{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T15:56:35Z","timestamp":1758815795285,"version":"3.41.0"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319165486"},{"type":"electronic","value":"9783319165493"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16549-3_14","type":"book-chapter","created":{"date-parts":[[2015,3,16]],"date-time":"2015-03-16T05:30:34Z","timestamp":1426483834000},"page":"164-176","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["An Experimental Evaluation of Multi-objective Evolutionary Algorithms for Detecting Critical Nodes in Complex Networks"],"prefix":"10.1007","author":[{"given":"Mario","family":"Ventresca","sequence":"first","affiliation":[]},{"given":"Kyle Robert","family":"Harrison","sequence":"additional","affiliation":[]},{"given":"Beatrice M.","family":"Ombuki-Berman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,17]]},"reference":[{"key":"14_CR1","unstructured":"MOEA Framework, version 2.1 (2014). http:\/\/www.moeaframework.org"},{"issue":"16\u201317","key":"14_CR2","doi-asserted-by":"publisher","first-page":"2349","DOI":"10.1016\/j.dam.2013.03.021","volume":"161","author":"B Addis","year":"2013","unstructured":"Addis, B., Di Summa, M., Grosso, A.: Identifying critical nodes in undirected graphs: complexity results and polynomial algorithms for the case of bounded treewidth. Discret. Appl.Math. 161(16\u201317), 2349\u20132360 (2013)","journal-title":"Discret. Appl .Math."},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Arora, S., Rao, S., Vazirani, U.: Expander flows, geometric embeddings and graph partitioning. In: Proceedings of the 36th Annual ACM Symposium on Theory of Computing, pp. 222\u2013231 (2004)","DOI":"10.1145\/1007352.1007355"},{"issue":"7","key":"14_CR4","doi-asserted-by":"publisher","first-page":"2193","DOI":"10.1016\/j.cor.2008.08.016","volume":"36","author":"A Arulselvan","year":"2009","unstructured":"Arulselvan, A., Commander, C.W., Elefteriadou, L., Pardalos, P.M.: Detecting critical nodes in sparse graphs. Comput. Oper. Res. 36(7), 2193\u20132200 (2009)","journal-title":"Comput. Oper. Res."},{"key":"14_CR5","unstructured":"Aspnes, J., Chang, K., Yampolskiy, A.: Inoculation strategies for victims of viruses and the sum-of-squares partition problem. In: Proceedings of the 16th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2005. Society for Industrial and Applied Mathematics, pp. 43\u201352 (2005)"},{"key":"14_CR6","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1142\/9789812771667_0007","volume-title":"Clustering Challenges in Biological Networks","author":"V Boginski","year":"2009","unstructured":"Boginski, V., Commander, C.: Identifying critical nodes in protein-protein interaction networks. In: Benson, M. (ed.) Clustering Challenges in Biological Networks, pp. 153\u2013166. Springer, Berlin (2009)"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Chen, P., David, M., Kempe, D.: Better vaccination strategies for better people. In: Proceedings of the 11th ACM Conference on Electronic Commerce, pp. 179\u2013188. ACM (2010)","DOI":"10.1145\/1807342.1807370"},{"key":"14_CR8","unstructured":"Corne, D., Jerram, N., Knowles, J., Oates, M.: PESA-II: region-based selection in evolutionary multiobjective optimization. In: Proceedings of the Genetic and Evolutionary Computation Conference (2001)"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Deb, K., Mohan, M., Mishra, S.: A fast multi-objective evolutionary algorithm for finding well-spread pareto-optimal solutions. Technical report, IIT-Kanpur (2003)","DOI":"10.1007\/3-540-36970-8_16"},{"issue":"2","key":"14_CR10","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"K Deb","year":"2002","unstructured":"Deb, K., Pratap, A., Agarwal, S., Meyarivan, T.: A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 6(2), 182\u2013197 (2002)","journal-title":"IEEE Trans. Evol. Comput."},{"issue":"12","key":"14_CR11","doi-asserted-by":"publisher","first-page":"1766","DOI":"10.1016\/j.cor.2011.02.016","volume":"38","author":"M Di Summa","year":"2011","unstructured":"Di Summa, M., Grosso, A., Locatelli, M.: Complexity of the critical node problem over trees. Comput. Oper. Res. 38(12), 1766\u20131774 (2011)","journal-title":"Comput. Oper. Res."},{"issue":"2","key":"14_CR12","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1109\/TNET.2011.2170849","volume":"20","author":"TN Dinh","year":"2012","unstructured":"Dinh, T.N., Xuan, Y., Thai, M.T., Pardalos, P.M., Znati, T.: On new approaches of assessing network vulnerability: hardness and approximation. IEEE\/ACM Trans. Netw. 20(2), 609\u2013619 (2012)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Dinh, T.N., Xuan, Y., Thai, M.T., Park, E.K., Znati, T.: On approximation of new optimization methods for assessing network vulnerability. In: INFOCOM, pp. 2678\u20132686 (2010)","DOI":"10.1109\/INFCOM.2010.5462098"},{"issue":"3","key":"14_CR14","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1007\/s10589-012-9458-y","volume":"53","author":"M DiSumma","year":"2012","unstructured":"DiSumma, M., Grosso, A., Locatelli, M.: Branch and cut algorithms for detecting critical nodes in undirected graphs. Comput. Optim. Appl. 53(3), 649\u2013680 (2012)","journal-title":"Comput. Optim. Appl."},{"key":"14_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/11682462_41","volume-title":"latin 2006: Theoretical Informatics","author":"R Engelberg","year":"2006","unstructured":"Engelberg, R., K\u00f6nemann, J., Leonardi, S., (Seffi) Naor, J.: Cut problems in graphs with a budget constraint. In: Correa, J.R., Hevia, A., Kiwi, M. (eds.) LATIN 2006. LNCS, vol. 3887, pp. 435\u2013446. Springer, Heidelberg (2006)"},{"key":"14_CR16","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF02523685","volume":"18","author":"N Garg","year":"1997","unstructured":"Garg, N., Vazirani, V., Yannakakis, M.: Primal-dual approximation algorithms for integral flow and multicut in trees. Algorithmica 18, 3\u201320 (1997)","journal-title":"Algorithmica"},{"issue":"8","key":"14_CR17","doi-asserted-by":"publisher","first-page":"e12200","DOI":"10.1371\/journal.pone.0012200","volume":"5","author":"KE Joyce","year":"2010","unstructured":"Joyce, K.E., Laurienti, P.J., Burdette, J.H., Hayasaka, S.: A new measure of centrality for brain networks. PLoS ONE 5(8), e12200 (2010)","journal-title":"PLoS ONE"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J., Tardos, E.: Maximizing the spread of influence in a social network. In: Proceedings of the 9th International Conference on Knowledge Discovery and Data Mining, pp. 137\u2013146 (2003)","DOI":"10.1145\/956750.956769"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Knowles, J., Corne, D.: The pareto archived evolution strategy: a new baseline algorithm for pareto multiobjective optimisation. In: Proceedings of the 1999 Congress on Evolutionary Computation, vol. 1, pp. 98\u2013105 (1999)","DOI":"10.1109\/CEC.1999.781913"},{"issue":"6","key":"14_CR20","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1016\/j.advwatres.2005.07.010","volume":"29","author":"J Kollat","year":"2006","unstructured":"Kollat, J., Reed, P.: Comparing state-of-the-art evolutionary multi-objective algorithms for long-term groundwater monitoring design. Adv. Water Resour. 29(6), 792\u2013807 (2006)","journal-title":"Adv. Water Resour."},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Kumar, V.S.A., Rajaraman, R., Sun, Z., Sundaram, R.: Existence theorems and approximation algorithms for generalized network security games. In: Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems, pp. 348\u2013357 (2010)","DOI":"10.1109\/ICDCS.2010.70"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Nebro, A., Alba, E., Molina, G., Chicano, F., Luna, F., Durillo, J.: Optimal antenna placement using a new multi-objective CHC algorithm. In: 9th Annual Conference on Genetic and Evolutionary Computation, pp. 876\u2013883 (2007)","DOI":"10.1145\/1276958.1277128"},{"issue":"1","key":"14_CR23","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1109\/TSG.2012.2229398","volume":"4","author":"D Nguyen","year":"2013","unstructured":"Nguyen, D., Shen, Y., Thai, M.: Detecting critical nodes in interdependent power networks for vulnerability assessment. IEEE Trans. Smart Grid 4(1), 151\u2013159 (2013)","journal-title":"IEEE Trans. Smart Grid"},{"key":"14_CR24","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1137\/S0097539792251730","volume":"24","author":"H Saran","year":"1995","unstructured":"Saran, H., Vazirani, V.: Finding k-cuts within twice the optimal. SIAM J. Comput. 24, 101\u2013108 (1995)","journal-title":"SIAM J. Comput."},{"key":"14_CR25","unstructured":"Schott, J.: Fault tolerant design using single and multicriteria genetic algorithm optimization. Master\u2019s thesis, Massachusetts Institute of Technology (1995)"},{"issue":"11","key":"14_CR26","doi-asserted-by":"publisher","first-page":"2763","DOI":"10.1016\/j.cor.2012.02.008","volume":"39","author":"M Ventresca","year":"2012","unstructured":"Ventresca, M.: Global search algorithms using a combinatorial unranking-based problem representation for the critical node detection problem. Comput. Oper. Res. 39(11), 2763\u20132775 (2012)","journal-title":"Comput. Oper. Res."},{"issue":"1","key":"14_CR27","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.socnet.2013.01.002","volume":"35","author":"M Ventresca","year":"2013","unstructured":"Ventresca, M., Aleman, D.: Evaluation of strategies to mitigate contagion spread using social network characteristics. Soc. Netw. 35(1), 75\u201388 (2013)","journal-title":"Soc. Netw."},{"key":"14_CR28","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/j.cor.2013.09.012","volume":"43","author":"M Ventresca","year":"2014","unstructured":"Ventresca, M., Aleman, D.: A derandomized approximation algorithm for the critical node detection problem. Comput. Oper. Res. 43, 261\u2013270 (2014)","journal-title":"Comput. Oper. Res."},{"key":"14_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1007\/978-3-319-12691-3_45","volume-title":"Combinatorial Optimization and Applications","author":"M Ventresca","year":"2014","unstructured":"Ventresca, M., Aleman, D.: a fast greedy algorithm for the critical node detection problem. In: Zhang, Z., Wu, L., Xu, W., Du, D.-Z. (eds.) COCOA 2014. LNCS, vol. 8881, pp. 603\u2013612. Springer, Heidelberg (2014)"},{"key":"14_CR30","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.cor.2014.02.003","volume":"48","author":"M Ventresca","year":"2014","unstructured":"Ventresca, M., Aleman, D.: A randomized algorithm with local search for containment of pandemic disease spread. Comput. Oper. Res. 48, 11\u201319 (2014)","journal-title":"Comput. Oper. Res."},{"issue":"4","key":"14_CR31","doi-asserted-by":"publisher","first-page":"1245","DOI":"10.1007\/s11590-013-0666-x","volume":"8","author":"A Veremyev","year":"2014","unstructured":"Veremyev, A., Boginski, V., Pasiliao, E.L.: Exact identification of critical nodes in sparse networks via new compact formulations. Optim. Lett. 8(4), 1245\u20131259 (2014)","journal-title":"Optim. Lett."},{"issue":"1","key":"14_CR32","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s10878-014-9730-4","volume":"28","author":"A Veremyev","year":"2014","unstructured":"Veremyev, A., Prokopyev, O.A., Pasiliao, E.L.: An integer programming framework for critical elements detection in graphs. J. Comb. Optim. 28(1), 233\u2013273 (2014)","journal-title":"J. Comb. Optim."},{"issue":"2","key":"14_CR33","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1109\/TEVC.2003.810758","volume":"7","author":"E Zitzler","year":"2003","unstructured":"Zitzler, E., Thiele, L., Laumanns, M., Fonseca, C., Da Fonseca, V.: Performance assessment of multiobjective optimizers: an analysis and review. IEEE Trans. Evol. Comput. 7(2), 117\u2013132 (2003)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"14_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/BFb0056872","volume-title":"Parallel Problem Solving from Nature - PPSN V","author":"E Zitzler","year":"1998","unstructured":"Zitzler, E., Thiele, L.: Multiobjective optimization using evolutionary algorithms - a comparative case study. In: Eiben, A.E., B\u00e4ck, T., Schoenauer, M., Schwefel, H.-P. (eds.) PPSN 1998. LNCS, vol. 1498, pp. 292\u2013301. Springer, Heidelberg (1998)"}],"container-title":["Lecture Notes in Computer Science","Applications of Evolutionary Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16549-3_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T00:16:37Z","timestamp":1747786597000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-16549-3_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319165486","9783319165493"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16549-3_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"17 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}