{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,14]],"date-time":"2025-12-14T08:20:03Z","timestamp":1765700403202,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319509006"},{"type":"electronic","value":"9783319509013"}],"license":[{"start":{"date-parts":[[2016,11,30]],"date-time":"2016-11-30T00:00:00Z","timestamp":1480464000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-50901-3_42","type":"book-chapter","created":{"date-parts":[[2016,11,30]],"date-time":"2016-11-30T05:02:04Z","timestamp":1480482124000},"page":"525-537","source":"Crossref","is-referenced-by-count":7,"title":["Robustness of Network Controllability to Degree-Based Edge Attacks"],"prefix":"10.1007","author":[{"given":"Jijju","family":"Thomas","sequence":"first","affiliation":[]},{"given":"Supratim","family":"Ghosh","sequence":"additional","affiliation":[]},{"given":"Deven","family":"Parek","sequence":"additional","affiliation":[]},{"given":"Derek","family":"Ruths","sequence":"additional","affiliation":[]},{"given":"Justin","family":"Ruths","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,30]]},"reference":[{"key":"42_CR1","doi-asserted-by":"crossref","unstructured":"Albert, R., Jeong, H., Barabasi, A.: Error and attack tolerance of complex networks. Nature 406(6794), 378\u2013382 (2000)","DOI":"10.1038\/35019019"},{"key":"42_CR2","doi-asserted-by":"crossref","unstructured":"Barab\u00e1si, A.L., Albert, R.: Emergence of scaling in random networks (1999)","DOI":"10.1126\/science.286.5439.509"},{"key":"42_CR3","unstructured":"Brockett, R.: Finite dimensional linear systems. Series in decision and control. Wiley (1970)"},{"key":"42_CR4","doi-asserted-by":"crossref","unstructured":"Callaway, D.S., Newman, M.E.J., Strogatz, S.H.,Watts, D.J.: Network robustness and fragility: percolation on random graphs. Physical Review Letters 85(25), 5468\u20135471 (2000)","DOI":"10.1103\/PhysRevLett.85.5468"},{"key":"42_CR5","unstructured":"Commault, C., Dion, J.M., Van der Woude, J.W.: Characterization of generic properties of linear structured systems for efficient computations. Kybernetika 38(5), 503\u2013520 (2002)"},{"key":"42_CR6","doi-asserted-by":"crossref","unstructured":"Dion, J.M., Commault, C., van der Woude, J.: Generic properties and control of linear structured systems: a survey. Automatica 39(7), 1125\u20131144 (2003)","DOI":"10.1016\/S0005-1098(03)00104-3"},{"key":"42_CR7","doi-asserted-by":"crossref","unstructured":"Erdos, P., Renyi, A.: On random graphs i. Publicationes Mathematicae (Debrecen) 6, 290\u2013297 (1959)","DOI":"10.5486\/PMD.1959.6.3-4.12"},{"key":"42_CR8","doi-asserted-by":"crossref","unstructured":"Hosoe, S.: Determination of the generic dimensions of controllable subspaces and its applications. IEEE Transactions on Automatic Control 25(6), 1192\u20131196 (1980)","DOI":"10.1109\/TAC.1980.1102506"},{"key":"42_CR9","doi-asserted-by":"crossref","unstructured":"Lin, C.T.: Structural controllability. IEEE Transactions on Automatic Control AC-19(3), 201\u2013208 (1974)","DOI":"10.1109\/TAC.1974.1100557"},{"key":"42_CR10","doi-asserted-by":"crossref","unstructured":"Liu, Y.Y., Slotine, J.J., Barab\u00e1si, A.L.: Controllability of Complex Networks. Nature 473(7346), 167\u2013173 (2011)","DOI":"10.1038\/nature10011"},{"key":"42_CR11","doi-asserted-by":"crossref","unstructured":"Mengiste, S., Arvind, A., Kumar, A.: Effect of edge pruning on structural controllability and observability of complex networks. Scientific Reports 5(18145), 4420\u20134425 (2015)","DOI":"10.1038\/srep18145"},{"key":"42_CR12","doi-asserted-by":"crossref","unstructured":"Murota, K., Poljak, S.: Note on a Graph-Theoretic Criterion for Structural Output Controllability. IEEE Transactions on Automatic Control 35(8), 939\u2013942 (1990)","DOI":"10.1109\/9.58507"},{"key":"42_CR13","doi-asserted-by":"crossref","unstructured":"Newman, M.: Networks: an introduction. OUP Oxford (2010)","DOI":"10.1093\/acprof:oso\/9780199206650.001.0001"},{"key":"42_CR14","doi-asserted-by":"crossref","unstructured":"Nie, S., Wang, X., Zhang, H., Li, Q., Wang, B.: Robustness of controllability for networks based on edge-attack. Plos One 9(2), e89,066 (2014)","DOI":"10.1371\/journal.pone.0089066"},{"key":"42_CR15","doi-asserted-by":"crossref","unstructured":"Parekh, D., Ruths, D., Ruths, J.: Reachability-based robustness of network controllability under node and edge attacks. In: Signal-Image Technology and Internet-Based Systems (SITIS), 2014 Tenth International Conference on, pp. 424\u2013431 (2014). DOI 10.1109\/SITIS.2014.100","DOI":"10.1109\/SITIS.2014.100"},{"key":"42_CR16","doi-asserted-by":"crossref","unstructured":"Poljak, S.: On the generic dimension of controllable subspaces. IEEE Transactions on Automatic Control 35(3), 367\u2013369 (1990)","DOI":"10.1109\/9.50361"},{"key":"42_CR17","doi-asserted-by":"crossref","unstructured":"P\u00f3sfai, M., Liu, Y., Slotine, J.E., Barab\u00e1si, A.: Effect of correlations on network controllability. Scientific Reports 3 (2013)","DOI":"10.1038\/srep01067"},{"key":"42_CR18","doi-asserted-by":"crossref","unstructured":"Pu, C.L., Pei, W.J., Michaelson, A.: Robustness analysis of network controllability. Physica A: Statistical Mechanics and its Applications 391(18), 4420\u20134425 (2012)","DOI":"10.1016\/j.physa.2012.04.019"},{"key":"42_CR19","doi-asserted-by":"crossref","unstructured":"Ruths, J., Ruths, D.: Control Profiles of Complex Networks. Science 343(6177) (2014)","DOI":"10.1126\/science.1242063"},{"key":"42_CR20","doi-asserted-by":"crossref","unstructured":"Shields, R.W., Pearson, J.B.: Structural controllability on multiinput liner systems. IEEE Transactions on Automatic Control AC-21(2), 203\u2013212 (1976)","DOI":"10.1109\/TAC.1976.1101198"}],"container-title":["Studies in Computational Intelligence","Complex Networks &amp; Their Applications V"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-50901-3_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T03:34:25Z","timestamp":1692588865000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-50901-3_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,30]]},"ISBN":["9783319509006","9783319509013"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-50901-3_42","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2016,11,30]]}}}