{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:24:27Z","timestamp":1743071067952,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031534713"},{"type":"electronic","value":"9783031534720"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-53472-0_27","type":"book-chapter","created":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T07:05:19Z","timestamp":1708412719000},"page":"321-331","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Robustness of\u00a0Centrality Measures Under Incomplete Data"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8257-2031","authenticated-orcid":false,"given":"Natalia","family":"Meshcheryakova","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6031-8614","authenticated-orcid":false,"given":"Sergey","family":"Shvydun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,21]]},"reference":[{"key":"27_CR1","unstructured":"Centiserver: The most comprehensive centrality resource and web application for centrality measures calculation (2023). https:\/\/www.centiserver.org\/centrality\/list\/. Accessed 1 Jul 2023"},{"key":"27_CR2","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199206650.001.0001","volume-title":"Networks: An Introduction","author":"MEJ Newman","year":"2010","unstructured":"Newman, M.E.J.: Networks: An Introduction. Oxford University Press, Oxford (2010). https:\/\/doi.org\/10.1093\/acprof:oso\/9780199206650.001.0001"},{"key":"27_CR3","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1287\/moor.2.3.225","volume":"2","author":"RB Myerson","year":"1977","unstructured":"Myerson, R.B.: Graphs and cooperation games. Math. Oper. Res. 2, 225\u2013229 (1977). https:\/\/doi.org\/10.1287\/moor.2.3.225","journal-title":"Math. Oper. Res."},{"key":"27_CR4","doi-asserted-by":"publisher","unstructured":"Kang, C., Molinaro, C., Kraus, S., Shavitt, Y., Subrahmanian, V.S.: Diffusion centrality in social networks. In: IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, 558\u2013664, Istanbul (2012). https:\/\/doi.org\/10.1109\/ASONAM.2012.95","DOI":"10.1109\/ASONAM.2012.95"},{"key":"27_CR5","doi-asserted-by":"publisher","unstructured":"Aleskerov, F., Shvydun, S., Meshcheryakova, N.: New Centrality Measures in Networks: How to Take into Account the Parameters of the Nodes and Group Influence of Nodes to Nodes (1st ed.). Chapman and Hall\/CRC (2021). https:\/\/doi.org\/10.1201\/9781003203421","DOI":"10.1201\/9781003203421"},{"issue":"8","key":"27_CR6","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0255067","volume":"16","author":"A Ficara","year":"2021","unstructured":"Ficara, A., et al.: Criminal networks analysis in missing data scenarios through graph distances. PLoS ONE 16(8), e0255067 (2021). https:\/\/doi.org\/10.1371\/journal.pone.0255067","journal-title":"PLoS ONE"},{"key":"27_CR7","doi-asserted-by":"publisher","unstructured":"Aleskerov, F., Andrievskaya, I., Nikitina, A., Shvydun, S.: Key Borrowers Detected by the Intensities of Their Interactions. Handbook of Financial Econometrics, Mathematics, Statistics, and Machine Learning (In 4 Volumes), 355\u2013389 World Scientific: Singapore Volume 1, Chapter 9 (2020). https:\/\/doi.org\/10.1142\/9789811202391_0009","DOI":"10.1142\/9789811202391_0009"},{"key":"27_CR8","doi-asserted-by":"publisher","unstructured":"Meshcheryakova, N.: Network analysis of bilateral trade data under asymmetry. In: 2020 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), The Hague, Netherlands, pp. 379\u2013383 (2020). https:\/\/doi.org\/10.1109\/ASONAM49781.2020.9381408","DOI":"10.1109\/ASONAM49781.2020.9381408"},{"issue":"2","key":"27_CR9","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.socnet.2005.05.001","volume":"28","author":"SP Borgatti","year":"2006","unstructured":"Borgatti, S.P., Carley, K.M., Krackhardt, D.: On the robustness of centrality measures under conditions of imperfect data. Soc. Networks 28(2), 124\u2013136 (2006). https:\/\/doi.org\/10.1016\/j.socnet.2005.05.001","journal-title":"Soc. Networks"},{"key":"27_CR10","doi-asserted-by":"publisher","unstructured":"Frantz, T.L., Cataldo, M., Carley, K.M.: Robustness of centrality measures under uncertainty: Examining the role of network topology. Comput. Math. Organ. Theory 15(4), 303\u2013328 (2009). https:\/\/doi.org\/10.1007\/s10588-009-9063-5","DOI":"10.1007\/s10588-009-9063-5"},{"issue":"3","key":"27_CR11","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1109\/ICASSP.2015.7178599","volume":"64","author":"S Segarra","year":"2016","unstructured":"Segarra, S., Ribeiro, A.: Stability and continuity of centrality measures in weighted graphs. IEEE Trans. Signal Process. 64(3), 543\u2013555 (2016). https:\/\/doi.org\/10.1109\/ICASSP.2015.7178599","journal-title":"IEEE Trans. Signal Process."},{"issue":"2","key":"27_CR12","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1017\/nws.2019.12","volume":"7","author":"C Martin","year":"2019","unstructured":"Martin, C., Niemeyer, P.: Influence of measurement errors on networks: estimating the robustness of centrality measures. Network Sci. 7(2), 180\u2013195 (2019). https:\/\/doi.org\/10.1017\/nws.2019.12","journal-title":"Network Sci."},{"key":"27_CR13","doi-asserted-by":"publisher","unstructured":"Murai, S., Yoshida, Y.: Sensitivity analysis of centralities on unweighted networks. In: The World Wide Web Conference on - WWW 2019, pp. 1332\u20131342 (2019). https:\/\/doi.org\/10.1145\/3308558.3313422","DOI":"10.1145\/3308558.3313422"},{"key":"27_CR14","doi-asserted-by":"publisher","unstructured":"Meshcheryakova, N., Shvydun S.: Perturbation analysis of centrality measures. In: 2023 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE (2023). https:\/\/doi.org\/10.1145\/3625007.3627590","DOI":"10.1145\/3625007.3627590"},{"issue":"3","key":"27_CR15","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/0378-8733(88)90014-7","volume":"10","author":"JM Bolland","year":"1988","unstructured":"Bolland, J.M.: Sorting out centrality: an analysis of the performance of four centrality models in real and simulated networks. Soc. Networks 10(3), 233\u2013253 (1988). https:\/\/doi.org\/10.1016\/0378-8733(88)90014-7","journal-title":"Soc. Networks"},{"key":"27_CR16","doi-asserted-by":"publisher","unstructured":"Herland, M., Pastran, P., Zhu, X.: An empirical study of robustness of network centrality scores in various networks and conditions. In: 2013 IEEE 25th International Conference on Tools with Artificial Intelligence, pp. 221\u2013228 (2013). https:\/\/doi.org\/10.1109\/ICTAI.2013.42","DOI":"10.1109\/ICTAI.2013.42"},{"key":"27_CR17","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.physa.2015.06.031","volume":"438","author":"Q Niu","year":"2015","unstructured":"Niu, Q., Zeng, A., Fan, Y., Di, Z.: Robustness of centrality measures against network manipulation. Physica A 438, 124\u2013131 (2015). https:\/\/doi.org\/10.1016\/j.physa.2015.06.031","journal-title":"Physica A"},{"key":"27_CR18","doi-asserted-by":"publisher","unstructured":"Krause, R.W., Huisman, M., Steglich, C., Snijders, T.A.B.: Missing network data a comparison of different imputation methods. In: 2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Barcelona, Spain, pp. 159\u2013163 (2018). https:\/\/doi.org\/10.1109\/ASONAM.2018.8508716","DOI":"10.1109\/ASONAM.2018.8508716"},{"issue":"3","key":"27_CR19","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.socnet.2005.07.002","volume":"28","author":"G Kossinets","year":"2006","unstructured":"Kossinets, G.: Effects of missing data in social networks. Soc. Networks 28(3), 247\u2013268 (2006). https:\/\/doi.org\/10.1016\/j.socnet.2005.07.002","journal-title":"Soc. Networks"},{"issue":"1","key":"27_CR20","first-page":"51","volume":"8","author":"DG Saari","year":"1996","unstructured":"Saari, D.G., Merlin, V.R.: The Copeland method: I.: relationships and the dictionary. Econ. Theory 8(1), 51\u201376 (1996)","journal-title":"Econ. Theory"},{"key":"27_CR21","doi-asserted-by":"publisher","unstructured":"Shvydun, S.: Normative properties of multi-criteria choice procedures and their superpositions: I. Working paper WP7\/2015\/07 (Part 1). Moscow: HSE Publishing House (2015). https:\/\/doi.org\/10.48550\/arXiv.1611.00524","DOI":"10.48550\/arXiv.1611.00524"},{"key":"27_CR22","doi-asserted-by":"publisher","unstructured":"Ficara, A., et al.: Social network analysis of Sicilian mafia interconnections. In: Cherifi, H., Gaito, S., Mendes, J., Moro, E., Rocha, L. (eds.) Complex Networks and Their Applications VIII. COMPLEX NETWORKS 2019. Studies in Computational Intelligence, vol. 882. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-36683-4_36","DOI":"10.1007\/978-3-030-36683-4_36"},{"issue":"8","key":"27_CR23","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0236476","volume":"15","author":"L Cavallaro","year":"2020","unstructured":"Cavallaro, L., Ficara, A., De Meo, P., Fiumara, G., Catanese, S., et al.: Disrupting resilient criminal networks through data analysis: the case of Sicilian Mafia. PLoS ONE 15(8), e0236476 (2020). https:\/\/doi.org\/10.1371\/journal.pone.0236476","journal-title":"PLoS ONE"},{"key":"27_CR24","unstructured":"The World Integrated Trade Solution (2023). https:\/\/wits.worldbank.org\/. Accessed 1 Sept 2023"}],"container-title":["Studies in Computational Intelligence","Complex Networks &amp; Their Applications XII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-53472-0_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T07:08:45Z","timestamp":1708412925000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-53472-0_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031534713","9783031534720"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-53472-0_27","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"21 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"COMPLEX NETWORKS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Complex Networks and Their Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Menton","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwcna2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.complexnetworks.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}