{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T17:13:59Z","timestamp":1767892439232,"version":"3.49.0"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2007,1,12]],"date-time":"2007-01-12T00:00:00Z","timestamp":1168560000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2007,1,12]],"date-time":"2007-01-12T00:00:00Z","timestamp":1168560000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Geograph Syst"],"published-print":{"date-parts":[[2007,6]]},"DOI":"10.1007\/s10109-006-0039-4","type":"journal-article","created":{"date-parts":[[2007,1,11]],"date-time":"2007-01-11T09:15:41Z","timestamp":1168506941000},"page":"103-117","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":108,"title":["Critical network infrastructure analysis: interdiction and system flow"],"prefix":"10.1007","volume":"9","author":[{"given":"Alan T.","family":"Murray","sequence":"first","affiliation":[]},{"given":"Timothy C.","family":"Matisziw","sequence":"additional","affiliation":[]},{"given":"Tony H.","family":"Grubesic","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,1,12]]},"reference":[{"key":"39_CR1","unstructured":"Abilene (2005) http:\/\/www.abilene.internet2.edu\/"},{"key":"39_CR2","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1038\/35019019","volume":"406","author":"R Albert","year":"2000","unstructured":"Albert R, Jeong H, Barabasi AL (2000) Error and attack tolerance of complex networks. Nature 406:378\u2013382","journal-title":"Nature"},{"key":"39_CR3","doi-asserted-by":"crossref","first-page":"025103","DOI":"10.1103\/PhysRevE.69.025103","volume":"69","author":"R Albert","year":"2004","unstructured":"Albert R, Albert I, Nakarado GL (2004) Structural vulnerability of the North American power grid. Phys Rev E 69:025103(R)","journal-title":"Phys Rev E"},{"key":"39_CR4","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/0167-6377(89)90003-5","volume":"8","author":"MO Ball","year":"1989","unstructured":"Ball MO, Golden BL, Vohra RV (1989) Finding the most vital arcs in a network. Oper Res Lett 8:73\u201376","journal-title":"Oper Res Lett"},{"key":"39_CR5","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/S0378-4371(00)00018-2","volume":"281","author":"AL Barabasi","year":"2000","unstructured":"Barabasi AL, Albert R, Jeong H (2000) Scale-free characteristics of random networks: the topology of the worldwide web. Physica A 281:69\u201377","journal-title":"Physica A"},{"key":"39_CR6","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1016\/S0378-4371(01)00369-7","volume":"299","author":"AL Barabasi","year":"2001","unstructured":"Barabasi AL, Ravasz E, Vicsek T (2001) Deterministic scale-free networks. Physica A 299:559\u2013564","journal-title":"Physica A"},{"key":"39_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TCOM.1964.1088883","volume":"12","author":"P Baran","year":"1964","unstructured":"Baran P (1964) On distributed communications networks. IEEE Trans Commun Syst 12:1\u20139","journal-title":"IEEE Trans Commun Syst"},{"key":"39_CR8","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1016\/S0191-2615(99)00042-9","volume":"34","author":"MGH Bell","year":"2000","unstructured":"Bell MGH (2000) A game theory approach to measuring the performance reliability of transport networks. Transport Res B 34:533\u2013545","journal-title":"Transport Res B"},{"key":"39_CR9","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/S0166-218X(96)00117-5","volume":"76","author":"J Carlier","year":"1997","unstructured":"Carlier J, Li Y, Lutton J (1997) Reliability evaluation of large telecommunication networks. Discret Appl Math 76:61\u201380","journal-title":"Discret Appl Math"},{"key":"39_CR10","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1063\/1.1505810","volume":"12","author":"BA Carreras","year":"2002","unstructured":"Carreras BA, Lynch VE, Dobson I, Newman DE (2002) Critical points and transitions in an electric power transmission model for cascading failure blackouts. Chaos 12:985\u2013994","journal-title":"Chaos"},{"key":"39_CR11","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1016\/j.physa.2005.02.051","volume":"355","author":"DP Chassin","year":"2005","unstructured":"Chassin DP, Posse C (2005) Evaluating North American electric grid reliability using the Barabasi-Albert Network Model. Physica A 355:667\u2013677","journal-title":"Physica A"},{"key":"39_CR12","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1111\/j.1467-8306.2004.00410.x","volume":"94","author":"RL Church","year":"2004","unstructured":"Church RL, Scaparra MP, Middleton RS (2004) Identifying critical infrastructure: the median and covering facility interdiction problems. Ann Assoc Am Geograph 94:491\u2013502","journal-title":"Ann Assoc Am Geograph"},{"key":"39_CR14","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1287\/mnsc.21.3.362","volume":"21","author":"HW Corley","year":"1974","unstructured":"Corley HW, Chang H (1974) Finding the n most vital nodes in a flow network. Manage Sci 21:362\u2013364","journal-title":"Manage Sci"},{"key":"39_CR15","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/0167-6377(82)90020-7","volume":"1","author":"HW Corley","year":"1982","unstructured":"Corley HW, Sha DY (1982) Most vital links and nodes in weighted networks. Oper Res Lett 1:157\u2013360","journal-title":"Oper Res Lett"},{"key":"39_CR16","doi-asserted-by":"crossref","first-page":"045104","DOI":"10.1103\/PhysRevE.69.045104","volume":"69","author":"P Crucitti","year":"2004","unstructured":"Crucitti P, Latora V, Marchiori M (2004) Model for cascading failures in complex networks. Phys Rev E 69:045104(R)","journal-title":"Phys Rev E"},{"key":"39_CR18","unstructured":"Department of Homeland Security (DHS) (2004) Sharing information to protect the economy. URL: http:\/\/www.dhs.gov\/dhspublic\/interapp\/editorial\/editorial_0566.xml"},{"key":"39_CR19","unstructured":"Department of Homeland Security (DHS) (2005) Sharing information to protect the economy. URL: http:\/\/www.dhs.gov\/dhspublic\/display?theme\u00a0=\u00a073&content\u00a0=\u00a01375"},{"key":"39_CR20","doi-asserted-by":"publisher","first-page":"14497","DOI":"10.1073\/pnas.0501426102","volume":"102","author":"JC Doyle","year":"2005","unstructured":"Doyle JC, Alderson DL, Li L, Low S, Roughan M, Shalunov S, Tanaka R, Willinger W (2005) The \u2018robust yet fragile\u2019 nature of the Internet. Proc Natl Acad Sci 102:14497\u201314502","journal-title":"Proc Natl Acad Sci"},{"key":"39_CR21","unstructured":"Executive Order 1995\u2014Critical Infrastructure Protection. Federal Register, July 17, 1996. vol 61, no. 138. pp 37347\u201337350. Reference is on p 37347"},{"key":"39_CR22","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1111\/j.1467-8306.2006.00499.x","volume":"96","author":"TH Grubesic","year":"2006","unstructured":"Grubesic TH, Murray AT (2006) Vital nodes, interconnected infrastructures and the geographies of network reliability. Ann Assoc Am Geograph 96:64\u201383","journal-title":"Ann Assoc Am Geograph"},{"key":"39_CR23","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/S0736-5853(02)00003-5","volume":"20","author":"TH Grubesic","year":"2003","unstructured":"Grubesic TH, O\u2019Kelly ME, Murray AT (2003) A geographic perspective on commercial Internet survivability. Telemat Inform 20:51\u201369","journal-title":"Telemat Inform"},{"key":"39_CR24","volume-title":"Reliability and vulnerability in critical infrastructure: a quantitative geographic perspective","author":"TH Grubesic","year":"2006","unstructured":"Grubesic TH, Murray AT, Mefford J (2006) Continuity in critical network infrastructures: accounting for nodal disruptions. In: Murray A, Grubesic T (eds) Reliability and vulnerability in critical infrastructure: a quantitative geographic perspective. Springer, Heidelberg"},{"key":"39_CR25","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1111\/j.1538-4632.1996.tb00937.x","volume":"28","author":"MJ Hodgson","year":"1996","unstructured":"Hodgson MJ, Rosing KE, Zhang J (1996) Locating vehicle inspection stations to protect a transportation network. Geograph Anal 28:299\u2013314","journal-title":"Geograph Anal"},{"key":"39_CR26","doi-asserted-by":"crossref","first-page":"056109","DOI":"10.1103\/PhysRevE.65.056109","volume":"65","author":"P Holme","year":"2002","unstructured":"Holme P, Kim BJ, Yoon CN, Han SK (2002) Attack vulnerability of complex networks. Phys Rev E 65:056109","journal-title":"Phys Rev E"},{"key":"39_CR27","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1002\/bltj.10093","volume":"8","author":"DJ Houck","year":"2004","unstructured":"Houck DJ, Kim E, O\u2019Reilly GP, Picklesimer DD, Uzunalioglu H (2004) A network survivability model for critical national infrastructures. Bell Labs Tech J 8:153\u2013172","journal-title":"Bell Labs Tech J"},{"key":"39_CR28","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.ejor.2003.06.017","volume":"160","author":"J Kalvenes","year":"2004","unstructured":"Kalvenes J, Kennington J, Olinick E (2004) Hierarchical cellular network design with channel allocation. Eur J OperRes 160:3\u201318","journal-title":"Eur J OperRes"},{"key":"39_CR29","doi-asserted-by":"crossref","first-page":"015103","DOI":"10.1103\/PhysRevE.71.015103","volume":"71","author":"V Latora","year":"2005","unstructured":"Latora V, Marchiori M (2005) Vulnerability and protection of infrastructure networks. Phys Rev E 71:015103(R)","journal-title":"Phys Rev E"},{"key":"39_CR30","unstructured":"Matisziw TC, Murray AT, Grubesic TH (2005). Assessing network interdiction and potential risk to O\u2013D interaction (submitted for publication)"},{"key":"39_CR31","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1016\/S0377-2217(03)00135-8","volume":"156","author":"Y-S Myung","year":"2004","unstructured":"Myung Y-S, Kim H-J (2004) A cutting plane algorithm for computing k-edge survivability of a network. Eur J Oper Res 156:579\u2013589","journal-title":"Eur J Oper Res"},{"key":"39_CR32","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/S0304-3975(02)00438-3","volume":"296","author":"E Nardellia","year":"2003","unstructured":"Nardellia E, Proiettia G, Widmayer P (2003) Finding the most vital node of a shortest path. Theor Comput Sci 296:167\u2013177","journal-title":"Theor Comput Sci"},{"key":"39_CR33","unstructured":"Office of Management and Budget (OMB) (2006). Homeland security. URL: http:\/\/www.whitehouse.gov\/omb\/pdf\/Homeland-06.pdf"},{"key":"39_CR34","unstructured":"Palmer CR, Siganos G, Faloutsos M, Faloutsos C, Gibbons PB (2001) The connectivity and fault-tolerance of the Internet topology. URL: http:\/\/citeseer.ist.psu.edu\/444798.html"},{"key":"39_CR35","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1287\/mnsc.21.5.531","volume":"2","author":"HD Ratliff","year":"1975","unstructured":"Ratliff HD, Sicilia GT, Lubore SH (1975) Finding the n most vital links in flow networks. Manage Sci 2:531\u2013539","journal-title":"Manage Sci"},{"issue":"7","key":"39_CR36","doi-asserted-by":"publisher","first-page":"585","DOI":"10.2307\/2589113","volume":"107","author":"CS ReVelle","year":"2000","unstructured":"ReVelle CS, Rosing KE (2000) Defendens imperium Romanum: a classical problem in military strategy. Am Math Mon 107(7):585\u2013594","journal-title":"Am Math Mon"},{"key":"39_CR37","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1109\/TPWRS.2004.825888","volume":"19","author":"J Salmeron","year":"2004","unstructured":"Salmeron J, Wood K, Baldick R (2004) Analysis of electric grid security under terrorist threat. IEEE Trans Pow Syst 19:905\u2013912","journal-title":"IEEE Trans Pow Syst"},{"key":"39_CR38","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1023\/A:1015445501694","volume":"20","author":"S Soni","year":"2000","unstructured":"Soni S, Pirkul H (2000) Design of survivable networks with connectivity requirements. Telecommun Syst 20:133\u2013149","journal-title":"Telecommun Syst"},{"key":"39_CR39","unstructured":"White House (2003) The national strategy for the physical protection of critical infrastructures and key assets. URL: http:\/\/www.whitehouse.gov\/pcipb\/physical_strategy.pdf"},{"key":"39_CR40","doi-asserted-by":"publisher","first-page":"934","DOI":"10.1287\/opre.12.6.934","volume":"12","author":"R Wollmer","year":"1964","unstructured":"Wollmer R (1964) Removing arcs from a network. Oper Res 12:934\u2013940","journal-title":"Oper Res"},{"key":"39_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0895-7177(93)90236-R","volume":"17","author":"KR Wood","year":"1993","unstructured":"Wood KR (1993) Deterministic network interdiction. Math Comput Modell 17:1\u201318","journal-title":"Math Comput Modell"}],"container-title":["Journal of Geographical Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10109-006-0039-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10109-006-0039-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10109-006-0039-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10109-006-0039-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T19:39:11Z","timestamp":1652729951000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10109-006-0039-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,1,12]]},"references-count":39,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2007,6]]}},"alternative-id":["39"],"URL":"https:\/\/doi.org\/10.1007\/s10109-006-0039-4","relation":{},"ISSN":["1435-5930","1435-5949"],"issn-type":[{"value":"1435-5930","type":"print"},{"value":"1435-5949","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,1,12]]},"assertion":[{"value":"8 November 2006","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 December 2006","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2007","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}