{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:47:35Z","timestamp":1742996855245,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030934088"},{"type":"electronic","value":"9783030934095"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-93409-5_70","type":"book-chapter","created":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T03:18:22Z","timestamp":1641007102000},"page":"857-866","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Need for\u00a0a\u00a0Realistic Measure of\u00a0Attack Severity in\u00a0Centrality Based Node Attack Strategies"],"prefix":"10.1007","author":[{"given":"Jisha Mariyam","family":"John","sequence":"first","affiliation":[]},{"given":"Divya Sindhu","family":"Lekha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,1]]},"reference":[{"key":"70_CR1","doi-asserted-by":"publisher","unstructured":"Aharony, A., Stauffer, D.: Introduction to Percolation Theory. Taylor and Francis (1992). https:\/\/doi.org\/10.1201\/9781315274386","DOI":"10.1201\/9781315274386"},{"key":"70_CR2","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1038\/35019019","volume":"406","author":"R Albert","year":"2000","unstructured":"Albert, R., Jeong, H., Barab\u00e1si, A.L.: Error and attack tolerance of complex networks. Nature 406, 378\u2013382 (2000). https:\/\/doi.org\/10.1038\/35019019","journal-title":"Nature"},{"key":"70_CR3","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1103\/RevModPhys.74.47","volume":"74","author":"R Albert","year":"2002","unstructured":"Albert, R., Barab\u00e1si, A.L.: Statistical mechanics of complex networks. Rev. Mod. Phys. 74, 47\u201397 (2002). https:\/\/doi.org\/10.1103\/RevModPhys.74.47","journal-title":"Rev. Mod. Phys."},{"key":"70_CR4","doi-asserted-by":"publisher","unstructured":"Bellingeri, M., Cassi, D., Vincenzi, S.: Efficiency of attack strategies on complex model and real-world networks. Phys. A Stat. Mech. Appl. 414 (2014). https:\/\/doi.org\/10.1016\/j.physa.2014.06.079","DOI":"10.1016\/j.physa.2014.06.079"},{"key":"70_CR5","doi-asserted-by":"publisher","first-page":"5468","DOI":"10.1103\/PhysRevLett.85.4626","volume":"85","author":"DS Callaway","year":"2000","unstructured":"Callaway, D.S., Newman, M.E.J., Strogatz, S.H., Watts, D.J.: Network robustness and fragility: percolation on random graphs. Phys. Rev. Lett. 85, 5468\u20135471 (2000). https:\/\/doi.org\/10.1103\/PhysRevLett.85.4626","journal-title":"Phys. Rev. Lett."},{"key":"70_CR6","doi-asserted-by":"publisher","first-page":"3682","DOI":"10.1103\/PhysRevLett.86.3682","volume":"86","author":"R Cohen","year":"2001","unstructured":"Cohen, R., Erez, K., Ben-Avraham, D., Havlin, S.: Breakdown of the internet under intentional attack. Phys. Rev. Lett. 86, 3682\u20133685 (2001). https:\/\/doi.org\/10.1103\/PhysRevLett.86.3682","journal-title":"Phys. Rev. Lett."},{"key":"70_CR7","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1016\/S0378-4371(02)01545-5","volume":"320","author":"P Crucitti","year":"2003","unstructured":"Crucitti, P., Latora, V., Marchiori, M.: Efficiency of scale-free networks: error and attack tolerance. Phys. A 320, 622\u2013642 (2003). https:\/\/doi.org\/10.1016\/S0378-4371(02)01545-5","journal-title":"Phys. A"},{"key":"70_CR8","doi-asserted-by":"publisher","first-page":"045104","DOI":"10.1103\/PhysRevE.69.045104","volume":"69","author":"P Crucitti","year":"2004","unstructured":"Crucitti, P., Latora, V., Marchiori, M.: Model for cascading failures in complex networks. Phys. Rev. E Stat. Nonlinear Soft Matter Phys. 69, 045104 (2004). https:\/\/doi.org\/10.1103\/PhysRevE.69.045104","journal-title":"Phys. Rev. E Stat. Nonlinear Soft Matter Phys."},{"key":"70_CR9","doi-asserted-by":"crossref","unstructured":"Geisberger, R., Sanders, P., Schultes, D.: Better approximation of betweenness centrality. In: Proceedings of the Meeting on Algorithm Engineering and Experiments, pp. 90\u2013100 (2008). http:\/\/dl.acm.org\/citation.cfmid=2791204.2791213","DOI":"10.1137\/1.9781611972887.9"},{"key":"70_CR10","doi-asserted-by":"publisher","first-page":"2243","DOI":"10.1016\/j.physa.2009.02.007","volume":"388","author":"S He","year":"2009","unstructured":"He, S., Li, S., Ma, H.: Effect of edge removal on topological and functional robustness of complex networks. Phys. A 388, 2243\u20132253 (2009). https:\/\/doi.org\/10.1016\/j.physa.2009.02.007","journal-title":"Phys. A"},{"key":"70_CR11","doi-asserted-by":"publisher","unstructured":"Holme, P., Kim, B.J., Yoon, C.N., Han, S.K.: Attack vulnerability of complex networks. Phys. Rev. E Stat. Nonlinear Soft Matter Phys. 65(5 Pt 2), 056109 (2002). https:\/\/doi.org\/10.1103\/PhysRevE.65.056109","DOI":"10.1103\/PhysRevE.65.056109"},{"key":"70_CR12","doi-asserted-by":"publisher","unstructured":"Iyer, S., Killingback, T., Sundaram, B., Wang, Z.: Attack robustness and centrality of complex networks. PLoS ONE 8 (2013). https:\/\/doi.org\/10.1371\/journal.pone.0059613","DOI":"10.1371\/journal.pone.0059613"},{"key":"70_CR13","doi-asserted-by":"publisher","unstructured":"Lekha, D.S., Balakrishnan, K.: Central attacks in complex networks: a revisit with new fallback strategy. Phys. A Stat. Mech. Appl. 549 (2020). https:\/\/doi.org\/10.1016\/j.physa.2020.124347","DOI":"10.1016\/j.physa.2020.124347"},{"key":"70_CR14","doi-asserted-by":"publisher","unstructured":"Motter, A.E., Lai, Y.C.: Cascade-based attacks on complex networks. Phys. Rev. E. Stat. Nonlinear Soft Matter Phys. 66(6 Pt 2), 065102 (2002). https:\/\/doi.org\/10.1103\/PhysRevE.66.065102","DOI":"10.1103\/PhysRevE.66.065102"},{"key":"70_CR15","doi-asserted-by":"publisher","first-page":"098701","DOI":"10.1103\/PhysRevLett.93.098701","volume":"93","author":"AE Motter","year":"2004","unstructured":"Motter, A.E.: Cascade control and defense in complex networks. Phys. Rev. Lett. 93, 098701 (2004). https:\/\/doi.org\/10.1103\/PhysRevLett.93.098701","journal-title":"Phys. Rev. Lett."},{"key":"70_CR16","doi-asserted-by":"publisher","unstructured":"Nguyen, Q., Pham, H.D., Cassi, D., Bellingeri, M.: Conditional attack strategy for real-world complex networks. Phys. A Stat. Mech. Appl. 530 (2019). https:\/\/doi.org\/10.1016\/j.physa.2019.121561","DOI":"10.1016\/j.physa.2019.121561"},{"key":"70_CR17","doi-asserted-by":"publisher","unstructured":"Nie, T., Guo, Z., Zhao, K., Lu, Z.: New attack strategies for complex networks. Phys. A Stat. Mech. Appl. 424 (2015). https:\/\/doi.org\/10.1016\/j.physa.2015.01.004","DOI":"10.1016\/j.physa.2015.01.004"},{"key":"70_CR18","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.physa.2016.03.075","volume":"457","author":"T Nie","year":"2016","unstructured":"Nie, T., Guo, Z., Zhao, K., Lu, Z.: The dynamic correlation between degree and betweenness of complex network under attack. Phys. A 457, 129\u2013137 (2016). https:\/\/doi.org\/10.1016\/j.physa.2016.03.075","journal-title":"Phys. A"},{"key":"70_CR19","doi-asserted-by":"publisher","first-page":"4626","DOI":"10.1103\/PhysRevLett.85.4626","volume":"85","author":"C Reuven","year":"2000","unstructured":"Reuven, C., Erez, K., Ben-Avraham, D., Havlin, S.: Resilience of the internet to random breakdowns. Phys. Rev. Lett. 85, 4626\u20134628 (2000). https:\/\/doi.org\/10.1103\/PhysRevLett.85.4626","journal-title":"Phys. Rev. Lett."},{"key":"70_CR20","doi-asserted-by":"publisher","first-page":"13513","DOI":"10.1038\/s41598-018-31902-8","volume":"8","author":"S Wandelt","year":"2018","unstructured":"Wandelt, S., Sun, X., Feng, D., Zanin, M.: A comparative analysis of approaches to network-dismantling. Sci. Rep. 8, 13513 (2018). https:\/\/doi.org\/10.1038\/s41598-018-31902-8","journal-title":"Sci. Rep."}],"container-title":["Studies in Computational Intelligence","Complex Networks &amp; Their Applications X"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-93409-5_70","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,27]],"date-time":"2023-04-27T20:38:34Z","timestamp":1682627914000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-93409-5_70"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030934088","9783030934095"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-93409-5_70","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"1 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"COMPLEX NETWORKS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Complex Networks and Their Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Madrid","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwcna2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.complexnetworks.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}