{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T01:24:23Z","timestamp":1767317063835,"version":"3.48.0"},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819556564","type":"print"},{"value":"9789819556571","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-5657-1_2","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T01:19:49Z","timestamp":1767316789000},"page":"14-25","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Maximal Independent Set Heuristic for\u00a0the\u00a0Stochastic Critical Node Detection Problem"],"prefix":"10.1007","author":[{"given":"Tuguldur","family":"Bayarsaikhan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6289-567X","authenticated-orcid":false,"given":"Altannar","family":"Chinchuluun","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9772-5523","authenticated-orcid":false,"given":"Ashwin","family":"Arulselvan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Arulselvan, A., Chinchuluun, A.: Identifying critical nodes in a network. In: Balomenos, K.P., Fytopoulos, A., Pardalos, P.M. (eds.) Handbook for Management of Threats: Security and Defense, Resilience and Optimal Strategies, pp. 325\u2013339. Springer International Publishing (2023)","DOI":"10.1007\/978-3-031-39542-0_16"},{"key":"2_CR2","doi-asserted-by":"publisher","first-page":"2193","DOI":"10.1016\/j.cor.2008.08.016","volume":"36","author":"A Arulselvan","year":"2009","unstructured":"Arulselvan, A., Commander, C.W., Elefteriadou, L., Pardalos, P.M.: Detecting critical nodes in sparse graphs. Comput. Oper. Res. 36, 2193\u20132200 (2009)","journal-title":"Comput. Oper. Res."},{"issue":"2","key":"2_CR3","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1287\/opre.2020.2014","volume":"69","author":"A Baggio","year":"2021","unstructured":"Baggio, A., Carvalho, M., Lodi, A., Tramontani, A.: Multilevel approaches for the critical node problem. Oper. Res. 69(2), 486\u2013508 (2021)","journal-title":"Oper. Res."},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Barab\u00e1si, A.L., Albert, R., Jeong, H.: Scale-free characteristics of random networks: The topology of the world-wide web. Physica A (2000)","DOI":"10.1016\/S0378-4371(00)00018-2"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Bernstein, A., Bienstock, D., Hay, D., Uzunoglu, M., Zussman, G.: Power grid vulnerability to geographically correlated failures: Analysis and control implications. In: Proceedings of the IEEE INFOCOM, pp. 2634\u20132642 (2014)","DOI":"10.1109\/INFOCOM.2014.6848211"},{"key":"2_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2022.112035","volume":"159","author":"SS Chaharborj","year":"2022","unstructured":"Chaharborj, S.S., Nabi, K.N., Feng, K.L., Chaharborj, S.S., Phang, P.S.: Controlling covid-19 transmission with isolation of influential nodes. Chaos, Solitons Fractals 159, 112035 (2022)","journal-title":"Chaos, Solitons Fractals"},{"issue":"12","key":"2_CR7","doi-asserted-by":"publisher","first-page":"1766","DOI":"10.1016\/j.cor.2011.02.016","volume":"38","author":"M Di Summa","year":"2011","unstructured":"Di Summa, M., Grosso, A., Locatelli, M.: Complexity of the critical node problem over trees. Comput. Oper. Res. 38(12), 1766\u20131774 (2011)","journal-title":"Comput. Oper. Res."},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Dinh, T.N., Thai, M.T.: Assessing attack vulnerability in networks with uncertainty. In: IEEE Conference on Computer Communications (INFOCOM), pp. 2380\u20132388 (2015)","DOI":"10.1109\/INFOCOM.2015.7218626"},{"key":"2_CR9","first-page":"17","volume":"5","author":"P Erd\u0151s","year":"1960","unstructured":"Erd\u0151s, P., R\u00e9nyi, A.: On the evolution of random graphs. Publ. Math. Inst. Hung. Acad. Sci. 5, 17\u201361 (1960)","journal-title":"Publ. Math. Inst. Hung. Acad. Sci."},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-642-17458-2_15","volume-title":"Combinatorial Optimization and Applications","author":"N Fan","year":"2010","unstructured":"Fan, N., Pardalos, P.M.: Robust optimization of graph partitioning and critical node detection in analyzing networks. In: Wu, W., Daescu, O. (eds.) Combinatorial Optimization and Applications, pp. 170\u2013183. Springer, Berlin Heidelberg, Berlin, Heidelberg (2010)"},{"issue":"2","key":"2_CR11","doi-asserted-by":"publisher","first-page":"123","DOI":"10.5506\/APhysPolBSupp.4.123","volume":"4","author":"S Ghosh","year":"2011","unstructured":"Ghosh, S., Banerjee, A., Sharma, N., Agarwal, S., Ganguly, N., Mukherjee, A.: Statistical analysis of the Indian railway network: a complex network approach. Acta Phys. Pol. B Proc. Suppl. 4(2), 123\u2013137 (2011)","journal-title":"Acta Phys. Pol. B Proc. Suppl."},{"issue":"3","key":"2_CR12","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1002\/net.21948","volume":"76","author":"P Hosteins","year":"2020","unstructured":"Hosteins, P., Scatamacchia, R.: The stochastic critical node problem over trees. Networks 76(3), 381\u2013401 (2020)","journal-title":"Networks"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J.M., Tardos, \u00c9.: Maximizing the spread of influence through a social network. In: Proceedings of the 9th International Conference on Knowledge Discovery and Data Mining (KDD 2003), pp. 137\u2013146 (2003)","DOI":"10.1145\/956750.956769"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Krause, A., Guestrin, C., Faloutsos, C., VanBriesen, J., Glance, N.: Cost-effective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 420\u2013429 (2007)","DOI":"10.1145\/1281192.1281239"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Lindgren, A., Doria, A., Schel\u00e9n, O.: Probabilistic routing in intermittently connected networks. In: Proceedings of the ACM SIGMOBILE MCCR, pp. 19\u201320 (2003)","DOI":"10.1145\/961268.961272"},{"key":"2_CR16","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.ijdrr.2016.04.011","volume":"17","author":"A Soltani-Sobh","year":"2016","unstructured":"Soltani-Sobh, A., Heaslip, K., Stevanovic, A., El Khoury, J., Song, Z.: Evaluation of transportation network reliability during unexpected events with multiple uncertainties. Int. J. Disast. Risk Reduct. 17, 128\u2013136 (2016)","journal-title":"Int. J. Disast. Risk Reduct."},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Watts, D.J., Strogatz, S.H.: Collective dynamics of small-world networks. Nature 393(6684) (1998)","DOI":"10.1038\/30918"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Weng, J., Lim, E.P., Jiang, J., He, Q.: TwitterRank: finding topic-sensitive influential twitterers. In: Proceedings of the 3rd ACM Int. Conference on Web Search and Data Mining (WSDM 2010), pp. 261\u2013270. ACM, New York, USA (2010)","DOI":"10.1145\/1718487.1718520"}],"container-title":["Lecture Notes in Computer Science","Algorithmic Aspects in Information and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-5657-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T01:19:50Z","timestamp":1767316790000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-5657-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819556564","9789819556571"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-5657-1_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AAIM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithmic Aspects in Information and Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ulaanbaatar","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mongolia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aaim2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.aaim2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}