"key":"26_CR14","volume-title":"The Structure of American Economy 1919\u20131929","author":"W Leontief","year":"1951","unstructured":"Leontief, W.: The Structure of American Economy 1919\u20131929. Oxford University Press, Oxford (1951)"},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"Arbore, A., Fioriti, V.: Topological protection from the next generation malware: a survey. Int. J. Crit. Infrastruct. Inderscience Enterprises Ltd, 9(1\/2), 52\u201373 (2013)","DOI":"10.1504\/IJCIS.2013.051603"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Fioriti, V.A., D\u2019Agostino, G., Bologna, S.: On modeling and measuring inter-dependencies among Critical Infrastructures. In: IEEE COMPENG Conference 2010, Rome (2010)","DOI":"10.1109\/COMPENG.2010.14"},{"key":"26_CR17","unstructured":"Atay, F.A., B\u0131y\u0131koglu, T., Jost, J.: Network synchronization: spectral versus statistical properties. ArXiv:0706.3069v1 [cond-mat.dis-nn] (2007). Accessed 20 June 2007"},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"D\u2019Agostino, G., et al.: Methodologies for inter-dependency assessment. In: CRIS 2010 (2010)","DOI":"10.1109\/CRIS.2010.5617578"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Chen, Z., Ji, C.: Measuring network-aware worm spreading ability. In: IEEE INFOCOM Conference 2007 (2007). http:\/\/web.eng.fiu.edu\/zchen\/paper\/metric.pdf","DOI":"10.1109\/INFCOM.2007.22"},{"key":"26_CR20","volume-title":"Chemical Oscillators","author":"Y Kuramoto","year":"1994","unstructured":"Kuramoto, Y.: Chemical Oscillators. Springer, Berlin (1994)"},{"key":"26_CR21","doi-asserted-by":"publisher","first-page":"4212 5","DOI":"10.1126\/sciadv.aau4212","volume":"4","author":"A Matamalas","year":"2018","unstructured":"Matamalas, A., et al.: Effective approach to epidemic containment using link equations in complex networks. Sci. Adv. 4, 4212 5 (2018)","journal-title":"Sci. Adv."},{"key":"26_CR22","doi-asserted-by":"crossref","unstructured":"Le, L.T., Eliassi-Rad, T., Tong, H.: MET: a fast algorithm for minimizing propagation in large graphs with small eigen-gaps. In: SDM, Computer Science (2015)","DOI":"10.1137\/1.9781611974010.78"},{"key":"26_CR23","doi-asserted-by":"crossref","unstructured":"Tong, H., Prakash, B.A., Eliassi-Rad, T., Faloutsos, M., Faloutsos, C.: Gelling, and melting, large graphs by edge manipulation. In: CIKM, pp. 245\u2013254 (2012)","DOI":"10.1145\/2396761.2396795"},{"key":"26_CR24","unstructured":"Fioriti, V., Chinnici, M., Arbore, A.: Suboptimal topological protection from advanced malware. In: Congresso Nazionale SIMAI, Politecnico di Torino (2012)"},{"key":"26_CR25","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.chaos.2016.02.011","volume":"86","author":"A Arbore","year":"2016","unstructured":"Arbore, A., Fioriti, V., Chinnici, M.: The topological defense in SIS epidemic models. Chaos Solitons Fractals 86, 16\u201322 (2016)","journal-title":"Chaos Solitons Fractals"},{"issue":"5","key":"26_CR26","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0019467","volume":"6","author":"A Signorini","year":"2011","unstructured":"Signorini, A., Segre, A.M., Polgreen, P.M.: The use of Twitter to track levels of disease activity and public concern in the U.S. during the influenza A H1N1 pandemic. PLoS ONE 6(5), (2011)","journal-title":"PLoS ONE"},{"key":"26_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/ncomms15227","volume":"8","author":"S Luo","year":"2017","unstructured":"Luo, S., Morone, F., Sarraute, C., Travizano, M., Makse, M.A.: Inferring personal economic status from social network location. Nat. Commun. 8, 1\u20137 (2017)","journal-title":"Nat. Commun."},{"key":"26_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-030-22750-0_7","volume-title":"Computational Science \u2013 ICCS 2019","author":"M Chinnici","year":"2019","unstructured":"Chinnici, M., Fioriti, V., Arbore, A.: The network topology of connecting things: defence of IoT graph in the smart city. In: Rodrigues, J.M.F., et al. (eds.) ICCS 2019. LNCS, vol. 11540, pp. 84\u201396. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-22750-0_7"},{"issue":"4","key":"26_CR29","first-page":"397","volume":"26","author":"M Chinnici","year":"2017","unstructured":"Chinnici, M., Fioriti, V.: Node seniority ranking in networks. Stud. Inf. Control 26(4), 397\u2013402 (2017)","journal-title":"Stud. Inf. Control"}],"container-title":["Lecture Notes in Computer Science","Universal Access in Human-Computer Interaction. Access to Media, Learning and Assistive Environments"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-78095-1_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:42:02Z","timestamp":1751496122000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-78095-1_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030780944","9783030780951"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-78095-1_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"3 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}