{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:12:40Z","timestamp":1743109960498,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811513039"},{"type":"electronic","value":"9789811513046"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-15-1304-6_37","type":"book-chapter","created":{"date-parts":[[2019,11,5]],"date-time":"2019-11-05T00:22:15Z","timestamp":1572913335000},"page":"454-461","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Electric Power Grid Invulnerability Under Intentional Edge-Based Attacks"],"prefix":"10.1007","author":[{"given":"Yixia","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6381-1984","authenticated-orcid":false,"given":"Shudong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yanshan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Peiyan","family":"He","sequence":"additional","affiliation":[]},{"given":"Xiaobo","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Weihong","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,5]]},"reference":[{"issue":"1","key":"37_CR1","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1063\/1.3077229","volume":"19","author":"S Arianos","year":"2009","unstructured":"Arianos, S., Bompard, E., Carbone, A., et al.: Power grids vulnerability: a complex network approach. Chaos 19(1), 175 (2009)","journal-title":"Chaos"},{"doi-asserted-by":"crossref","unstructured":"Ko\u00e7, Y., Warnier, M., Van Mieghem, P., et al.: The impact of the topology on cascading failures in electric power grids. Comput. Sci. (2013)","key":"37_CR2","DOI":"10.1016\/j.physa.2014.01.056"},{"issue":"5","key":"37_CR3","first-page":"24","volume":"28","author":"S Kadloor","year":"2012","unstructured":"Kadloor, S., Santhi, N.: Understanding cascading failures in power grids. Comput. Sci. 28(5), 24\u201330 (2012)","journal-title":"Comput. Sci."},{"doi-asserted-by":"crossref","unstructured":"Wang, X., Koc, Y., Robert, E., et al: A network approach for power grid robustness against cascading failures. In: 2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM). IEEE (2015)","key":"37_CR4","DOI":"10.1109\/RNDM.2015.7325231"},{"issue":"21","key":"37_CR5","doi-asserted-by":"publisher","first-page":"218701","DOI":"10.1103\/PhysRevLett.100.218701","volume":"100","author":"I Simonsen","year":"2008","unstructured":"Simonsen, I., Buzna, L., Peters, K., et al.: Transient dynamics increasing network vulnerability to cascading failures. Phys. Rev. Lett. 100(21), 218701 (2008)","journal-title":"Phys. Rev. Lett."},{"doi-asserted-by":"crossref","unstructured":"Buldyrev, S.V., Parshani, R., Paul, G., et al.: Catastrophic cascade of failures in interdependent networks. Nature 464, 1025\u20131028 (2010)","key":"37_CR6","DOI":"10.1038\/nature08932"},{"doi-asserted-by":"crossref","unstructured":"Schaub, M.T., Lehmann, J., Yaliraki, S.N., et al.: Structure of complex networks: quantifying edge-to-edge relations by failure-induced flow redistribution. Netw. Sci. 2(01), 66\u201389 (2014)","key":"37_CR7","DOI":"10.1017\/nws.2014.4"},{"issue":"12","key":"37_CR8","first-page":"58","volume":"37","author":"Y Yong","year":"2018","unstructured":"Yong, Y., Yu, F.: Case study on survivability of urban rail transit network. Logistics Technol. 37(12), 58\u201362 (2018)","journal-title":"Logistics Technol."},{"doi-asserted-by":"crossref","unstructured":"Sun, Y., Yang, D., Meng, L., et al.: Universal framework for vulnerability assessment of power grid based on complex networks. In: The 30th Chinese Control and Decision Conference (2018)","key":"37_CR9","DOI":"10.1109\/CCDC.2018.8407119"},{"issue":"10","key":"37_CR10","first-page":"147","volume":"47","author":"W Runze","year":"2019","unstructured":"Runze, W., Wanxu, W., Li, L., Bing, F., Liangrui, T.: Topology diagnosis of power communication network based on node influence. Power Syst. Prot. Control 47(10), 147\u2013155 (2019)","journal-title":"Power Syst. Prot. Control"},{"doi-asserted-by":"crossref","unstructured":"Riondato, M., Kornaropoulos, E.M.: Fast approximation of betweenness centrality through sampling. Data Min. Knowl. Discov. 30(2), 438\u2013475 (2016). (S1384-5810)","key":"37_CR11","DOI":"10.1007\/s10618-015-0423-0"},{"issue":"3","key":"37_CR12","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1109\/TSP.2015.2486740","volume":"64","author":"S Segarra","year":"2016","unstructured":"Segarra, S., Ribeiro, A.: Stability and continuity of centrality measures in weighted graphs. IEEE Trans. Sig. Process. 64(3), 543\u2013555 (2016)","journal-title":"IEEE Trans. Sig. Process."},{"unstructured":"Yun, L.: Node importance rank by attribute reduction set evaluation and application. Shandong Normal University (2018)","key":"37_CR13"},{"unstructured":"Li, S., Wu, X., Zhu, C., Li, A., Li, L., Jia, Y.: Vulnerability of complex networks under multiple node-based attacks. In: IET International Conference on Information & Communications Technologies (2013)","key":"37_CR14"},{"doi-asserted-by":"crossref","unstructured":"Ruan, Y., Lao, S.-Y., Wang, J., Bai, L., Chen, L.-D.: Node importance measurement based on neighborhood similarity in complex network. Acta Phys. Sin. 66(03), 371\u2013379 (2017)","key":"37_CR15","DOI":"10.7498\/aps.66.038902"},{"unstructured":"Li, C., Wei, L., Lu, T., Gao, W.: Invulnerability simulation analysis of compound traffic network in urban agglomeration. J. Syst. Simul. 30(02), 489\u2013496 (2018)","key":"37_CR16"},{"key":"37_CR17","first-page":"1","volume":"13","author":"K Sun","year":"2005","unstructured":"Sun, K., Han, Z.X., Cao, Y.J.: Review on models of cascading failures in complex power grid. Power Syst. Technol. 13, 1\u20139 (2005)","journal-title":"Power Syst. Technol."},{"doi-asserted-by":"crossref","unstructured":"Watts, D.J., Strogatz, S.H.: Collective dynamics of \u2018small-world\u2019 networks. Nature 393(6684), 440 (1998)","key":"37_CR18","DOI":"10.1038\/30918"},{"unstructured":"Yuejin, T., Xin, L., Jun, W., Hongzhong, D.: Main scientific problems for the invulnerability research of complex networks. In: The 15th Chinese Congress of Systems Science and Systems Engineering Proceeding. Systems Engineering Society of China (2008)","key":"37_CR19"},{"doi-asserted-by":"crossref","unstructured":"Verma, T., Ellens, W., Kooij, R.E.: Context-independent centrality measures underestimate the vulnerability of power grids. Int. J. Crit. Infrastruct. 11(1), 62 (2013)","key":"37_CR20","DOI":"10.1504\/IJCIS.2015.067398"},{"doi-asserted-by":"crossref","unstructured":"Tian, Z., et al.: Real time lateral movement detection based on evidence reasoning network for edge computing environment. IEEE Trans. Ind. Inform. 15(7), 4285\u20134294 (2019)","key":"37_CR21","DOI":"10.1109\/TII.2019.2907754"},{"doi-asserted-by":"crossref","unstructured":"Tian, Z., Su, S., Shi, W., Du, X., Guizani, M., Yu, X.: A data-driven method for future internet route decision modeling. Future Gener. Comput. Syst. 95, 212\u2013220 (2019)","key":"37_CR22","DOI":"10.1016\/j.future.2018.12.054"},{"issue":"3","key":"37_CR23","doi-asserted-by":"publisher","first-page":"837","DOI":"10.1007\/s11071-011-0308-8","volume":"69","author":"S Li","year":"2012","unstructured":"Li, S., Li, L., Yang, Y., Luo, Q.: Revealing the process of edge-based-attack cascading failures. Nonlinear Dyn. 69(3), 837\u2013845 (2012)","journal-title":"Nonlinear Dyn."},{"doi-asserted-by":"crossref","unstructured":"Li, S., Li, L., Jia, Y., Liu, X., Yang, Y.: Identifying vulnerable nodes of complex networks in cascading failures induced by node-based attacks. Math. Probl. Eng. 2013, 938 (2013)","key":"37_CR24","DOI":"10.1155\/2013\/938398"},{"doi-asserted-by":"crossref","unstructured":"Zhao, D., Li, L., Peng, H., Luo, Q., Yang, Y.: Multiple routes transmitted epidemics on multiplex networks. Phys. Lett. A 378, 770\u2013776 (2014)","key":"37_CR25","DOI":"10.1016\/j.physleta.2014.01.014"}],"container-title":["Communications in Computer and Information Science","Dependability in Sensor, Cloud, and Big Data Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-1304-6_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T16:39:57Z","timestamp":1710347997000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-1304-6_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811513039","9789811513046"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-1304-6_37","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"5 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DependSys","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dependsys2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dependsys.org\/DependSys2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Open","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"112","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}