{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:15:44Z","timestamp":1743005744155,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031211300"},{"type":"electronic","value":"9783031211317"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-21131-7_32","type":"book-chapter","created":{"date-parts":[[2023,1,25]],"date-time":"2023-01-25T18:04:15Z","timestamp":1674669855000},"page":"407-418","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Investments in Robustness of Complex Systems: Algorithm Design"],"prefix":"10.1007","author":[{"given":"Van-Sy","family":"Mai","sequence":"first","affiliation":[]},{"given":"Richard J.","family":"La","sequence":"additional","affiliation":[]},{"given":"Abdella","family":"Battou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,26]]},"reference":[{"issue":"1","key":"32_CR1","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1109\/TCNS.2016.2600484","volume":"5","author":"AR Hota","year":"2018","unstructured":"Hota, A.R., Sundaram, S.: Interdependent security games on networks under behavioral probability weighting. IEEE Control Netw. Syst. 5(1), 262\u2013273 (2018)","journal-title":"IEEE Control Netw. Syst."},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Khalili, M.M., Zhang, X., Liu, M.: Incentivizing effort in interdependent security games using resource pooling. In: Proceedings of NetEcon (2019)","DOI":"10.1145\/3338506.3340272"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"La, R.J.: Interdependent security with strategic agents and global cascades. IEEE\/ACM Trans. Netw. 24(3), 1378\u20131391 (2016)","DOI":"10.1109\/TNET.2015.2408598"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Lelarge, M., Bolot, J.: A local mean field analysis of security investments in networks. In: Processing of International Workshop on Economics of Networked Systems, pp. 25\u201330 (2008)","DOI":"10.1145\/1403027.1403034"},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"Cohen, R., Havlin, S., Ben-Avraham, D.: Efficient immunization strategies for computer networks and populations. Phys. Rev. Lett. 91(247901), (Dec 2003)","DOI":"10.1103\/PhysRevLett.91.247901"},{"key":"32_CR6","doi-asserted-by":"crossref","unstructured":"Borgs, C., Chayes, J., Ganesh, A., Saberi, A.: How to distributed antidote to control epidemics. Random Struct. Algorithms 37(2), 204\u2013222 (Sept 2010)","DOI":"10.1002\/rsa.20315"},{"issue":"3","key":"32_CR7","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1109\/LCSYS.2018.2844118","volume":"2","author":"VS Mai","year":"2018","unstructured":"Mai, V.S., Battou, A., Mills, K.: Distributed algorithm for suppressing epidemic spread in networks. IEEE Contr. Syst. Lett. 2(3), 555\u2013560 (2018)","journal-title":"IEEE Contr. Syst. Lett."},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"Ottaviano, S., De Pellegrini, F., Bonaccorsi, S., Van Mieghem, P.: Optimal curing policy for epidemic spreading over a community network with heterogeneous population. J. Complex Networks 6(6), (Oct 2018)","DOI":"10.1093\/comnet\/cnx060"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Nowzari, C., Preciado, V.M., Pappas, G.J.: Optimal resource allocation for control of networked epidemic models. IEEE Control Netw. Syst. 4(2):159\u2013169 (June 2017)","DOI":"10.1109\/TCNS.2015.2482221"},{"issue":"1","key":"32_CR10","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1109\/TCNS.2014.2310911","volume":"1","author":"VM Preciado","year":"2014","unstructured":"Preciado, V.M., Zargham, M., Enyioha, C., Jadbabaie, A., Pappas, G.J.: Optimal resource allocation for network protection against spreading processes. IEEE Control Netw. Syst. 1(1), 99\u2013108 (2014)","journal-title":"IEEE Control Netw. Syst."},{"issue":"2\/3","key":"32_CR11","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1023\/A:1024119208153","volume":"26","author":"H Kunreuther","year":"2003","unstructured":"Kunreuther, H., Heal, G.: Interdependent security. J. Risk Uncertainty 26(2\/3), 231\u2013249 (2003)","journal-title":"J. Risk Uncertainty"},{"key":"32_CR12","doi-asserted-by":"crossref","unstructured":"Mai, V.-S., La, R.J., Battou, A.: Optimal cybersecurity investments for SIS model. In: Proceeding of IEEE Globecom (2020)","DOI":"10.1109\/GLOBECOM42002.2020.9348109"},{"issue":"6","key":"32_CR13","doi-asserted-by":"publisher","first-page":"2453","DOI":"10.1109\/TNET.2021.3091856","volume":"29","author":"V-S Mai","year":"2021","unstructured":"Mai, V.-S., La, R.J., Battou, A.: Optimal cybersecurity investments in large networks using SIS model: algorithm design. IEEE\/ACM Trans. Netw. 29(6), 2453\u20132466 (2021)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"32_CR14","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.automatica.2016.07.037","volume":"74","author":"A Khanafer","year":"2016","unstructured":"Khanafer, A., Ba\u015far, T., Gharesifard, B.: Stability of epidemic models over directed graphs: a positive systems approach. Automatica 74, 126\u2013134 (2016)","journal-title":"Automatica"},{"key":"32_CR15","unstructured":"MOSEK ApS.: The MOSEK optim. toolbox for MATLAB manual. Version 9.0. (2019). http:\/\/docs.mosek.com\/9.0\/toolbox\/index.html"}],"container-title":["Studies in Computational Intelligence","Complex Networks and Their Applications XI"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-21131-7_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,25]],"date-time":"2023-01-25T18:08:23Z","timestamp":1674670103000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-21131-7_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031211300","9783031211317"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-21131-7_32","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"26 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"COMPLEX NETWORKS 2016","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Complex Networks and Their Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Palermo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwcna2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.complexnetworks.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}