{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:05:30Z","timestamp":1743080730271,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":22,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789048136612"},{"type":"electronic","value":"9789048136629"}],"license":[{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-90-481-3662-9_36","type":"book-chapter","created":{"date-parts":[[2010,1,30]],"date-time":"2010-01-30T11:23:45Z","timestamp":1264850625000},"page":"211-216","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Game Theoretic Approach for Discovering Vulnerable Links in Complex Networks"],"prefix":"10.1007","author":[{"given":"Mishkovski","family":"Igor","sequence":"first","affiliation":[]},{"given":"Sonja","family":"Filiposka","sequence":"additional","affiliation":[]},{"given":"Sasho","family":"Gramatikov","sequence":"additional","affiliation":[]},{"given":"Dimitar","family":"Trajanov","sequence":"additional","affiliation":[]},{"given":"Ljupco","family":"Kocarev","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,12,12]]},"reference":[{"issue":"1","key":"36_CR1","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/TR.2002.808062","volume":"52","author":"M.G.H. Bell","year":"2003","unstructured":"M.G.H. Bell, The use of game theory to measure the vulnerability of stochastic networks. Reliability, IEEE Transactions on Volume 52, Issue 1, March 2003 Page(s): 63 \u2013 68.","journal-title":"Reliability, IEEE Transactions on Volume"},{"key":"36_CR2","unstructured":"John von Neumann, Oskar Morgenstern, Theory of Games and Economic Behavior. Princeton University Press, 1944."},{"key":"36_CR3","doi-asserted-by":"crossref","unstructured":"J. Nash, Equilibrium point in n-person games. Proceeding of the National Academy of Science, 36, 1950.","DOI":"10.1073\/pnas.36.1.48"},{"issue":"3","key":"36_CR4","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s11067-006-9283-x","volume":"6","author":"M.G.H. Bell","year":"2006","unstructured":"M.G.H. Bell, Mixed Route Strategies for the Risk-Averse Shipment of Hazardous Materials, Netw. and Spat. Econ., vol. 6, no.3, pp. 253\u2013265, 2006.","journal-title":"Netw. and Spat. Econ."},{"key":"36_CR5","doi-asserted-by":"crossref","unstructured":"H. Karaa, and J.Y. Lau, Game Theory Applications in Network Reliability in Proc. Communications, 23rd Biennial Symposium, 2006, pp. 236\u2013239.","DOI":"10.1109\/BSC.2006.1644612"},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"Satayapiwat, P.; Suksomboon, K.; Aswakul, C, Vulnerability analysis in multicommodity stochastic networks by game theory, ECTI-CON 2008, pp. 357\u2013360.","DOI":"10.1109\/ECTICON.2008.4600445"},{"key":"36_CR7","volume-title":"The Origins of the Theory of Random Graphs, The Mathematics of Paul Erdos","author":"Michael Karonski","year":"1997","unstructured":"Michael Karonski and Adrzej Rucinski: The Origins of the Theory of Random Graphs, The Mathematics of Paul Erdos, Berlin, Springer, 1997"},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Miligram S.: The small world problem, Psychology today 2, pp. 60\u201367,1967.","DOI":"10.1037\/e400002009-005"},{"key":"36_CR9","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1140\/epjb\/e2004-00110-5","volume":"28","author":"L.A.N. Amaral","year":"2004","unstructured":"L.A.N. Amaral and J.M. Ottino, Complex Networks, Augmenting the framework for the study of complex systems, Eur. Phys. J. B 28, 147\u2013162, 2004.","journal-title":"Eur. Phys. J. B"},{"key":"36_CR10","unstructured":"Albert Laszlo Barabasi: Linked, Penguin Group, London, May, 2003"},{"issue":"3","key":"36_CR11","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1016\/j.sbi.2004.05.003","volume":"14","author":"P. Bork","year":"2004","unstructured":"P. Bork et al. \u201cProtein interaction networks from yeast to human\u201d, Current Opinion in Structural Biology, 14(3):292\u2013299, 2004.","journal-title":"Current Opinion in Structural Biology"},{"key":"36_CR12","doi-asserted-by":"crossref","unstructured":"Mark S. Granovetter: The Strength of Weak Ties: A Network Theory Revisited, Sociological Theory 1, 1983","DOI":"10.2307\/202051"},{"key":"36_CR13","unstructured":"D. J. Watts: Small Worlds: The Dynamics of Networks between Order and Randomness, Princeton University Press, 2003"},{"key":"36_CR14","volume-title":"The Tipping Point","author":"Malcom Gladwell","year":"2000","unstructured":"Malcom Gladwell: The Tipping Point, New York, Little, Brown, 2000"},{"key":"36_CR15","doi-asserted-by":"crossref","unstructured":"Albert B., Barabasi A.L.: Statistical mechanics of complex networks, Reviews of modern physics, Vol. 74, January 2002.","DOI":"10.1103\/RevModPhys.74.47"},{"key":"36_CR16","volume-title":"Random Geometric Graphs","author":"Mathew Penrose","year":"2004","unstructured":"Mathew Penrose: Random Geometric Graphs, Oxford University Press, New York, 2004"},{"key":"36_CR17","doi-asserted-by":"crossref","unstructured":"E. W. Dijkstra: A note on two problems in connexion with graphs. In Numerische Mathematik, 1 (1959), S. 269\u2013271.","DOI":"10.1007\/BF01386390"},{"key":"36_CR18","unstructured":"THE MATHWORKS, INC. 1997. MATLAB: The Language of Technical Computing. The MathWorks, Inc. Using MATLAB (Version 7)."},{"key":"36_CR19","unstructured":"Keith Briggs, Graph eigenvalues and connectivity, july 2003."},{"key":"36_CR20","doi-asserted-by":"crossref","unstructured":"Borgatti, S., Everett, M. & Freeman, L. (1996a). UCINET IV Version 1.64. Natick, MA: Analytic Technologies.","DOI":"10.1007\/978-1-4614-7163-9_316-1"},{"issue":"3","key":"36_CR21","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","volume":"1","author":"L.C. Freeman","year":"1979","unstructured":"Freeman, L. C. (1979). Centrality in social networks: Conceptual clarification. Social Networks, 1(3), 215\u2013239.","journal-title":"Centrality in social networks: Conceptual clarification. Social Networks"},{"key":"36_CR22","unstructured":"Sonja Filiposka, Dimitar Trajanov and Aksenti Grnarov, Survey of Social Networking and Applications in Ad Hoc Networks, ETAI 2007, Ohrid, R.Macedonia, 2007."}],"container-title":["Novel Algorithms and Techniques in Telecommunications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-3662-9_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T03:11:23Z","timestamp":1739761883000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-90-481-3662-9_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12,12]]},"ISBN":["9789048136612","9789048136629"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-3662-9_36","relation":{},"subject":[],"published":{"date-parts":[[2009,12,12]]},"assertion":[{"value":"12 December 2009","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}