{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:23:08Z","timestamp":1743081788557,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319054001"},{"type":"electronic","value":"9783319054018"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-05401-8_14","type":"book-chapter","created":{"date-parts":[[2014,2,20]],"date-time":"2014-02-20T10:19:39Z","timestamp":1392891579000},"page":"141-155","source":"Crossref","is-referenced-by-count":0,"title":["Network Disruption and Recovery: Co-Evolution of Defender and Attacker in a Dynamic Game"],"prefix":"10.1007","author":[{"given":"Holly","family":"Arnold","sequence":"first","affiliation":[]},{"given":"David","family":"Masad","sequence":"additional","affiliation":[]},{"given":"Giuliano Andrea","family":"Pagani","sequence":"additional","affiliation":[]},{"given":"Johannes","family":"Schmidt","sequence":"additional","affiliation":[]},{"given":"Elena","family":"Stepanova","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Albert, R., Albert, I., Nakarado, G.: Structural vulnerability of the north american power grid. Physical Review E\u00a069 (2004)","DOI":"10.1103\/PhysRevE.69.025103"},{"issue":"6794","key":"14_CR2","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1038\/35019019","volume":"406","author":"R. Albert","year":"2000","unstructured":"Albert, R., Jeong, H., Barab\u00e1si, A.L.: Error and attack tolerance of complex networks. Nature\u00a0406(6794), 378\u2013382 (2000)","journal-title":"Nature"},{"key":"14_CR3","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1080\/14697680400020325","volume":"4","author":"M. Boss","year":"2004","unstructured":"Boss, M., Elsinger, H., Summer, M., Thurner, S.: The network topology of the interbank market. Quantitative Finance\u00a04, 677\u2013684 (2004)","journal-title":"Quantitative Finance"},{"key":"14_CR4","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1186\/1741-7015-5-34","volume":"5","author":"V. Colizza","year":"2007","unstructured":"Colizza, V., Barrat, A., Barth\u00e9lemy, M., Vespignani, A.: Predictability and epidemic pathways in global outbreaks of infectious diseases: the sars case study. BMC Med.\u00a05, 34 (2007)","journal-title":"BMC Med."},{"issue":"1","key":"14_CR5","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.comnet.2010.07.011","volume":"55","author":"J. Domingo-Ferrer","year":"2011","unstructured":"Domingo-Ferrer, J., Gonzlez-Nicols, R.: Decapitation of networks with and without weights and direction: The economics of iterated attack an d defense. Computer Networks\u00a055(1), 119\u2013130 (2011)","journal-title":"Computer Networks"},{"key":"14_CR6","unstructured":"Goldberg, D.E., Deb, K.: A comparative analysis of selection schemes used in genetic algorithms. Urbana\u00a051, 61801\u201362996"},{"issue":"22","key":"14_CR7","doi-asserted-by":"publisher","first-page":"7794","DOI":"10.1073\/pnas.0407994102","volume":"102","author":"R. Guimer\u00e0","year":"2005","unstructured":"Guimer\u00e0, R., Mossa, S., Turtschi, A., Amaral, L.A.N.: The worldwide air transportation network: Anomalous centrality, community structure, and cities\u2019 global roles. PNAS\u00a0102(22), 7794\u20137799 (2005)","journal-title":"PNAS"},{"issue":"5","key":"14_CR8","doi-asserted-by":"crossref","first-page":"056109","DOI":"10.1103\/PhysRevE.65.056109","volume":"65","author":"P. Holme","year":"2002","unstructured":"Holme, P., Kim, B.J., Yoon, C.N., Han, S.K.: Attack vulnerability of complex networks. Physical Review E\u00a065(5), 056109 (2002)","journal-title":"Physical Review E"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Iyer, S., Killingback, T., Sundaram, B., Wang, Z.: Attack robustness and centrality of complex networks. PloS One\u00a08(4), e59613 (2013)","DOI":"10.1371\/journal.pone.0059613"},{"issue":"6804","key":"14_CR10","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1038\/35036627","volume":"407","author":"H. Jeong","year":"2000","unstructured":"Jeong, H., Tombor, B., Albert, R., Oltvai, Z.N., Barab\u00e1si, A.L.: The large-scale organization of metabolic networks. Nature\u00a0407(6804), 651\u2013654 (2000)","journal-title":"Nature"},{"issue":"2","key":"14_CR11","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1109\/JSYST.2012.2221851","volume":"7","author":"H. Kim","year":"2013","unstructured":"Kim, H., Anderson, R.: An experimental evaluation of robustness of networks. IEEE Systems Journal\u00a07(2), 179\u2013188 (2013)","journal-title":"IEEE Systems Journal"},{"issue":"3","key":"14_CR12","first-page":"43","volume":"24","author":"V.E. Krebs","year":"2002","unstructured":"Krebs, V.E.: Mapping networks of terrorist cells. Connections\u00a024(3), 43\u201352 (2002)","journal-title":"Connections"},{"issue":"1-4","key":"14_CR13","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/S0378-4371(02)01089-0","volume":"314","author":"V. Latora","year":"2002","unstructured":"Latora, V., Marchiori, M.: Is the boston subway a small-world network? Physica A: Statistical Mechanics and its Applications\u00a0314(1-4), 109\u2013113 (2002)","journal-title":"Physica A: Statistical Mechanics and its Applications"},{"key":"14_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-3-540-77156-2_41","volume-title":"Security Protocols","author":"S. Nagaraja","year":"2007","unstructured":"Nagaraja, S.: Topology of covert conflict. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2005. LNCS, vol.\u00a04631, pp. 329\u2013332. Springer, Heidelberg (2007)"},{"key":"14_CR15","unstructured":"Nagaraja, S., Anderson, R.: The topology of covert conflict. Technical Report UCAM-CL-TR-637, University of Cambridge, Computer Laboratory (July 2005)"},{"key":"14_CR16","unstructured":"Newman, M.: Networks: an introduction. Oxford University Press (2009)"},{"issue":"11","key":"14_CR17","doi-asserted-by":"publisher","first-page":"2688","DOI":"10.1016\/j.physa.2013.01.023","volume":"392","author":"G.A. Pagani","year":"2013","unstructured":"Pagani, G.A., Aiello, M.: The power grid as a complex network: A survey. Physica A: Statistical Mechanics and its Applications\u00a0392(11), 2688\u20132700 (2013)","journal-title":"Physica A: Statistical Mechanics and its Applications"},{"issue":"4","key":"14_CR18","doi-asserted-by":"publisher","first-page":"425","DOI":"10.2307\/2786545","volume":"32","author":"J. Travers","year":"1969","unstructured":"Travers, J., Milgram, S.: An experimental study of the small world problem. Sociometry\u00a032(4), 425\u2013443 (1969)","journal-title":"Sociometry"}],"container-title":["Studies in Computational Intelligence","Complex Networks V"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-05401-8_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T12:04:02Z","timestamp":1676376242000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-05401-8_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319054001","9783319054018"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-05401-8_14","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2014]]}}}