{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T13:39:45Z","timestamp":1773409185740,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642541391","type":"print"},{"value":"9783642541407","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54140-7_11","type":"book-chapter","created":{"date-parts":[[2014,2,14]],"date-time":"2014-02-14T04:55:11Z","timestamp":1392353711000},"page":"127-138","source":"Crossref","is-referenced-by-count":2,"title":["Modelling Critical Node Attacks in MANETs"],"prefix":"10.1007","author":[{"given":"Dongsheng","family":"Zhang","sequence":"first","affiliation":[]},{"given":"James P. G.","family":"Sterbenz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"The ns-3 network simulator (July 2009), http:\/\/www.nsnam.org"},{"issue":"7","key":"11_CR2","doi-asserted-by":"publisher","first-page":"2193","DOI":"10.1016\/j.cor.2008.08.016","volume":"36","author":"A. Arulselvan","year":"2009","unstructured":"Arulselvan, A., Commander, C.W., Elefteriadou, L., Pardalos, P.M.: Detecting critical nodes in sparse graphs. Computers and Operations Research\u00a036(7), 2193\u20132200 (2009)","journal-title":"Computers and Operations Research"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Billinton, R., Allan, R.: Reliability Evaluation of Engineering Systems. Plenum Press London (1983)","DOI":"10.1007\/978-1-4615-7728-7"},{"issue":"1","key":"11_CR4","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s10588-006-7084-x","volume":"12","author":"S.P. Borgatti","year":"2006","unstructured":"Borgatti, S.P.: Identifying sets of key players in a social network. Comput. Math. Organ. Theory\u00a012(1), 21\u201334 (2006)","journal-title":"Comput. Math. Organ. Theory"},{"issue":"5","key":"11_CR5","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1002\/wcm.72","volume":"2","author":"T. Camp","year":"2002","unstructured":"Camp, T., Boleng, J., Davies, V.: A survey of mobility models for ad hoc network research. Wireless Communications and Mobile Computing\u00a02(5), 483\u2013502 (2002), http:\/\/dx.doi.org\/10.1002\/wcm.72","journal-title":"Wireless Communications and Mobile Computing"},{"key":"11_CR6","unstructured":"\u00c7etinkaya, E.K., Broyles, D., Dandekar, A., Srinivasan, S., Sterbenz, J.P.G.: Modelling Communication Network Challenges for Future Internet Resilience, Survivability, and Disruption Tolerance: A Simulation-Based Approach. Springer Telecommunication Systems, 1\u201316 (2011) (published online: September 21, 2011)"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Di Summa, M., Grosso, A., Locatelli, M.: Branch and cut algorithms for detecting critical nodes in undirected graphs. Computational Optimization and Applications, 1\u201332 (2012)","DOI":"10.1007\/s10589-012-9458-y"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Dinh, T., Xuan, Y., Thai, M., Park, E., Znati, T.: On approximation of new optimization methods for assessing network vulnerability. In: Proceedings of the IEEE Conference on Computer Communications (INFOCOM), pp. 1\u20139. IEEE (2010)","DOI":"10.1109\/INFCOM.2010.5462098"},{"issue":"3","key":"11_CR9","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","volume":"1","author":"L. Freeman","year":"1979","unstructured":"Freeman, L.: Centrality in social networks conceptual clarification. Social Networks\u00a01(3), 215\u2013239 (1979)","journal-title":"Social Networks"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Kim, T.H., Tipper, D., Krishnamurthy, P., Swindlehurst, A.: Improving the topological resilience of mobile ad hoc networks. In: 7th International Workshop on Design of Reliable Communication Networks (DRCN), pp. 191\u2013197 (October 2009)","DOI":"10.1109\/DRCN.2009.5340008"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Kim, T., Tipper, D., Krishnamurthy, P.: Connectivity and critical point behavior in mobile ad hoc and sensor networks. In: IEEE Symposium on Computers and Communications, ISCC, pp. 153\u2013158. IEEE (2009)","DOI":"10.1109\/ISCC.2009.5202371"},{"key":"11_CR12","unstructured":"Kriesell, M.: Minimal connectivity. In: Beineke, L.W., Wilson, R.J. (eds.) Topics in Structural Graph Theory, pp. 71\u201399. Cambridge University Press (2012)"},{"issue":"1","key":"11_CR13","doi-asserted-by":"publisher","first-page":"16132","DOI":"10.1103\/PhysRevE.64.016132","volume":"64","author":"M.E.J. Newman","year":"2001","unstructured":"Newman, M.E.J.: Scientific collaboration networks. ii. shortest paths, weighted networks, and centrality. Phys. Rev. E\u00a064(1), 16132 (2001)","journal-title":"Phys. Rev. E"},{"issue":"1","key":"11_CR14","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/TDSC.2004.11","volume":"01","author":"D.M. Nicol","year":"2004","unstructured":"Nicol, D.M., Sanders, W.H., Trivedi, K.S.: Model-based evaluation: From dependability to security. IEEE Transactions on Dependable and Secure Computing\u00a001(1), 48\u201365 (2004)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"3","key":"11_CR15","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.socnet.2010.03.006","volume":"32","author":"T. Opsahl","year":"2010","unstructured":"Opsahl, T., Agneessens, F., Skvoretz, J.: Node centrality in weighted networks: Generalizing degree and shortest paths. Social Networks\u00a032(3), 245\u2013251 (2010)","journal-title":"Social Networks"},{"issue":"1","key":"11_CR16","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1109\/TMC.2011.248","volume":"12","author":"S. Scellato","year":"2013","unstructured":"Scellato, S., Leontiadis, I., Mascolo, C., Basu, P., Zafer, M.: Evaluating temporal robustness of mobile networks. IEEE Transactions on Mobile Computing\u00a012(1), 105\u2013117 (2013)","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"2","key":"11_CR17","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1002\/net.20464","volume":"60","author":"S. Shen","year":"2012","unstructured":"Shen, S., Smith, J.C.: Polynomial-time algorithms for solving a class of critical node problems on trees and series-parallel graphs. Networks\u00a060(2), 103\u2013119 (2012)","journal-title":"Networks"},{"issue":"8","key":"11_CR18","doi-asserted-by":"publisher","first-page":"1245","DOI":"10.1016\/j.comnet.2010.03.005","volume":"54","author":"J.P.G. Sterbenz","year":"2010","unstructured":"Sterbenz, J.P.G., Hutchison, D., \u00c7etinkaya, E.K., Jabbar, A., Rohrer, J.P., Sch\u00f6ller, M., Smith, P.: Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines. Computer Networks\u00a054(8), 1245\u20131265 (2010)","journal-title":"Computer Networks"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Sterbenz, J.P.G., Krishnan, R., Hain, R.R., Jackson, A.W., Levin, D., Ramanathan, R., Zao, J.: Survivable mobile wireless networks: issues, challenges, and research directions. In: Proceedings of the 3rd ACM workshop on Wireless Security (WiSE), Atlanta, GA, pp. 31\u201340 (2002)","DOI":"10.1145\/570681.570685"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Tang, J., Musolesi, M., Mascolo, C., Latora, V.: Temporal distance metrics for social network analysis. In: Proceedings of the 2nd ACM Workshop on Online Social Networks, pp. 31\u201336 (2009)","DOI":"10.1145\/1592665.1592674"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Zhang, D., Gogi, S.A., Broyles, D.S., \u00c7etinkaya, E.K., Sterbenz, J.P.: Modelling Attacks and Challenges to Wireless Networks. In: Proceedings of the 4th IEEE\/IFIP International Workshop on Reliable Networks Design and Modeling (RNDM), pp. 806\u2013812. St. Petersburg (October 2012)","DOI":"10.1109\/ICUMT.2012.6459774"}],"container-title":["Lecture Notes in Computer Science","Self-Organizing Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54140-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,15]],"date-time":"2020-08-15T10:45:47Z","timestamp":1597488347000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54140-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642541391","9783642541407"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54140-7_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}