{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T18:40:04Z","timestamp":1747161604893,"version":"3.40.5"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319126906"},{"type":"electronic","value":"9783319126913"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12691-3_29","type":"book-chapter","created":{"date-parts":[[2014,11,14]],"date-time":"2014-11-14T21:11:32Z","timestamp":1415999492000},"page":"379-394","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Cascading Critical Nodes Detection with Load Redistribution in Complex Systems"],"prefix":"10.1007","author":[{"given":"Subhankar","family":"Mishra","sequence":"first","affiliation":[]},{"given":"Xiang","family":"Li","sequence":"additional","affiliation":[]},{"given":"My T.","family":"Thai","sequence":"additional","affiliation":[]},{"given":"Jungtaek","family":"Seo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,13]]},"reference":[{"issue":"9","key":"29_CR1","doi-asserted-by":"publisher","first-page":"5766","DOI":"10.1073\/pnas.082090499","volume":"99","author":"DJ Watts","year":"2002","unstructured":"Watts, D.J.: A simple model of global cascades on random networks. Proc. Nat. Acad. Sci. (PNAS) 99(9), 5766\u20135771 (2002)","journal-title":"Proc. Nat. Acad. Sci. (PNAS)"},{"issue":"12","key":"29_CR2","doi-asserted-by":"publisher","first-page":"E680","DOI":"10.1073\/pnas.1110586109","volume":"109","author":"CD Brummitt","year":"2012","unstructured":"Brummitt, C.D., D\u2019Souza, R.M., Leicht, E.A.: Suppressing casades of load in interdependent networks. Proce. Nat. Acad. Sci. (PNAS) 109(12), E680\u2013E689 (2012)","journal-title":"Proce. Nat. Acad. Sci. (PNAS)"},{"issue":"4","key":"29_CR3","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1145\/52325.52356","volume":"18","author":"V Jacobson","year":"1988","unstructured":"Jacobson, V.: Congestion avoidance and control. SIGCOMM Comput. Commun. Rev. 18(4), 314\u2013329 (1988)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"29_CR4","volume-title":"Fatal Defect Chasing Killer Computer Bugs","author":"I Petersen","year":"1995","unstructured":"Petersen, I.: Fatal Defect Chasing Killer Computer Bugs. Vintage, New York (1995)"},{"key":"29_CR5","doi-asserted-by":"publisher","first-page":"292","DOI":"10.3389\/fgene.2012.00292","volume":"3","author":"L Sun","year":"2012","unstructured":"Sun, L., Wang, S., Li, K., Meng, D.: Analysis of cascading failure in gene networks. Front. Genet. 3, 292 (2012)","journal-title":"Front. Genet."},{"issue":"6","key":"29_CR6","doi-asserted-by":"publisher","first-page":"065102","DOI":"10.1103\/PhysRevE.66.065102","volume":"66","author":"AE Motter","year":"2002","unstructured":"Motter, A.E., Lai, Y.C.: Cascade-based attacks on complex networks. Phys. Rev. E 66(6), 065102 (2002)","journal-title":"Phys. Rev. E"},{"issue":"6794","key":"29_CR7","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1038\/35019019","volume":"406","author":"R Albert","year":"2000","unstructured":"Albert, R., Jeong, H., Barabasi, A.L.: Error and attack tolerance of complex networks. Nature 406(6794), 378\u2013382 (2000)","journal-title":"Nature"},{"issue":"10","key":"29_CR8","doi-asserted-by":"publisher","first-page":"1332","DOI":"10.1016\/j.ssci.2009.02.002","volume":"47","author":"J-W Wang","year":"2009","unstructured":"Wang, J.-W., Rong, L.-L.: Cascade-based attack vulnerability on the us power grid. Saf. Sci. 47(10), 1332\u20131336 (2009)","journal-title":"Saf. Sci."},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Wang, W., Cai, Q., Sun, Y., He, H.: Risk-aware attacks and catastrophic cascading failures in us power grid. In: 2011 IEEE Global Telecommunications Conference (GLOBECOM 2011), pp. 1\u20136. IEEE (2011)","DOI":"10.1109\/GLOCOM.2011.6133788"},{"issue":"05","key":"29_CR10","doi-asserted-by":"publisher","first-page":"P05013","DOI":"10.1088\/1742-5468\/2008\/05\/P05013","volume":"2008","author":"Z-X Wu","year":"2008","unstructured":"Wu, Z.-X., Peng, G., Wang, W.-X., Chan, S., Wong, E.W.-M.: Cascading failure spreading on weighted heterogeneous networks. J. Stat. Mech. Theory Exp. 2008(05), P05013 (2008)","journal-title":"J. Stat. Mech. Theory Exp."},{"key":"29_CR11","volume-title":"Approximation Algorithms","author":"VV Vazirani","year":"2001","unstructured":"Vazirani, V.V.: Approximation Algorithms. Springer, New York (2001)"},{"issue":"3","key":"29_CR12","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.tcs.2005.11.029","volume":"354","author":"M Chlebik","year":"2006","unstructured":"Chlebik, M., Chlebikova, J.: Complexity of approximating bounded variants of optimization problems. Theor. Comput. Sci. 354(3), 320\u2013338 (2006)","journal-title":"Theor. Comput. Sci."},{"issue":"6684","key":"29_CR13","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"DJ Watts","year":"1998","unstructured":"Watts, D.J., Strogatz, S.H.: Collective dynamics of \u2018small-world\u2019 networks. Nature 393(6684), 440\u2013442 (1998)","journal-title":"Nature"},{"issue":"3","key":"29_CR14","doi-asserted-by":"publisher","first-page":"035101","DOI":"10.1103\/PhysRevE.70.035101","volume":"70","author":"L Zhao","year":"2004","unstructured":"Zhao, L., Park, K., Lai, Y.-C.: Attack vulnerability of scale-free networks due to cascading breakdown. Phys. Rev. E 70(3), 035101 (2004)","journal-title":"Phys. Rev. E"},{"issue":"4","key":"29_CR15","first-page":"343","volume":"38","author":"P Erdos","year":"1961","unstructured":"Erdos, P., R\u00e9nyi, A.: On the evolution of random graphs. Bull. Inst. Int. Stat. 38(4), 343\u2013347 (1961)","journal-title":"Bull. Inst. Int. Stat."}],"container-title":["Lecture Notes in Computer Science","Combinatorial Optimization and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12691-3_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T18:25:55Z","timestamp":1747160755000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12691-3_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319126906","9783319126913"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12691-3_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"13 November 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}