{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:49:13Z","timestamp":1725490153289},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540749165"},{"type":"electronic","value":"9783540749172"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74917-2_11","type":"book-chapter","created":{"date-parts":[[2007,8,24]],"date-time":"2007-08-24T10:51:39Z","timestamp":1187952699000},"page":"119-130","source":"Crossref","is-referenced-by-count":4,"title":["Network Topology Reconfiguration Against Targeted and Random Attack"],"prefix":"10.1007","author":[{"given":"Kosuke","family":"Sekiyama","sequence":"first","affiliation":[]},{"given":"Hirohisa","family":"Araki","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Echenique, P., Gardenes, J.g., Moreno, Y.: Dynamics of jamming transitions in complex networks. cond-mat\/0412053 (2004)"},{"issue":"2","key":"11_CR2","doi-asserted-by":"publisher","first-page":"118702","DOI":"10.1103\/PhysRevLett.92.118702","volume":"92","author":"A.X.C.N. Valente","year":"2004","unstructured":"Valente, A.X.C.N., Sarkar, A., Howard, A.: Two-peak and three-peak optimal complex networks. Physical Review Letters\u00a092(2), 118702 (2004)","journal-title":"Physical Review Letters"},{"key":"11_CR3","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1038\/43601","volume":"401","author":"B.A. Huberman","year":"1999","unstructured":"Huberman, B.A., Adamic, L.A.: Growth dynamics of the world wide web. Nature\u00a0401, 130 (1999)","journal-title":"Nature"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Faloutsos, C., Faloutsos, M., Faloutsos, P.: On power-law relationships of the internet topology. In: ACM SIGCOMM 1999, vol.\u00a029, pp. 251\u2013263 (1999)","DOI":"10.1145\/316188.316229"},{"key":"11_CR5","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1038\/35065725","volume":"410","author":"S.H. Strogtz","year":"2001","unstructured":"Strogtz, S.H.: Exploring complex networks. Nature\u00a0410, 268\u2013276 (2001)","journal-title":"Nature"},{"key":"11_CR6","unstructured":"Barabasi, A.L.: The New Science of Networks. Perseus Books Group (2002)"},{"issue":"5","key":"11_CR7","doi-asserted-by":"publisher","first-page":"58701","DOI":"10.1103\/PhysRevLett.90.058701","volume":"90","author":"R. Cohen","year":"2003","unstructured":"Cohen, R., Havlin, S.: Scale-free networks are ultrasmall. Physical Review Letters\u00a090(5), 58701 (2003)","journal-title":"Physical Review Letters"},{"key":"11_CR8","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1038\/35019019","volume":"406","author":"R. Albert","year":"2000","unstructured":"Albert, R., Jeong, H., Barabasi, A.-L.: Error and attack tolerance of complex networks. Nature\u00a0406, 378\u2013382 (2000)","journal-title":"Nature"},{"issue":"21","key":"11_CR9","doi-asserted-by":"publisher","first-page":"4626","DOI":"10.1103\/PhysRevLett.85.4626","volume":"85","author":"R. Cohen","year":"2000","unstructured":"Cohen, R., Erez, K., ben Avraham, D., Havlin, S.: Resilience of the internet to random breakdowns. PHYSICAL REVIEW LETTERS\u00a085(21), 4626\u20134628 (2000)","journal-title":"PHYSICAL REVIEW LETTERS"},{"issue":"16","key":"11_CR10","doi-asserted-by":"publisher","first-page":"3682","DOI":"10.1103\/PhysRevLett.86.3682","volume":"86","author":"R. Cohen","year":"2001","unstructured":"Cohen, R., Erez, K., ben Avraham, D., Havlin, S.: Breakdown of the internet under intentional attack. Physical Review Letters\u00a086(16), 3682\u20133685 (2001)","journal-title":"Physical Review Letters"},{"key":"11_CR11","doi-asserted-by":"publisher","first-page":"35101","DOI":"10.1103\/PhysRevE.70.035101","volume":"70","author":"L. Zhao","year":"2004","unstructured":"Zhao, L., Park, K., Lai, Y.-C.: Attack vulnerability of scale-free networks due to cascading breakdown. PHYSICAL REVIEW E\u00a070, 35101 (2004)","journal-title":"PHYSICAL REVIEW E"},{"key":"11_CR12","doi-asserted-by":"publisher","first-page":"37103","DOI":"10.1103\/PhysRevE.69.037103","volume":"69","author":"J. GoLmez-Gardenes","year":"2004","unstructured":"GoLmez-Gardenes, J., Moreno, Y.: Local versus global knowledge in the barabalsi-albert scale-free network model. PHYSICAL REVIEW E\u00a069, 37103 (2004)","journal-title":"PHYSICAL REVIEW E"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Kalisky, T., Sreenivasan, S., Braunstein, L.A., Buldyrev, S.V., Havlin, S., Stanley, H.E.: Scale-free networks emerging from weighted random graphs. cond-mat\/0503598\u00a0 (2005)","DOI":"10.1103\/PhysRevE.73.025103"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Motter1, A.E., Lai, Y.-C.: Cascade-based attacks on complex networks. PHYSICAL REVIEW E\u00a066, 65102 (2002)","DOI":"10.1103\/PhysRevE.66.065102"},{"key":"11_CR15","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1016\/j.physa.2004.04.031","volume":"340","author":"P. Crucitti","year":"2004","unstructured":"Crucitti, P., Latora, V., Marchiori, M., Rapisarda, A.: Error and attack tolerance of complex networks. PHYSICA A\u00a0340, 388\u2013394 (2004)","journal-title":"PHYSICA A"},{"key":"11_CR16","series-title":"Lecture Notes in Computer Science","volume-title":"Principles of Distributed Systems","author":"J.-L. Guillaume","year":"2005","unstructured":"Guillaume, J.-L., Latapy, M., Magnien, C.: Comparison of failures and attacks on random and scale-free networks. In: Higashino, T. (ed.) OPODIS 2004. LNCS, vol.\u00a03544, Springer, Heidelberg (2005)"},{"key":"11_CR17","doi-asserted-by":"publisher","first-page":"56108","DOI":"10.1103\/PhysRevE.71.056108","volume":"71","author":"E.J. Lee","year":"2005","unstructured":"Lee, E.J., Goh, K.-I., Kahng, B., Kim, D.: Robustness of the avelanche dynamics in data-paket transport on scale-free networks. PHYSICAL REVIEW E\u00a071, 56108 (2005)","journal-title":"PHYSICAL REVIEW E"}],"container-title":["Lecture Notes in Computer Science","Self-Organizing Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74917-2_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:46:04Z","timestamp":1619505964000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74917-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540749165","9783540749172"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74917-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}