{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:04:13Z","timestamp":1742936653458,"version":"3.40.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030797270"},{"type":"electronic","value":"9783030797287"}],"license":[{"start":{"date-parts":[[2021,6,24]],"date-time":"2021-06-24T00:00:00Z","timestamp":1624492800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,24]],"date-time":"2021-06-24T00:00:00Z","timestamp":1624492800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-79728-7_9","type":"book-chapter","created":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T18:04:06Z","timestamp":1624471446000},"page":"76-86","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Efficient Approach to Enhance the Robustness of Scale-Free Networks"],"prefix":"10.1007","author":[{"given":"Syed Minhal","family":"Abbas","sequence":"first","affiliation":[]},{"given":"Nadeem","family":"Javaid","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Usman","sequence":"additional","affiliation":[]},{"given":"Shakira Musa","family":"Baig","sequence":"additional","affiliation":[]},{"given":"Arsalan","family":"Malik","sequence":"additional","affiliation":[]},{"given":"Anees Ur","family":"Rehman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,24]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Abdelgawad, A., Yelamarthi, K.: Internet of things (IoT) platform for structure health monitoring. Wireless Commun. Mob. Comput. 2017 (2017)","key":"9_CR1","DOI":"10.1155\/2017\/6560797"},{"issue":"5","key":"9_CR2","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MCOM.2017.1600240","volume":"55","author":"Y Liu","year":"2017","unstructured":"Liu, Y., Weng, X., Wan, J., Yue, X., Song, H., Vasilakos, A.V.: Exploring data validity in transportation systems for smart cities. IEEE Commun. Mag. 55(5), 26\u201333 (2017)","journal-title":"IEEE Commun. Mag."},{"issue":"1","key":"9_CR3","doi-asserted-by":"publisher","first-page":"31","DOI":"10.3141\/2234-04","volume":"2234","author":"Y Lou","year":"2011","unstructured":"Lou, Y., Zhang, L.: Defending transportation networks against random and targeted attacks. Transp. Res. Rec. 2234(1), 31\u201340 (2011)","journal-title":"Transp. Res. Rec."},{"doi-asserted-by":"crossref","unstructured":"Santagati, G.E., Melodia, T.: An implantable low-power ultrasonic platform for the internet of medical things. In: IEEE INFOCOM 2017-IEEE Conference on Computer Communications, pp. 1\u20139. IEEE (2017)","key":"9_CR4","DOI":"10.1109\/INFOCOM.2017.8057133"},{"key":"9_CR5","first-page":"1","volume":"10","author":"S Li","year":"2018","unstructured":"Li, S., Da. Li, X., Zhao, S.: 5G Internet of Things: a survey. J. Ind. Inf. Integr. 10, 1\u20139 (2018)","journal-title":"J. Ind. Inf. Integr."},{"issue":"10","key":"9_CR6","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/MCOM.2018.1800036","volume":"56","author":"N Javaid","year":"2018","unstructured":"Javaid, N., Sher, A., Nasir, H., Guizani, N.: Intelligence in IoT-based 5G networks: opportunities and challenges. IEEE Commun. Mag. 56(10), 94\u2013100 (2018)","journal-title":"IEEE Commun. Mag."},{"issue":"6684","key":"9_CR7","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"DJ Watts","year":"1998","unstructured":"Watts, D.J., Strogatz, S.H.: Collective dynamics of \u2018small-world\u2019 networks. Nature 393(6684), 440\u2013442 (1998)","journal-title":"Nature"},{"issue":"6794","key":"9_CR8","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1038\/35019019","volume":"406","author":"R Albert","year":"2000","unstructured":"Albert, R., Jeong, H., Barab\u00e1si, A.-L.: Error and attack tolerance of complex networks. Nature 406(6794), 378\u2013382 (2000)","journal-title":"Nature"},{"issue":"01","key":"9_CR9","doi-asserted-by":"publisher","first-page":"P01027","DOI":"10.1088\/1742-5468\/2011\/01\/P01027","volume":"2011","author":"HJ Herrmann","year":"2011","unstructured":"Herrmann, H.J., Schneider, C.M., Moreira, A.A., Andrade, J.S., Jr., Havlin, S.: Onion-like network topology enhances robustness against malicious attacks. J. Stat. Mech. Theory Exp. 2011(01), P01027 (2011)","journal-title":"J. Stat. Mech. Theory Exp."},{"key":"9_CR10","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-981-13-1471-1_5","volume-title":"Multi-Objective Optimization","author":"RC Gunasekara","year":"2018","unstructured":"Gunasekara, R.C., Mohan, C.K., Mehrotra, K.: Multi-objective optimization to improve robustness in networks. In: Mandal, J., Mukhopadhyay, S., Dutta, P. (eds.) Multi-Objective Optimization, pp. 115\u2013139. Springer, Singapore (2018)"},{"issue":"10","key":"9_CR11","doi-asserted-by":"publisher","first-page":"3838","DOI":"10.1073\/pnas.1009440108","volume":"108","author":"CM Schneider","year":"2011","unstructured":"Schneider, C.M., Moreira, A.A., Andrade, J.S., Havlin, S., Herrmann, H.J.: Mitigation of malicious attacks on networks. Proc. Natl. Acad. Sci. 108(10), 3838\u20133841 (2011)","journal-title":"Proc. Natl. Acad. Sci."},{"issue":"5","key":"9_CR12","doi-asserted-by":"publisher","first-page":"2944","DOI":"10.1109\/TNET.2017.2713530","volume":"25","author":"T Qiu","year":"2017","unstructured":"Qiu, T., Zhao, A., Xia, F., Si, W., Wu, D.O.: ROSE: robustness strategy for scale-free wireless sensor networks. IEEE\/ACM Trans. Netw. 25(5), 2944\u20132959 (2017)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"9_CR13","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1016\/j.physa.2017.11.037","volume":"492","author":"X Wang","year":"2018","unstructured":"Wang, X., Zhou, W., Li, R., Cao, J., Lin, X.: Improving robustness of interdependent networks by a new coupling strategy. Physica A Stat. Mech. Appl. 492, 1075\u20131080 (2018)","journal-title":"Physica A Stat. Mech. Appl."},{"issue":"2","key":"9_CR14","first-page":"539","volume":"47","author":"M Zhou","year":"2016","unstructured":"Zhou, M., Liu, J.: A two-phase multiobjective evolutionary algorithm for enhancing the robustness of scale-free networks against multiple malicious attacks. IEEE Trans. Cybern. 47(2), 539\u2013552 (2016)","journal-title":"IEEE Trans. Cybern."},{"issue":"6","key":"9_CR15","doi-asserted-by":"publisher","first-page":"1627","DOI":"10.1007\/s12083-019-00756-w","volume":"12","author":"J Ma","year":"2019","unstructured":"Ma, J., Zhichao, J.: Cascading failure model of scale-free networks for avoiding edge failure. Peer-to-Peer Netw. Appl. 12(6), 1627\u20131637 (2019)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"9_CR16","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.comcom.2020.04.007","volume":"157","author":"H Shihong","year":"2020","unstructured":"Shihong, H., Li, G.: TMSE: a topology modification strategy to enhance the robustness of scale-free wireless sensor networks. Comput. Commun. 157, 53\u201363 (2020)","journal-title":"Comput. Commun."},{"doi-asserted-by":"crossref","unstructured":"Qiu, T., Lu, Z., Li, K., Xue, G., Wu, D.O.: An adaptive robustness evolution algorithm with self-competition for scale-free internet of things. In: IEEE INFOCOM 2020-IEEE Conference on Computer Communications, pp. 2106\u20132115. IEEE (2020)","key":"9_CR17","DOI":"10.1109\/INFOCOM41043.2020.9155426"},{"key":"9_CR18","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.physa.2014.05.002","volume":"410","author":"M Zhou","year":"2014","unstructured":"Zhou, M., Liu, J.: A memetic algorithm for enhancing the robustness of scale-free networks against malicious attacks. Physica A Stat. Mech. Appl. 410, 131\u2013143 (2014)","journal-title":"Physica A Stat. Mech. Appl."},{"issue":"12","key":"9_CR19","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MCOM.2017.1700247","volume":"55","author":"T Qiu","year":"2017","unstructured":"Qiu, T., Liu, J., Si, W., Han, M., Ning, H., Atiquzzaman, M.: A data-driven robustness algorithm for the internet of things in smart cities. IEEE Commun. Mag. 55(12), 18\u201323 (2017)","journal-title":"IEEE Commun. Mag."},{"unstructured":"Qureshi, T.N., Javaid, N., Almogren, A., Abubaker, Z., Almajed, H., Mohiuddin, I.: Attack resistance based topology robustness of scale-free Internet of Things for smart cities","key":"9_CR20"},{"key":"9_CR21","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.physa.2015.09.023","volume":"443","author":"G Peng","year":"2016","unstructured":"Peng, G., Jun, W.: Optimal network topology for structural robustness based on natural connectivity. Physica A Stat. Mech. Appl. 443, 212\u2013220 (2016)","journal-title":"Physica A Stat. Mech. Appl."},{"key":"9_CR22","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.comnet.2015.12.019","volume":"101","author":"T Qiu","year":"2016","unstructured":"Qiu, T., Luo, D., Xia, F., Deonauth, N., Si, W., Tolba, A.: A greedy model with small world for improving the robustness of heterogeneous internet of things. Comput. Netw. 101, 127\u2013143 (2016)","journal-title":"Comput. Netw."},{"doi-asserted-by":"crossref","unstructured":"Strumberger, I., Beko, M., Tuba, M., Minovic, M., Bacanin, N.: Elephant herding optimization algorithm for wireless sensor network localization problem. In: Doctoral Conference on Computing, Electrical and Industrial Systems, pp. 175\u2013184. Springer (2018)","key":"9_CR23","DOI":"10.1007\/978-3-319-78574-5_17"},{"unstructured":"Qureshi, T.N., Javaid, N., Almogren, A., Khan, A.U., Almajed, H., Mohiuddin, I.: An adaptive enhanced differential evolution strategies for topology robustness in Internet of Things","key":"9_CR24"},{"key":"9_CR25","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.chaos.2016.09.008","volume":"92","author":"X-J Zhang","year":"2016","unstructured":"Zhang, X.-J., Guo-Qiang, X., Zhu, Y.-B., Xia, Y.-X.: Cascade-robustness optimization of coupling preference in interconnected networks. Chaos Solitons Fractals 92, 123\u2013129 (2016)","journal-title":"Chaos Solitons Fractals"},{"issue":"11","key":"9_CR26","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/MCOM.001.1900094","volume":"57","author":"N Chen","year":"2019","unstructured":"Chen, N., Qiu, T., Zhou, X., Li, K., Atiquzzaman, M.: An intelligent robust networking mechanism for the Internet of Things. IEEE Commun. Mag. 57(11), 91\u201395 (2019)","journal-title":"IEEE Commun. Mag."},{"key":"9_CR27","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1016\/j.physa.2018.02.173","volume":"503","author":"L Rong","year":"2018","unstructured":"Rong, L., Liu, J.: A heuristic algorithm for enhancing the robustness of scale-free networks based on edge classification. Physica A Stat. Mech. Appl. 503, 503\u2013515 (2018)","journal-title":"Physica A Stat. Mech. Appl."},{"key":"9_CR28","doi-asserted-by":"publisher","first-page":"15550","DOI":"10.1109\/ACCESS.2018.2809778","volume":"6","author":"B Hussain","year":"2018","unstructured":"Hussain, B., Hasan, Q.U., Javaid, N., Guizani, M., Almogren, A., Alamri, A.: An innovative heuristic algorithm for IoT-enabled smart homes for developing countries. IEEE Access 6, 15550\u201315575 (2018)","journal-title":"IEEE Access"},{"issue":"7","key":"9_CR29","doi-asserted-by":"publisher","first-page":"6191","DOI":"10.1109\/JIOT.2019.2963499","volume":"7","author":"N Chen","year":"2020","unstructured":"Chen, N., Qiu, T., Chaoxu, M., Han, M., Zhou, P.: Deep actor-critic learning-based robustness enhancement of Internet of Things. IEEE Internet Things J. 7(7), 6191\u20136200 (2020)","journal-title":"IEEE Internet Things J."},{"unstructured":"Xuan, Q., Shan, Y., Wang, J., Ruan, Z., Chen, G.: Adversarial attacks to scale-free networks: testing the robustness of physical criteria. arXiv preprint arXiv:2002.01249 (2020)","key":"9_CR30"},{"key":"9_CR31","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1016\/j.matcom.2019.11.013","volume":"170","author":"F Safaei","year":"2020","unstructured":"Safaei, F., Yeganloo, H., Akbar, R.: Robustness on topology reconfiguration of complex networks: an entropic approach. Math. Comput. Simul. 170, 379\u2013409 (2020)","journal-title":"Math. Comput. Simul."},{"issue":"9","key":"9_CR32","doi-asserted-by":"publisher","first-page":"2802","DOI":"10.3390\/s18092802","volume":"18","author":"Q-U Ain","year":"2018","unstructured":"Ain, Q.-U., Iqbal, S., Khan, S.A., Malik, A.W., Ahmad, I., Javaid, N.: IoT operating system based fuzzy inference system for home energy management system in smart buildings. Sensors 18(9), 2802 (2018)","journal-title":"Sensors"},{"key":"9_CR33","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.ins.2018.11.005","volume":"478","author":"S Wang","year":"2019","unstructured":"Wang, S., Liu, J.: Designing comprehensively robust networks against intentional attacks and cascading failures. Inf. Sci. 478, 125\u2013140 (2019)","journal-title":"Inf. Sci."},{"key":"9_CR34","doi-asserted-by":"publisher","first-page":"123157","DOI":"10.1016\/j.physa.2019.123157","volume":"540","author":"S Xu","year":"2020","unstructured":"Xu, S., Xia, Y., Ouyang, M.: Effect of resource allocation to the recovery of scale-free networks during cascading failures. Physica A Stat. Mech. Appl. 540, 123157 (2020)","journal-title":"Physica A Stat. Mech. Appl."},{"issue":"6","key":"9_CR35","doi-asserted-by":"publisher","first-page":"1779","DOI":"10.1016\/j.compeleceng.2013.01.009","volume":"39","author":"G Zheng","year":"2013","unstructured":"Zheng, G., Liu, Q.: Scale-free topology evolution for wireless sensor networks. Comput. Electr. Eng. 39(6), 1779\u20131788 (2013)","journal-title":"Comput. Electr. Eng."},{"key":"9_CR36","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1016\/j.ins.2017.09.021","volume":"422","author":"W Liu","year":"2018","unstructured":"Liu, W., Gong, M., Wang, S., Ma, L.: A two-level learning strategy based memetic algorithm for enhancing community robustness of networks. Inf. Sci. 422, 290\u2013304 (2018)","journal-title":"Inf. Sci."},{"issue":"3","key":"9_CR37","doi-asserted-by":"publisher","first-page":"1028","DOI":"10.1109\/TNET.2019.2907243","volume":"27","author":"T Qiu","year":"2019","unstructured":"Qiu, T., Liu, J., Si, W., Wu, D.O.: Robustness optimization scheme with multi-population co-evolution for scale-free wireless sensor networks. IEEE\/ACM Trans. Netw. 27(3), 1028\u20131042 (2019)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"4","key":"9_CR38","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1007\/BF02289527","volume":"31","author":"G Sabidussi","year":"1966","unstructured":"Sabidussi, G.: The centrality index of a graph. Psychometrika 31(4), 581\u2013603 (1966)","journal-title":"Psychometrika"},{"issue":"5","key":"9_CR39","doi-asserted-by":"publisher","first-page":"1170","DOI":"10.1086\/228631","volume":"92","author":"P Bonacich","year":"1987","unstructured":"Bonacich, P.: Power and centrality: a family of measures. Am. J. Sociol. 92(5), 1170\u20131182 (1987)","journal-title":"Am. J. Sociol."}],"container-title":["Lecture Notes in Networks and Systems","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-79728-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T18:51:22Z","timestamp":1624474282000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-79728-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,24]]},"ISBN":["9783030797270","9783030797287"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-79728-7_9","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021,6,24]]},"assertion":[{"value":"24 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IMIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"imis2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/imis\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}