{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:01Z","timestamp":1763468221199},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2015,1,7]],"date-time":"2015-01-07T00:00:00Z","timestamp":1420588800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Data Min Knowl Disc"],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s10618-014-0399-1","type":"journal-article","created":{"date-parts":[[2015,1,6]],"date-time":"2015-01-06T04:14:24Z","timestamp":1420517664000},"page":"1211-1232","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["MassExodus: modeling evolving networks in harsh environments"],"prefix":"10.1007","volume":"29","author":[{"given":"Saket","family":"Navlakha","sequence":"first","affiliation":[]},{"given":"Christos","family":"Faloutsos","sequence":"additional","affiliation":[]},{"given":"Ziv","family":"Bar-Joseph","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,1,7]]},"reference":[{"key":"399_CR1","doi-asserted-by":"crossref","unstructured":"Acemoglu D, Ozdaglar A, Tahbaz-Salehi A (2013) Systemic risk and stability in financial networks. NBER Working Papers 18727, National Bureau of Economic Research Inc. http:\/\/ideas.repec.org\/p\/nbr\/nberwo\/18727.html","DOI":"10.3386\/w18727"},{"issue":"2","key":"399_CR2","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1007\/s10618-009-0140-7","volume":"19","author":"L Akoglu","year":"2009","unstructured":"Akoglu L, Faloutsos C (2009) Rtg: a recursive realistic graph generator using random typing. Data Min Knowl Discov 19(2):194\u2013209. doi: 10.1007\/s10618-009-0140-7","journal-title":"Data Min Knowl Discov"},{"issue":"11","key":"399_CR3","doi-asserted-by":"crossref","first-page":"3327","DOI":"10.1105\/tpc.107.054700","volume":"19","author":"R Albert","year":"2007","unstructured":"Albert R (2007) Network inference, analysis, and modeling in systems biology. Plant Cell 19(11):3327\u20133338","journal-title":"Plant Cell"},{"issue":"6794","key":"399_CR4","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1038\/35019019","volume":"406","author":"R Albert","year":"2000","unstructured":"Albert R, Jeong H, Barabasi AL (2000) Error and attack tolerance of complex networks. Nature 406(6794):378\u2013382","journal-title":"Nature"},{"issue":"2 Pt 2","key":"399_CR5","doi-asserted-by":"crossref","first-page":"025,103","DOI":"10.1103\/PhysRevE.69.025103","volume":"69","author":"R Albert","year":"2004","unstructured":"Albert R, Albert I, Nakarado GL (2004) Structural vulnerability of the North American power grid. Phys Rev E Stat Nonlinear Soft Matter Phys 69(2 Pt 2):025,103","journal-title":"Phys Rev E Stat Nonlinear Soft Matter Phys"},{"issue":"6","key":"399_CR6","doi-asserted-by":"crossref","first-page":"1742","DOI":"10.1109\/TCSI.2008.922023","volume":"55","author":"C Alippi","year":"2008","unstructured":"Alippi C, Galperti C (2008) An adaptive system for optimal solar energy harvesting in wireless sensor network nodes. IEEE Trans Circuits Syst I 55(6):1742\u20131750. doi: 10.1109\/TCSI.2008.922023","journal-title":"IEEE Trans Circuits Syst I"},{"issue":"1","key":"399_CR7","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1038\/75556","volume":"25","author":"M Ashburner","year":"2000","unstructured":"Ashburner M, Ball CA, Blake JA, Botstein D, Butler H, Cherry JM, Davis AP, Dolinski K, Dwight SS, Eppig JT, Harris MA, Hill DP, Issel-Tarver L, Kasarskis A, Lewis S, Matese JC, Richardson JE, Ringwald M, Rubin GM, Sherlock G (2000) Gene ontology: tool for the unification of biology. The gene ontology consortium. Nat Genet 25(1):25\u201329","journal-title":"Nat Genet"},{"issue":"5439","key":"399_CR8","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"AL Barabasi","year":"1999","unstructured":"Barabasi AL, Albert R (1999) Emergence of scaling in random networks. Science 286(5439):509\u2013512","journal-title":"Science"},{"key":"399_CR9","doi-asserted-by":"crossref","unstructured":"Broder A, Kumar R, Maghoul F, Raghavan P, Rajagopalan S, Stata R, Tomkins A, Wiener J (2000) Graph structure in the web. In: Proceedings of the 9th international world wide web conference on computer networks: the international journal of computer and telecommunications netowrking, North-Holland Publishing Co., Amsterdam, The Netherlands, The Netherlands, pp 309\u2013320. http:\/\/dl.acm.org\/citation.cfm?id=347319.346290","DOI":"10.1016\/S1389-1286(00)00083-9"},{"issue":"7291","key":"399_CR10","doi-asserted-by":"crossref","first-page":"1025","DOI":"10.1038\/nature08932","volume":"464","author":"SV Buldyrev","year":"2010","unstructured":"Buldyrev SV, Parshani R, Paul G, Stanley HE, Havlin S (2010) Catastrophic cascade of failures in interdependent networks. Nature 464(7291):1025\u20131028","journal-title":"Nature"},{"issue":"5","key":"399_CR11","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1038\/nrn3214","volume":"13","author":"E Bullmore","year":"2012","unstructured":"Bullmore E, Sporns O (2012) The economy of brain network organization. Nat Rev Neurosci 13(5):336\u2013349","journal-title":"Nat Rev Neurosci"},{"issue":"2","key":"399_CR12","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MC.2004.1266294","volume":"37","author":"J Carle","year":"2004","unstructured":"Carle J, Simplot-Ryl D (2004) Energy-efficient area monitoring for sensor networks. Computer 37(2):40\u201346","journal-title":"Computer"},{"key":"399_CR13","doi-asserted-by":"crossref","unstructured":"Chakrabarti D, Faloutsos C (2012) Graph mining: laws, tools, and case studies. Synthesis lectures on data mining and knowledge discovery. Morgan & Claypool Publishers, San Rafael, CA","DOI":"10.2200\/S00449ED1V01Y201209DMK006"},{"key":"399_CR14","doi-asserted-by":"crossref","unstructured":"Chan H, Akoglu L, Tong H (2014) Make it or break it: manipulating robustness in large netwotks. In: SIAM International conference on data mining (SDM)","DOI":"10.1137\/1.9781611973440.37"},{"key":"399_CR15","doi-asserted-by":"crossref","unstructured":"Chatr-Aryamontri A, Breitkreutz BJ, Heinicke S, Boucher L, Winter A, Stark C, Nixon J, Ramage L, Kolas N, O\u2019Donnell L, Reguly T, Breitkreutz A, Sellam A, Chen D, Chang C, Rust J, Livstone M, Oughtred R, Dolinski K, Tyers M (2013) The BioGRID interaction database: 2013 update. Nucleic Acids Res 41(Database issue):D816\u2013D823","DOI":"10.1093\/nar\/gks1158"},{"issue":"6138","key":"399_CR16","doi-asserted-by":"crossref","first-page":"1272","DOI":"10.1126\/science.340.6138.1272","volume":"340","author":"A Cho","year":"2013","unstructured":"Cho A (2013) Computer science. Network science at center of surveillance dispute. Science 340(6138):1272","journal-title":"Science"},{"key":"399_CR17","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/s000260300002","volume":"7","author":"F Chung","year":"2003","unstructured":"Chung F, Lu L, Vu V (2003) Eigenvalues of random power law graphs. Ann Comb 7:21\u201333","journal-title":"Ann Comb"},{"issue":"23","key":"399_CR18","doi-asserted-by":"crossref","first-page":"8351","DOI":"10.1073\/pnas.1318469111","volume":"111","author":"M Domenico De","year":"2014","unstructured":"De Domenico M, Sole-Ribalta A, Gomez S, Arenas A (2014) Navigability of interconnected networks under random failures. Proc Natl Acad Sci USA 111(23):8351\u20138356","journal-title":"Proc Natl Acad Sci USA"},{"key":"399_CR19","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511761942","volume-title":"Networks, crowds, and markets: reasoning about a highly connected world","author":"D Easley","year":"2010","unstructured":"Easley D, Kleinberg J (2010) Networks, crowds, and markets: reasoning about a highly connected world. Cambridge University Press, New York, NY"},{"key":"399_CR20","doi-asserted-by":"crossref","unstructured":"Fabrikant A, Luthra A, Maneva E, Papadimitriou CH, Shenker S (2003) On a network creation game. In: Proceedings of the twenty-second annual symposium on principles of distributed computing, ACM, New York, NY, PODC \u201903, pp 347\u2013351. doi: 10.1145\/872035.872088","DOI":"10.1145\/872035.872088"},{"issue":"3","key":"399_CR21","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1007\/BF02579329","volume":"1","author":"Z Fredi","year":"1981","unstructured":"Fredi Z, Komls J (1981) The eigenvalues of random symmetric matrices. Combinatorica 1(3):233\u2013241. doi: 10.1007\/BF02579329","journal-title":"Combinatorica"},{"issue":"19","key":"399_CR22","doi-asserted-by":"crossref","first-page":"5673","DOI":"10.1128\/JB.185.19.5673-5684.2003","volume":"185","author":"SY Gerdes","year":"2003","unstructured":"Gerdes SY, Scholle MD, Campbell JW, Balazsi G, Ravasz E, Daugherty MD, Somera AL, Kyrpides NC, Anderson I, Gelfand MS, Bhattacharya A, Kapatral V, D\u2019Souza M, Baev MV, Grechkin Y, Mseeh F, Fonstein MY, Overbeek R, Barabasi AL, Oltvai ZN, Osterman AL (2003) Experimental determination and system level analysis of essential genes in Escherichia coli MG1655. J Bacteriol 185(19):5673\u20135684","journal-title":"J Bacteriol"},{"issue":"6896","key":"399_CR23","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1038\/nature00935","volume":"418","author":"G Giaever","year":"2002","unstructured":"Giaever G, Chu AM, Ni L, Connelly C et al (2002) Functional profiling of the Saccharomyces cerevisiae genome. Nature 418(6896):387\u2013391","journal-title":"Nature"},{"key":"399_CR24","doi-asserted-by":"crossref","unstructured":"Gidalevitz T, Prahlad V, Morimoto RI (2011) The stress of protein misfolding: from single cells to multicellular organisms. Cold Spring Harb Perspect Biol. doi: 10.1101\/cshperspect.a009704","DOI":"10.1101\/cshperspect.a009704"},{"issue":"6918","key":"399_CR25","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1038\/nature01198","volume":"421","author":"Z Gu","year":"2003","unstructured":"Gu Z, Steinmetz LM, Gu X, Scharfe C, Davis RW, Li WH (2003) Role of duplicate genes in genetic robustness against null mutations. Nature 421(6918):63\u201366","journal-title":"Nature"},{"key":"399_CR26","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1038\/srep00621","volume":"2","author":"O Guell","year":"2012","unstructured":"Guell O, Sagues F, Serrano MA (2012) Predicting effects of structural stress in a genome-reduced model bacterial metabolism. Sci Rep 2:621","journal-title":"Sci Rep"},{"issue":"7330","key":"399_CR27","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1038\/nature09659","volume":"469","author":"AG Haldane","year":"2011","unstructured":"Haldane AG, May RM (2011) Systemic risk in banking ecosystems. Nature 469(7330):351\u2013355","journal-title":"Nature"},{"issue":"7447","key":"399_CR28","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1038\/nature12047","volume":"497","author":"D Helbing","year":"2013","unstructured":"Helbing D (2013) Globally networked risks and how to respond. Nature 497(7447):51\u201359","journal-title":"Nature"},{"issue":"11","key":"399_CR29","doi-asserted-by":"crossref","first-page":"3629","DOI":"10.1093\/nar\/gki678","volume":"33","author":"I Ispolatov","year":"2005","unstructured":"Ispolatov I, Yuryev A, Mazo I, Maslov S (2005) Binding properties and evolution of homodimers in protein\u2013protein interaction networks. Nucleic Acids Res 33(11):3629\u20133635","journal-title":"Nucleic Acids Res"},{"issue":"046","key":"399_CR30","first-page":"132","volume":"64","author":"EM Jin","year":"2001","unstructured":"Jin EM, Girvan M, Newman MEJ (2001) Structure of growing social networks. Phys Rev E 64(046):132. doi: 10.1103\/PhysRevE.64.046132","journal-title":"Phys Rev E"},{"issue":"11","key":"399_CR31","doi-asserted-by":"crossref","first-page":"826","DOI":"10.1038\/nrg1471","volume":"5","author":"H Kitano","year":"2004","unstructured":"Kitano H (2004) Biological robustness. Nat Rev Genet 5(11):826\u2013837","journal-title":"Nat Rev Genet"},{"issue":"2006","key":"399_CR32","first-page":"0022","volume":"2","author":"H Kitano","year":"2006","unstructured":"Kitano H, Oda K (2006) Robustness trade-offs and host-microbial symbiosis in the immune system. Mol Syst Biol 2(2006):0022","journal-title":"Mol Syst Biol"},{"key":"399_CR33","doi-asserted-by":"crossref","unstructured":"Kleinberg JM, Kumar R, Raghavan P, Rajagopalan S, Tomkins AS (1999) The web as a graph: measurements, models, and methods. In: Proceedings of the 5th annual international conference on computing and combinatorics, Springer, Berlin, COCOON\u201999, pp 1\u201317. http:\/\/dl.acm.org\/citation.cfm?id=1765751.1765753","DOI":"10.1007\/3-540-48686-0_1"},{"issue":"3","key":"399_CR34","first-page":"43","volume":"24","author":"V Krebs","year":"2002","unstructured":"Krebs V (2002) Mapping networks of terrorist cells. CONNECTIONS 24(3):43\u201352","journal-title":"CONNECTIONS"},{"key":"399_CR35","doi-asserted-by":"crossref","unstructured":"Leskovec J, Chakrabarti D, Kleinberg J, Faloutsos C (2005a) Realistic, mathematically tractable graph generation and evolution, using kronecker multiplication. In: Proceedings of the 9th European conference on principles and practice of knowledge discovery in databases, Springer, Berlin, PKDD\u201905, pp 133\u2013145. doi: 10.1007\/11564126_17","DOI":"10.1007\/11564126_17"},{"key":"399_CR36","doi-asserted-by":"crossref","unstructured":"Leskovec J, Kleinberg J, Faloutsos C (2005b) Graphs over time: densification laws, shrinking diameters and possible explanations. In: Proceedings of the 11th international conference on knowledge discovery and data mining, pp 177\u2013187. doi: 10.1145\/1081870.1081893","DOI":"10.1145\/1081870.1081893"},{"key":"399_CR37","doi-asserted-by":"crossref","unstructured":"Leskovec J, Backstrom L, Kumar R, Tomkins A (2008) Microscopic evolution of social networks. In: Proceedings of the 14th international conference on knowledge discovery and data mining, pp 462\u2013470. doi: 10.1145\/1401890.1401948","DOI":"10.1145\/1401890.1401948"},{"issue":"22","key":"399_CR38","doi-asserted-by":"crossref","first-page":"8824","DOI":"10.1073\/pnas.1222441110","volume":"110","author":"R Louf","year":"2013","unstructured":"Louf R, Jensen P, Barthelemy M (2013) Emergence of hierarchy in cost-driven growth of spatial networks. Proc Natl Acad Sci USA 110(22):8824\u20138829","journal-title":"Proc Natl Acad Sci USA"},{"key":"399_CR39","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1186\/1471-2105-7-113","volume":"7","author":"KD MacIsaac","year":"2006","unstructured":"MacIsaac KD, Wang T, Gordon DB, Gifford DK, Stormo GD, Fraenkel E (2006) An improved map of conserved regulatory sites for Saccharomyces cerevisiae. BMC Bioinf 7:113","journal-title":"BMC Bioinf"},{"issue":"9","key":"399_CR40","doi-asserted-by":"crossref","first-page":"3192","DOI":"10.1073\/pnas.0409515102","volume":"102","author":"M Middendorf","year":"2005","unstructured":"Middendorf M, Ziv E, Wiggins CH (2005) Inferring network mechanisms: the Drosophila melanogaster protein interaction network. Proc Natl Acad Sci USA 102(9):3192\u20133197","journal-title":"Proc Natl Acad Sci USA"},{"key":"399_CR41","doi-asserted-by":"crossref","unstructured":"Moore D, Shannon C, Brown J (2002) Code-Red: a case study on the spread and victims of an Internet worm. SIGCOMM\/USENIX Internet Measurement Workshop. Marseille, France, pp 273\u2013284","DOI":"10.1145\/637201.637244"},{"key":"399_CR42","doi-asserted-by":"crossref","unstructured":"Moore D, Shannon C, Voelker G, Savage S (2003) Internet quarantine: requirements for containing self-propagating code. In: Proc. of the IEEE Intl. Conf. on Computer and Communications, vol 3, pp 1901\u20131910 vol. 3, doi: 10.1109\/INFCOM.2003.1209212","DOI":"10.1109\/INFCOM.2003.1209212"},{"issue":"4","key":"399_CR43","doi-asserted-by":"crossref","first-page":"e1001,119","DOI":"10.1371\/journal.pcbi.1001119","volume":"7","author":"S Navlakha","year":"2011","unstructured":"Navlakha S, Kingsford C (2011) Network archaeology: uncovering ancient networks from present-day interactions. PLoS Comput Biol 7(4):e1001,119","journal-title":"PLoS Comput Biol"},{"issue":"96","key":"399_CR44","doi-asserted-by":"crossref","first-page":"20140,283","DOI":"10.1098\/rsif.2014.0283","volume":"11","author":"S Navlakha","year":"2014","unstructured":"Navlakha S, He X, Faloutsos C, Bar-Joseph Z (2014) Topological properties of robust biological and computational networks. J R Soc Interface 11(96):20140,283","journal-title":"J R Soc Interface"},{"issue":"7095","key":"399_CR45","doi-asserted-by":"crossref","first-page":"840","DOI":"10.1038\/nature04785","volume":"441","author":"JR Newman","year":"2006","unstructured":"Newman JR, Ghaemmaghami S, Ihmels J, Breslow DK, Noble M, DeRisi JL, Weissman JS (2006) Single-cell proteomic analysis of S. cerevisiae reveals the architecture of biological noise. Nature 441(7095):840\u2013846","journal-title":"Nature"},{"issue":"4","key":"399_CR46","doi-asserted-by":"crossref","first-page":"R51","DOI":"10.1186\/gb-2007-8-4-r51","volume":"8","author":"JB Pereira-Leal","year":"2007","unstructured":"Pereira-Leal JB, Levy ED, Kamp C, Teichmann SA (2007) Evolution of protein complexes by duplication of homomeric interactions. Genome Biol 8(4):R51","journal-title":"Genome Biol"},{"key":"399_CR47","doi-asserted-by":"crossref","unstructured":"Prakash B, Tong H, Valler N, Faloutsos M, Faloutsos C (2010) Virus propagation on time-varying networks: theory and immunization algorithms. In: Proceedings of the European conference on machine learning and knowledge discovery in databases, Springer, Berlin, pp 99\u2013114. http:\/\/dl.acm.org\/citation.cfm?id=1889788.1889796","DOI":"10.1007\/978-3-642-15939-8_7"},{"issue":"10","key":"399_CR48","doi-asserted-by":"crossref","first-page":"3838","DOI":"10.1073\/pnas.1009440108","volume":"108","author":"CM Schneider","year":"2011","unstructured":"Schneider CM, Moreira AA, Andrade JS, Havlin S, Herrmann HJ (2011) Mitigation of malicious attacks on networks. Proc Natl Acad Sci USA 108(10):3838\u20133841","journal-title":"Proc Natl Acad Sci USA"},{"issue":"3","key":"399_CR49","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1109\/JCN.2006.6182774","volume":"8","author":"G Siganos","year":"2006","unstructured":"Siganos G, Tauro SL, Faloutsos M (2006) Jellyfish: a conceptual model for the as internet topology. J Commun Netw 8(3):339\u2013350. doi: 10.1109\/JCN.2006.6182774","journal-title":"J Commun Netw"},{"issue":"2 Pt 2","key":"399_CR50","doi-asserted-by":"crossref","first-page":"026,102","DOI":"10.1103\/PhysRevE.77.026102","volume":"77","author":"RV Sole","year":"2008","unstructured":"Sole RV, Rosas-Casals M, Corominas-Murtra B, Valverde S (2008) Robustness of the European power grids under intentional attack. Phys Rev E Stat Nonlinear Soft Matter Phys 77(2 Pt 2):026,102","journal-title":"Phys Rev E Stat Nonlinear Soft Matter Phys"},{"key":"399_CR51","first-page":"411","volume":"44","author":"A Valencia","year":"2003","unstructured":"Valencia A, Pazos F (2003) Prediction of protein\u2013protein interactions from evolutionary information. Methods Biochem Anal 44:411\u2013426","journal-title":"Methods Biochem Anal"},{"issue":"1","key":"399_CR52","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1159\/000067642","volume":"1","author":"A Vazquez","year":"2003","unstructured":"Vazquez A, Flammini A, Maritan A, Vespignani A (2003) Modeling of protein interaction networks. Complexus 1(1):38\u201344","journal-title":"Complexus"},{"key":"399_CR53","doi-asserted-by":"crossref","unstructured":"Wu S, Das Sarma A, Fabrikant A, Lattanzi S, Tomkins A (2013) Arrival and departure dynamics in social networks. In: Proceedings of the sixth ACM international conference on web search and data mining, ACM, New York, NY, WSDM \u201913, pp 233\u2013242. doi: 10.1145\/2433396.2433425","DOI":"10.1145\/2433396.2433425"}],"container-title":["Data Mining and Knowledge Discovery"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-014-0399-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10618-014-0399-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-014-0399-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,19]],"date-time":"2019-08-19T04:18:08Z","timestamp":1566188288000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10618-014-0399-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1,7]]},"references-count":53,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["399"],"URL":"https:\/\/doi.org\/10.1007\/s10618-014-0399-1","relation":{},"ISSN":["1384-5810","1573-756X"],"issn-type":[{"value":"1384-5810","type":"print"},{"value":"1573-756X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1,7]]}}}