{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:53:15Z","timestamp":1774367595742,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T00:00:00Z","timestamp":1710201600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T00:00:00Z","timestamp":1710201600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s00607-024-01273-2","type":"journal-article","created":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T01:14:44Z","timestamp":1710292484000},"page":"1845-1872","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Employing topology modification strategies in scale-free IoT networks for robustness optimization"],"prefix":"10.1007","volume":"106","author":[{"given":"Zahoor Ali","family":"Khan","sequence":"first","affiliation":[]},{"given":"Muhammad","family":"Awais","sequence":"additional","affiliation":[]},{"given":"Turki Ali","family":"Alghamdi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3777-8249","authenticated-orcid":false,"given":"Nadeem","family":"Javaid","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,12]]},"reference":[{"key":"1273_CR1","doi-asserted-by":"crossref","unstructured":"Thangaramya K, Kulothungan K, Logambigai R, Selvi M, Ganap- athy S, Kannan A (2019) Energy aware cluster and neuro-fuzzy based routing algorithm for wireless sensor networks in IoT. Comput Netw 211\u2013223","DOI":"10.1016\/j.comnet.2019.01.024"},{"issue":"7","key":"1273_CR2","doi-asserted-by":"publisher","first-page":"2658","DOI":"10.3390\/s22072658","volume":"22","author":"SM Abbas","year":"2022","unstructured":"Abbas SM, Javaid N, Azar AT, Qasim U, Khan ZA, Aslam S (2022) Towards enhancing the robustness of scale-free IoT networks by an intelligent rewiring mechanism. Sensors 22(7):2658","journal-title":"Sensors"},{"key":"1273_CR3","unstructured":"Khan MA, Javaid N, Gulfam SM (2021) Towards attack resilience of scale-free IoT networks with topology modifications. MS Thesis, Department of Electrical and Computer Engineering, COMSATS University Islamabad, Islamabad Pakistan. https:\/\/www.researchgate.net\/publication\/355466975_Towards_Attack_Resilience_of_Scale-Free_IoT_Networks_with_Topology_Modifications_MS_Thesis_without_Source_Codes"},{"key":"1273_CR4","doi-asserted-by":"publisher","first-page":"139739","DOI":"10.1109\/ACCESS.2021.3118948","volume":"9","author":"S Abbas","year":"2021","unstructured":"Abbas S, Javaid N, Almogren A, Gulfam SM, Ahmed A, Radwan A (2021) Securing genetic algorithm enabled SDN routing for blockchain based internet of things. IEEE Access 9:139739\u2013139754","journal-title":"IEEE Access"},{"key":"1273_CR5","doi-asserted-by":"crossref","unstructured":"Gong Y, Yu Q (2019) Evolution of conformity dynamics in complex social networks. Symmetry 1\u2013299","DOI":"10.3390\/sym11030299"},{"key":"1273_CR6","doi-asserted-by":"crossref","unstructured":"Luo D, Qiu T, Deonauth N, Zhao A (2015) A small world model for improving robustness of heterogeneous networks. In: 2015 IEEE global conference on signal and information processing (GlobalSIP), pp 849-852","DOI":"10.1109\/GlobalSIP.2015.7418317"},{"key":"1273_CR7","doi-asserted-by":"crossref","unstructured":"Broido AD, Clauset A (2019) Scale-free networks are rare. Nat Commun 1\u201310","DOI":"10.1038\/s41467-019-08746-5"},{"key":"1273_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2021.12.013","volume":"185","author":"MA Khan","year":"2022","unstructured":"Khan MA, Javaid N (2022) Computationally efficient topology optimization of scale-free IoT networks. Comput Commun 185:1\u201312","journal-title":"Comput Commun"},{"issue":"8","key":"1273_CR9","doi-asserted-by":"publisher","first-page":"5848","DOI":"10.3390\/e17085848","volume":"17","author":"S Aparicio","year":"2015","unstructured":"Aparicio S, Villaz\u00f3n-Terrazas J, \u00c1lvarez G (2015) A model for scale-free networks: application to twitter. Entropy 17(8):5848\u20135867","journal-title":"Entropy"},{"issue":"1","key":"1273_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1504\/IJWGS.2022.119267","volume":"18","author":"TN Qureshi","year":"2022","unstructured":"Qureshi TN, Javaid N, Almogren A, Khan AU, Almajed H, Mohiuddin I (2022) An adaptive enhanced differential evolution strategies for topology robustness in internet of things. Int J Web Grid Serv 18(1):1\u201333","journal-title":"Int J Web Grid Serv"},{"issue":"4","key":"1273_CR11","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1504\/IJWGS.2021.118400","volume":"17","author":"TN Qureshi","year":"2021","unstructured":"Qureshi TN, Javaid N, Almogren A, Abubaker Z, Almajed H, Mohiuddin I (2021) Attack resistance-based topology robustness of scale-free internet of things for smart cities. Int J Web Grid Serv 17(4):343\u2013370","journal-title":"Int J Web Grid Serv"},{"key":"1273_CR12","doi-asserted-by":"crossref","unstructured":"Qiu T, Liu J, Si W, Han M, Ning H, Atiquzzaman M (2017) A data-driven robustness algorithm for the internet of things in smart cities. IEEE Commun Mag 18\u201323","DOI":"10.1109\/MCOM.2017.1700247"},{"key":"1273_CR13","doi-asserted-by":"crossref","unstructured":"Qiu T, Liu J, Si W, Wu DO (2019) Robustness optimization scheme with multi-population co-evolution for scale-free wireless sensor networks. IEEE ACM Trans Netw 1028\u20131042","DOI":"10.1109\/TNET.2019.2907243"},{"key":"1273_CR14","doi-asserted-by":"crossref","unstructured":"Buesser P, Daolio F, Tomassini M (2011) Optimizing the robustness of scale-free networks with simulated annealing. In: International conference on adaptive and natural computing algorithms, pp 167\u2013176","DOI":"10.1007\/978-3-642-20267-4_18"},{"key":"1273_CR15","doi-asserted-by":"crossref","unstructured":"Qiu T, Zhao A, Xia F, Si W, Wu DO (2017) ROSE: robustness strategy for scale-free wireless sensor networks. IEEE ACM Trans Netw 2944\u20132959","DOI":"10.1109\/TNET.2017.2713530"},{"key":"1273_CR16","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1016\/j.physa.2018.02.173","volume":"503","author":"L Rong","year":"2018","unstructured":"Rong L, Liu J (2018) A heuristic algorithm for enhancing the robustness of scale-free networks based on edge classification. Physica A 503:503\u2013515","journal-title":"Physica A"},{"issue":"2","key":"1273_CR17","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/TMBMC.2019.2900650","volume":"4","author":"S Roy","year":"2018","unstructured":"Roy S, Shah VK, Das SK (2018) Design of robust and efficient topology using enhanced gene regulatory networks. IEEE Trans Mol Biol Multi-Scale Commun 4(2):73\u201387","journal-title":"IEEE Trans Mol Biol Multi-Scale Commun"},{"key":"1273_CR18","doi-asserted-by":"crossref","unstructured":"Khan MA, Javaid N, Javaid S, Naseer N, Imran M (2020) Cooperative novel link selection mechanism for enhancing the robustness in scale free IoT networks. In: 16th international wireless communications and mobile computing conference (IWCMC), pp 1\u20136","DOI":"10.1109\/IWCMC48107.2020.9148135"},{"key":"1273_CR19","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1016\/j.physa.2019.02.046","volume":"523","author":"I Sohn","year":"2019","unstructured":"Sohn I (2019) A robust complex network generation method based on neural networks. Physica A 523:593\u2013601","journal-title":"Physica A"},{"key":"1273_CR20","doi-asserted-by":"crossref","unstructured":"Chen J, Chen L, Chen Y, Zhao M, Yu S, Xuan Q, Yang X (2019) Ga-based q-attack on community detection. IEEE Trans Comput Soc Syst 491\u2013503","DOI":"10.1109\/TCSS.2019.2912801"},{"key":"1273_CR21","doi-asserted-by":"crossref","unstructured":"Fu X, Yang Y, Postolache O (2018) Invulnerability of clustering wireless sensor networks against cascading failures. IEEE Syst J 1431\u20131442","DOI":"10.1109\/JSYST.2018.2849779"},{"key":"1273_CR22","doi-asserted-by":"crossref","unstructured":"Elhosseini MA, El Sehiemy RA, Rashwan YI, Gao XZ (2019) On the performance improvement of elephant herding optimization algorithm. Knowl Based Syst 58\u201370","DOI":"10.1016\/j.knosys.2018.12.012"},{"key":"1273_CR23","doi-asserted-by":"crossref","unstructured":"Qiu T, Li B, Qu W, Ahmed E, Wang X (2018) TOSG: a topology optimization scheme with global small world for industrial heterogeneous internet of things. IEEE Trans Ind Inf 3174\u20133184","DOI":"10.1109\/TII.2018.2872579"},{"key":"1273_CR24","doi-asserted-by":"crossref","unstructured":"Zhang C, Jia B, Hao L (2019) A multi-objective service selection method based on ant colony optimization for QoE restrictions in the internet of things. In: International conference on security and privacy in new computing environments, pp 342\u2013353","DOI":"10.1007\/978-3-030-21373-2_26"},{"key":"1273_CR25","doi-asserted-by":"crossref","unstructured":"Li X, Chen G (2003) A local-world evolving network model statistical mechanics and its applications. Physica A 274\u2013286","DOI":"10.1016\/S0378-4371(03)00604-6"},{"key":"1273_CR26","doi-asserted-by":"crossref","unstructured":"Herrmann HJ, Schneider CM, Moreira AA, Andrade Jr JS, Havlin S (2011) Onion-like network topology enhances robustness against malicious attacks. J Stat Mech Theory Exp 10\u201327","DOI":"10.1088\/1742-5468\/2011\/01\/P01027"},{"key":"1273_CR27","doi-asserted-by":"crossref","unstructured":"Yang Y, Li Z, Chen Y, Zhang X, Wang S (2015) Improving the robustness of complex networks with preserving community structure. PloS ONE 1\u201314","DOI":"10.1371\/journal.pone.0116551"},{"key":"1273_CR28","doi-asserted-by":"crossref","unstructured":"Yang Z, Liu J (2018) Robustness of scale-free networks with various parameters against cascading failures. Stat Mech Appl Physica A 628\u2013638","DOI":"10.1016\/j.physa.2017.09.093"},{"key":"1273_CR29","doi-asserted-by":"crossref","unstructured":"Liu X, Sun S, Wang J, Xia C (2019) Onion structure optimizes attack robustness of interdependent networks. Stat Mech its Appl Physica A 122\u2013374","DOI":"10.1016\/j.physa.2019.122374"},{"key":"1273_CR30","unstructured":"Brax N, Amblard F (2018) A self-repairing solution for the resilience of networks to attacks and failures, pp 1\u201312"},{"key":"1273_CR31","doi-asserted-by":"crossref","unstructured":"Poongodi T, Khan MS, Patan R, Gandomi AH, Balusamy B (2019) Robust defense scheme against selective drop attack in wireless Ad Hoc networks. IEEE Access 18409\u201318419","DOI":"10.1109\/ACCESS.2019.2896001"},{"key":"1273_CR32","doi-asserted-by":"crossref","unstructured":"Zhong J, Zhang F, Li Z (2018) Identification of vital nodes in complex network via belief propagation and node reinsertion. IEEE Access 29200\u201329210","DOI":"10.1109\/ACCESS.2018.2843532"},{"issue":"1","key":"1273_CR33","doi-asserted-by":"publisher","first-page":"7559","DOI":"10.1038\/s41598-017-07878-2","volume":"7","author":"J Wu","year":"2017","unstructured":"Wu J, Tan SY, Liu Z, Tan YJ, Lu X (2017) Enhancing structural robustness of scale-free networks by information disturbance. Sci Rep 7(1):7559","journal-title":"Sci Rep"},{"key":"1273_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2022.127427","volume":"599","author":"F Liao","year":"2022","unstructured":"Liao F, Hayashi Y (2022) Emergence of robust and efficient networks in a family of attachment models. Physica A 599:127427","journal-title":"Physica A"},{"key":"1273_CR35","first-page":"1","volume-title":"Elements of information theory","author":"TM Cover","year":"2012","unstructured":"Cover TM, Thomas JA (2012) Elements of information theory. Wiley, New York, pp 1\u2013774"},{"issue":"1","key":"1273_CR36","doi-asserted-by":"publisher","first-page":"1186","DOI":"10.2991\/ijcis.10.1.78","volume":"10","author":"J Arellano-Verdejo","year":"2017","unstructured":"Arellano-Verdejo J, Godoy-Calderon S, Alonso-Pecina F, Arenas AG, Cruz-Chavez MA (2017) A new efficient entropy population merging parallel model for evolutionary algorithms. Int J Comput Intell Syst 10(1):1186\u20131197","journal-title":"Int J Comput Intell Syst"},{"key":"1273_CR37","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.comcom.2020.04.007","volume":"157","author":"S Hu","year":"2020","unstructured":"Hu S, Li G (2020) TMSE: a topology modification strategy to enhance the robustness of scale-free wireless sensor networks. Comput Commun 157:53\u201363","journal-title":"Comput Commun"},{"issue":"1","key":"1273_CR38","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4673","volume":"34","author":"Y Xu","year":"2023","unstructured":"Xu Y, Mohammed AH (2023) An energy-aware resource management method in cloud-based Internet of Things using a multi-objective algorithm and crowding distance. Trans Emerg Telecommun Technol 34(1):e4673","journal-title":"Trans Emerg Telecommun Technol"},{"key":"1273_CR39","doi-asserted-by":"crossref","unstructured":"Zhang H, Mi Y, Liu X, Zhang Y, Wang J, Tan J (2023) A differential game approach for real-time security defense decision in scale-free networks. Comput Netw 109635","DOI":"10.1016\/j.comnet.2023.109635"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-024-01273-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00607-024-01273-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-024-01273-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T18:10:17Z","timestamp":1717092617000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00607-024-01273-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,12]]},"references-count":39,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["1273"],"URL":"https:\/\/doi.org\/10.1007\/s00607-024-01273-2","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,12]]},"assertion":[{"value":"12 August 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 February 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}