{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T11:02:57Z","timestamp":1770894177138,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T00:00:00Z","timestamp":1556755200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Heuristics"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s10732-019-09413-0","type":"journal-article","created":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T14:04:29Z","timestamp":1556805869000},"page":"837-859","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Cascading failures in complex networks caused by overload attacks"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9964-8816","authenticated-orcid":false,"given":"Volker","family":"Turau","sequence":"first","affiliation":[]},{"given":"Christoph","family":"Weyer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,2]]},"reference":[{"key":"9413_CR1","doi-asserted-by":"publisher","first-page":"025103","DOI":"10.1103\/PhysRevE.69.025103","volume":"69","author":"R Albert","year":"2004","unstructured":"Albert, R., Albert, I., Nakarado, G.L.: Structural vulnerability of the north american power grid. Phys. Rev. E 69, 025103 (2004)","journal-title":"Phys. Rev. E"},{"key":"9413_CR2","doi-asserted-by":"crossref","unstructured":"Bienstock Daniel (2016) Electrical transmission system cascades and vulnerability\u2014an operations research viewpoint, vol.\u00a022 of MOS-SIAM Series on Optimization. SIAM","DOI":"10.1137\/1.9781611974164"},{"issue":"4","key":"9413_CR3","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1287\/trsc.1050.0127","volume":"39","author":"D Braess","year":"2005","unstructured":"Braess, D., Nagurney, A., Wakolbinger, T.: On a paradox of traffic planning. Transp. Sci. 39(4), 446\u2013450 (2005)","journal-title":"Transp. Sci."},{"key":"9413_CR4","doi-asserted-by":"publisher","first-page":"045104","DOI":"10.1103\/PhysRevE.69.045104","volume":"69","author":"P Crucitti","year":"2004","unstructured":"Crucitti, P., Latora, V., Marchiori, M.: Model for cascading failures in complex networks. Phys. Rev. E 69, 045104 (2004)","journal-title":"Phys. Rev. E"},{"issue":"02","key":"9413_CR5","doi-asserted-by":"publisher","first-page":"L201","DOI":"10.1142\/S0219477505002562","volume":"05","author":"P Crucitti","year":"2005","unstructured":"Crucitti, P., Latora, V., Marchioori, M.: Locating critical lines in high-voltage electrical power grids. Fluct. Noise Lett. 05(02), L201\u2013L208 (2005)","journal-title":"Fluct. Noise Lett."},{"key":"9413_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.ijcip.2017.11.004","volume":"20","author":"L Faramondi","year":"2018","unstructured":"Faramondi, L., Setola, R., Panzieri, S., Pascucci, F., Oliva, G.: Finding critical nodes in infrastructure networks. Int. J. Crit. Infrastruct. Prot. 20, 3\u201315 (2018)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"9413_CR7","doi-asserted-by":"publisher","DOI":"10.1201\/9781420010848","volume-title":"Distributed Systems: An Algorithmic Approach","author":"S Ghosh","year":"2006","unstructured":"Ghosh, S.: Distributed Systems: An Algorithmic Approach. Chapman and Hall, Boca Raton (2006)"},{"key":"9413_CR8","doi-asserted-by":"crossref","unstructured":"Hasan, S., Ghafouri, A., Dubey, A., Karsai, Gabor, K., Xenofon, K: Vulnerability analysis of power systems based on cyber-attack and defense models. In ISGT, Washington DC, 2018. IEEE (2018)","DOI":"10.1109\/ISGT.2018.8403337"},{"key":"9413_CR9","doi-asserted-by":"publisher","first-page":"031129","DOI":"10.1103\/PhysRevE.81.031129","volume":"81","author":"J Lehmann","year":"2010","unstructured":"Lehmann, J., Bernasconi, J.: Stochastic load-redistribution model for cascading failure propagation. Phys. Rev. E 81, 031129 (2010)","journal-title":"Phys. Rev. E"},{"issue":"1","key":"9413_CR10","first-page":"10:1","volume":"3","author":"B Li","year":"2018","unstructured":"Li, B., Lu, R., Choo, K.-K.R., Wang, W., Luo, S.: On reliability analysis of smart grids under topology attacks: a stochastic petri net approach. ACM Trans. Cyber-Phys. Syst. 3(1), 10:1\u201310:25 (2018)","journal-title":"ACM Trans. Cyber-Phys. Syst."},{"issue":"7","key":"9413_CR11","doi-asserted-by":"publisher","first-page":"1592","DOI":"10.1109\/TIFS.2016.2542061","volume":"11","author":"X Liu","year":"2016","unstructured":"Liu, X., Li, Z., Liu, X., Li, Z.: Masking transmission line outages via false data injection attacks. IEEE Trans. Inf. Forensics Secur. 11(7), 1592\u20131602 (2016). \n                    https:\/\/doi.org\/10.1109\/TIFS.2016.2542061\n                    \n                  . ISSN 1556-6013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"9413_CR12","first-page":"572","volume":"8","author":"X Liu","year":"2017","unstructured":"Liu, X., Shahidehpour, M., Li, Z., Liu, X., Cao, Y., Li, Z.: Power system risk assessment in cyber attacks considering the role of protection systems. IEEE Trans. Smart Grid 8(2), 572\u2013580 (2017)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"2","key":"9413_CR13","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/TNSE.2017.2685582","volume":"4","author":"D Lv","year":"2017","unstructured":"Lv, D., Eslami, A., Cui, S.: Load-dependent cascading failures in finite-size Erd\u0151s-R\u00e9nyi random networks. IEEE Trans. Netw. Sci. Eng. 4(2), 129\u2013139 (2017)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"9413_CR14","doi-asserted-by":"publisher","first-page":"065102","DOI":"10.1103\/PhysRevE.66.065102","volume":"66","author":"AE Motter","year":"2002","unstructured":"Motter, A.E., Lai, Y.-C.: Cascade-based attacks on complex networks. Phys. Rev. E 66, 065102 (2002)","journal-title":"Phys. Rev. E"},{"key":"9413_CR15","unstructured":"Power flow model of the main continental European transmission network. \n                    https:\/\/www.powerworld.com\/HrBknowledge-base\/updated-and-validated-power-flow-model-of-the-main-continental-european-transHrBmission-network\n                    \n                  . Accessed: 30 Jan 2018"},{"issue":"1","key":"9413_CR16","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1049\/et.2016.0116","volume":"11","author":"T Pultarova","year":"2016","unstructured":"Pultarova, T.: Cyber security: Ukraine grid hack is wake-up call for network operators. Eng. Technol. 11(1), 12\u201313 (2016)","journal-title":"Eng. Technol."},{"issue":"3","key":"9413_CR17","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1016\/j.tcs.2015.08.021","volume":"607","author":"J Seo","year":"2015","unstructured":"Seo, J., Mishra, S., Li, X., Thai, M.: Catastrophic cascading failures in power networks. Theor. Comput. Sci. 607(3), 306\u2013319 (2015)","journal-title":"Theor. Comput. Sci."},{"key":"9413_CR18","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.jmsy.2017.05.007","volume":"44","author":"LD Sturm","year":"2017","unstructured":"Sturm, L.D., Williams, C.B., Camelio, J.A., White, J., Parker, R.: Cyber-physical vulnerabilities in additive manufacturing systems: a case study attack on the.STL file with human subjects. J. Manuf. Syst. 44, 154\u2013164 (2017)","journal-title":"J. Manuf. Syst."},{"issue":"5","key":"9413_CR19","doi-asserted-by":"publisher","first-page":"04017009","DOI":"10.1061\/(ASCE)WR.1943-5452.0000749","volume":"143","author":"R Taormina","year":"2017","unstructured":"Taormina, R., Galelli, S., Tippenhauer, N., Salomons, E., Ostfeld, A.: Characterizing cyber-physical attacks on water distribution systems. J. Water Resour. Plan. Manag. 143(5), 04017009 (2017)","journal-title":"J. Water Resour. Plan. Manag."},{"key":"9413_CR20","volume-title":"Handbook of Optimization in Complex Networks, Volume\u00a057 of Springer Optimization and Its Applications","year":"2012","unstructured":"Thai, M., Pardalos, P. (eds.): Handbook of Optimization in Complex Networks, Volume\u00a057 of Springer Optimization and Its Applications. Springer, New York (2012)"},{"issue":"2","key":"9413_CR21","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1109\/TPWRS.2011.2177868","volume":"27","author":"M Vaiman","year":"2012","unstructured":"Vaiman, M., Bell, K., Chen, Y., Chowdhury, B., Zhang, : Risk assessment of cascading outages: methodologies and challenges. IEEE Trans. Power Syst. 27(2), 631\u2013641 (2012)","journal-title":"IEEE Trans. Power Syst."},{"key":"9413_CR22","unstructured":"Wang, W., Cai, Q., Sun, Y., He, H..: Risk-aware attacks and catastrophic cascading failures in US power grid. In: Global Telecommunications Conference, pp. 1\u20136 (2011)"},{"key":"9413_CR23","doi-asserted-by":"publisher","first-page":"026101","DOI":"10.1103\/PhysRevE.77.026101","volume":"77","author":"W-X Wang","year":"2008","unstructured":"Wang, W.-X., Chen, G.: Universal robustness characteristic of weighted networks against cascading failure. Phys. Rev. E 77, 026101 (2008)","journal-title":"Phys. Rev. E"},{"issue":"10","key":"9413_CR24","doi-asserted-by":"publisher","first-page":"1332","DOI":"10.1016\/j.ssci.2009.02.002","volume":"47","author":"J-W Wang","year":"2009","unstructured":"Wang, J.-W., Rong, L.-L.: Cascade-based attack vulnerability on the US power grid. Saf. Sci. 47(10), 1332\u20131336 (2009)","journal-title":"Saf. Sci."},{"issue":"5","key":"9413_CR25","doi-asserted-by":"publisher","first-page":"1344","DOI":"10.1016\/j.comnet.2012.12.017","volume":"57","author":"W Wang","year":"2013","unstructured":"Wang, W., Zhuo, L.: Cyber security in the smart grid: survey and challenges. Comput. Netw. 57(5), 1344\u20131371 (2013). ISSN 1389-1286","journal-title":"Comput. Netw."},{"key":"9413_CR26","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.ijcip.2017.03.003","volume":"17","author":"M Warnier","year":"2017","unstructured":"Warnier, M., Dulman, S., Ko\u00e7, Y., Pauwels, E.: Distributed monitoring for the prevention of cascading failures in operational power grids. Int. J. Crit. Infrastruct Prot. 17, 15\u201327 (2017)","journal-title":"Int. J. Crit. Infrastruct Prot."},{"key":"9413_CR27","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"DJ Watts","year":"1998","unstructured":"Watts, D.J., Strogatz, S.H.: Collective dynamics of \u2019small-world\u2019 networks. Nature 393, 440\u2013442 (1998)","journal-title":"Nature"},{"issue":"5","key":"9413_CR28","doi-asserted-by":"publisher","first-page":"P05013","DOI":"10.1088\/1742-5468\/2008\/05\/P05013","volume":"2008","author":"Z Wu","year":"2008","unstructured":"Wu, Z., Peng, G., Wang, W.-X., Chan, S., Wong, E.W.-M.: Cascading failure spreading on weighted heterogeneous networks. J. Stat. Mech. Theory Exp. 2008(5), P05013 (2008)","journal-title":"J. Stat. Mech. Theory Exp."},{"issue":"2","key":"9413_CR29","first-page":"889","volume":"8","author":"Y Xiang","year":"2017","unstructured":"Xiang, Y., Ding, Z., Zhang, Y., Wang, L.: Power system reliability evaluation considering load redistribution attacks. IEEE Trans. Smart Grid 8(2), 889\u2013901 (2017)","journal-title":"IEEE Trans. Smart Grid"},{"key":"9413_CR30","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.ssci.2015.08.002","volume":"80","author":"J Zhang","year":"2015","unstructured":"Zhang, J., Dai, Y., Zou, K., Song, B., Zhang, Z.: Vulnerability analysis of the US power grid based on local load-redistribution. Saf. Sci. 80, 156\u2013162 (2015)","journal-title":"Saf. Sci."},{"issue":"12","key":"9413_CR31","doi-asserted-by":"publisher","first-page":"2340","DOI":"10.1109\/TIFS.2014.2363786","volume":"9","author":"Y Zhu","year":"2014","unstructured":"Zhu, Y., Yan, J., Tang, Y., Sun, Y.L., He, H.: Resilience analysis of power grids under the sequential attack. IEEE Trans. Inf. Forensics Secur. 9(12), 2340\u20132354 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Journal of Heuristics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10732-019-09413-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10732-019-09413-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10732-019-09413-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,30]],"date-time":"2020-04-30T23:30:58Z","timestamp":1588289458000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10732-019-09413-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,2]]},"references-count":31,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["9413"],"URL":"https:\/\/doi.org\/10.1007\/s10732-019-09413-0","relation":{},"ISSN":["1381-1231","1572-9397"],"issn-type":[{"value":"1381-1231","type":"print"},{"value":"1572-9397","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,2]]},"assertion":[{"value":"5 September 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 March 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 April 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 May 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}