{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T12:25:16Z","timestamp":1765974316507,"version":"3.37.3"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2014,12,20]],"date-time":"2014-12-20T00:00:00Z","timestamp":1419033600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cent Eur J Oper Res"],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1007\/s10100-014-0375-2","type":"journal-article","created":{"date-parts":[[2014,12,19]],"date-time":"2014-12-19T09:13:53Z","timestamp":1418980433000},"page":"345-356","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Applications of the inverse infection problem on bank transaction networks"],"prefix":"10.1007","volume":"23","author":[{"given":"Andr\u00e1s","family":"B\u00f3ta","sequence":"first","affiliation":[]},{"given":"Andr\u00e1s","family":"Csernenszky","sequence":"additional","affiliation":[]},{"given":"Lajos","family":"Gy\u0151rffy","sequence":"additional","affiliation":[]},{"given":"Gyula","family":"Kov\u00e1cs","sequence":"additional","affiliation":[]},{"given":"Mikl\u00f3s","family":"Kr\u00e9sz","sequence":"additional","affiliation":[]},{"given":"Andr\u00e1s","family":"Pluh\u00e1r","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,20]]},"reference":[{"key":"375_CR1","unstructured":"B\u00f3ta A, Csizmadia L, Pluh\u00e1r A (2010) Community detection and its use in Real Graphs. Proceedings of the 2010 Mini-Conference on Applied Theoretical Computer Science - MATCOS 10, 95\u201399"},{"key":"375_CR2","doi-asserted-by":"crossref","first-page":"37","DOI":"10.14232\/actacyb.21.1.2013.4","volume":"21","author":"A B\u00f3ta","year":"2013","unstructured":"B\u00f3ta A, Kr\u00e9sz M, Pluh\u00e1r A (2013) Approximations of the generalized cascade model. Acta Cybern 21:37\u201351","journal-title":"Acta Cybern"},{"key":"375_CR3","doi-asserted-by":"crossref","unstructured":"B\u00f3ta A, Kr\u00e9sz M, Pluh\u00e1r A (2014) The inverse infection problem. In: Proceedings of the 2014 Federated Conference on Computer Science and Information Systems. IEEE, pp 75\u201383. http:\/\/dx.doi.org\/10.15439\/978-83-60810-58-3","DOI":"10.15439\/978-83-60810-58-3"},{"issue":"2","key":"375_CR4","first-page":"115","volume":"1","author":"A B\u00f3ta","year":"2011","unstructured":"B\u00f3ta A, Kr\u00e9sz M, Pluh\u00e1r A (2011) Systematic learning of edge probabilities in the Domingos-Richardson model. Int J Complex Syst Sci 1(2):115\u2013118","journal-title":"Int J Complex Syst Sci"},{"key":"375_CR5","unstructured":"Csernenszky A, Kov\u00e1cs Gy, Kr\u00e9sz M, Pluh\u00e1r A, T\u00f3th T (2009) The use of infection models in accounting and crediting. Challenges for analysis of the economy, the businesses, and social progress, Szeged, 617\u2013623"},{"key":"375_CR6","doi-asserted-by":"crossref","unstructured":"Cao T, Wu X, Hu TX, Wang S (2011) Active learning of model parameters for influence maximization. Lecture notes in computer science, machine learning and knowledge discovery in databases, Springer, Berlin, pp 280\u2013295","DOI":"10.1007\/978-3-642-23780-5_28"},{"key":"375_CR7","doi-asserted-by":"crossref","unstructured":"Chen W, Yuan Y, Zhang L (2010) Scalable influence maximization in social networks under the linear threshold model. Proceedings of the ICDM \u201910 proceedings of the 2010 IEEE International Conference on Data Mining, IEEE Computer Society, pp 88\u201397","DOI":"10.1109\/ICDM.2010.118"},{"key":"375_CR8","doi-asserted-by":"crossref","unstructured":"Chen W, Wang C, Wang Y (2010) Scalable influence maximization for prevalent viral marketing in large-scale social networks. Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, pp 1029\u20131038","DOI":"10.1145\/1835804.1835934"},{"key":"375_CR9","unstructured":"Diekmann O, Heesterbeek JAP (2000) Mathematical epidemiology of infectious diseases, vol 146. Wiley, Chichester"},{"key":"375_CR10","unstructured":"Domingos P, Richardson M (2001) Mining the network value of costumers. Proceedings of the 7th International Conference on Knowledge Discovery and Data Mining, ACM, pp 57\u201366"},{"key":"375_CR11","doi-asserted-by":"crossref","unstructured":"Goyal A, Bonchi F, Lakshmanan LVS (2010) Learning influence probabilities in social networks. Proceedings of the third ACM International Conference on Web search and data mining. ACM, pp 241\u2013250","DOI":"10.1145\/1718487.1718518"},{"issue":"6","key":"375_CR12","doi-asserted-by":"crossref","first-page":"1420","DOI":"10.1086\/226707","volume":"83","author":"M Granovetter","year":"1978","unstructured":"Granovetter M (1978) Threshold models of collective behavior. Am J Sociol 83(6):1420\u20131443","journal-title":"Am J Sociol"},{"issue":"4","key":"375_CR13","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1109\/TSMCC.2006.875410","volume":"36","author":"J Kennedy","year":"2006","unstructured":"Kennedy J, Mendes R (2006) Neighborhood topologies in fully informed and best-of-neighborhood particle swarms. IEEE Trans Syst Man Cybern Part C Appl Rev 36(4):515\u2013519","journal-title":"IEEE Trans Syst Man Cybern Part C Appl Rev"},{"key":"375_CR14","doi-asserted-by":"crossref","unstructured":"Kempe D, Kleinberg J, Tardos E (2003) Maximizing the spread of influence though a social network. Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, pp 137\u2013146","DOI":"10.1145\/956750.956769"},{"key":"375_CR15","doi-asserted-by":"crossref","unstructured":"Kempe D, Kleinberg J, Tardos E (2005) Influential nodes in a diffusion model for social networks. Proceedings of the 32nd International Colloquium on Automata, Languages and Programming (ICALP), Springer, pp 1127\u20131138","DOI":"10.1007\/11523468_91"},{"key":"375_CR16","doi-asserted-by":"crossref","unstructured":"Kimura M, Saito K (2006) Tractable models for information diffusion in social networks. Lecture notes in computer science, Knowledge Discovery in Databases, Springer, Berlin, pp 259\u2013271","DOI":"10.1007\/11871637_27"},{"key":"375_CR17","unstructured":"Kr\u00e9sz M, Pluh\u00e1r A (2014) Prediction of economic and social events by infection processes. Encyclopedia of social network analysis and mining, Springer"}],"container-title":["Central European Journal of Operations Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10100-014-0375-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10100-014-0375-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10100-014-0375-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T05:49:33Z","timestamp":1559108973000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10100-014-0375-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,20]]},"references-count":17,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,6]]}},"alternative-id":["375"],"URL":"https:\/\/doi.org\/10.1007\/s10100-014-0375-2","relation":{},"ISSN":["1435-246X","1613-9178"],"issn-type":[{"type":"print","value":"1435-246X"},{"type":"electronic","value":"1613-9178"}],"subject":[],"published":{"date-parts":[[2014,12,20]]}}}