{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T10:20:17Z","timestamp":1769336417452,"version":"3.49.0"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032135124","type":"print"},{"value":"9783032135131","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-13513-1_20","type":"book-chapter","created":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T08:37:10Z","timestamp":1769330230000},"page":"243-251","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Identification of\u00a0Authoritative Nodes and\u00a0Dismantling of\u00a0Illicit Networks Using a\u00a0Novel Metric for\u00a0Measuring Strength of\u00a0a\u00a0Graph"],"prefix":"10.1007","author":[{"given":"Kartikeya","family":"Kansal","sequence":"first","affiliation":[]},{"given":"Arunabha","family":"Sen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,26]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J., Tardos, E.: Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 137\u2013146 (2003)","DOI":"10.1145\/956750.956769"},{"issue":"14","key":"20_CR2","doi-asserted-by":"publisher","first-page":"6554","DOI":"10.1073\/pnas.1806108116","volume":"116","author":"X-L Ren","year":"2019","unstructured":"Ren, X.-L., Gleinig, N., Helbing, D., Antulov-Fantulin, N.: Generalized network dismantling. Proc. Natl. Acad. Sci. 116(14), 6554\u20136559 (2019)","journal-title":"Proc. Natl. Acad. Sci."},{"key":"20_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.physrep.2016.06.007","volume":"650","author":"L Lu","year":"2016","unstructured":"Lu, L., Chen, D., Ren, X.-L., Zhang, Q.-M., Zhang, Y.-C., Zhou, T.: Vital nodes identification in complex networks. Phys. Rep. 650, 1\u201363 (2016)","journal-title":"Phys. Rep."},{"issue":"6794","key":"20_CR4","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1038\/35019019","volume":"406","author":"R Albert","year":"2000","unstructured":"Albert, R., Jeong, H., Barabasi, A.-L.: Error and attack tolerance of complex networks. Nature 406(6794), 378\u2013382 (2000)","journal-title":"Nature"},{"issue":"3","key":"20_CR5","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.disopt.2012.07.001","volume":"9","author":"S Shen","year":"2012","unstructured":"Shen, S., Smith, J.C., Goli, R.: Exact interdiction models and algorithms for disconnecting networks via node deletions. Discret. Optim. 9(3), 172\u2013188 (2012)","journal-title":"Discret. Optim."},{"issue":"4","key":"20_CR6","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1137\/0220040","volume":"20","author":"D Gusfield","year":"1991","unstructured":"Gusfield, D.: Computing the strength of a graph. SIAM J. Comput. 20(4), 639\u2013654 (1991)","journal-title":"SIAM J. Comput."},{"issue":"3","key":"20_CR7","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/0012-365X(73)90138-6","volume":"5","author":"V Chvatal","year":"1973","unstructured":"Chvatal, V.: Tough graphs and Hamiltonian circuits. Discret. Math. 5(3), 215\u2013228 (1973)","journal-title":"Discret. Math."},{"issue":"12","key":"20_CR8","doi-asserted-by":"publisher","first-page":"7821","DOI":"10.1073\/pnas.122653799","volume":"99","author":"M Girvan","year":"2002","unstructured":"Girvan, M., Newman, M.E.J.: Community structure in social and biological networks. Proc. Natl. Acad. Sci. 99(12), 7821\u20137826 (2002)","journal-title":"Proc. Natl. Acad. Sci."},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Chung, F.R.K.: Spectral Graph Theory. CBMS Regional Conference Series in Mathematics, vol. 92. American Mathematical Society, Providence (1997)","DOI":"10.1090\/cbms\/092"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Piccini, J., Robledo, F., Romero, P.: Graph Fragmentation Problem. In: ICORES, pp. 137\u2013144 (2016)","DOI":"10.5220\/0005697701370144"},{"key":"20_CR11","unstructured":"Kansal, K., Sen, A.: Identification of authoritative nodes and dismantling of illicit networks using a novel metric for measuring strength of a graph https:\/\/arxiv.org\/abs\/2507.12711 (2025)"},{"issue":"1","key":"20_CR12","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1080\/09700160408450119","volume":"28","author":"S Saxena","year":"2004","unstructured":"Saxena, S., Santhanam, K., Basu, A.: Application of social network analysis (SNA) to terrorist networks in Jammu & Kashmir. Strateg. Anal. 28(1), 84\u2013101 (2004)","journal-title":"Strateg. Anal."},{"key":"20_CR13","doi-asserted-by":"publisher","first-page":"1373","DOI":"10.1057\/jors.2008.110","volume":"60","author":"CJ Rhodes","year":"2009","unstructured":"Rhodes, C.J., Jones, P.: Inferring missing links in partially observed social networks. J. Oper. Res. Soc. 60, 1373\u20131383 (2009)","journal-title":"J. Oper. Res. Soc."},{"issue":"1","key":"20_CR14","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1080\/1057610X.2013.739079","volume":"36","author":"B Acosta","year":"2013","unstructured":"Acosta, B., Childs, S.J.: Illuminating the global suicide-attack network. Stud. Conflict Terrorism 36(1), 49\u201376 (2013)","journal-title":"Stud. Conflict Terrorism"},{"issue":"2","key":"20_CR15","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s10940-006-9007-x","volume":"22","author":"M Natarajan","year":"2006","unstructured":"Natarajan, M.: Understanding the structure of a large heroin distribution network: a quantitative analysis of qualitative data. J. Quant. Criminol. 22(2), 171\u2013192 (2006)","journal-title":"J. Quant. Criminol."},{"key":"20_CR16","unstructured":"Jimenez-Salinas Framis, A.: Illegal networks or criminal organizations: power, roles and facilitators in four cocaine trafficking structures. In: Third Annual Illicit Networks Workshop, Montreal, Canada (2011)"},{"issue":"1","key":"20_CR17","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/s13278-024-01208-x","volume":"14","author":"S De la Mora Tostado","year":"2024","unstructured":"De la Mora Tostado, S., Hernandez-Vargas, E.A., Nunez-Lopez, M.: Modeling human trafficking and the limits of dismantling strategies. Soc. Netw. Anal. Min. 14(1), 84 (2024)","journal-title":"Soc. Netw. Anal. Min."}],"container-title":["Lecture Notes in Computer Science","Social Networks Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-13513-1_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T08:37:12Z","timestamp":1769330232000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-13513-1_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032135124","9783032135131"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-13513-1_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"26 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASONAM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Social Networks Analysis and Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":", ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asonam-12025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asonam.cpsc.ucalgary.ca\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}