{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T14:43:48Z","timestamp":1760453028760},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T00:00:00Z","timestamp":1586563200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T00:00:00Z","timestamp":1586563200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comb Optim"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s10878-020-00570-8","type":"journal-article","created":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T02:02:38Z","timestamp":1586570558000},"page":"98-109","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Secure domination of honeycomb networks"],"prefix":"10.1007","volume":"40","author":[{"given":"M. R.","family":"Chithra","sequence":"first","affiliation":[]},{"given":"Manju K.","family":"Menon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,11]]},"reference":[{"key":"570_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-4529-6","volume-title":"A textbook of graph theory","author":"R Balakrishnan","year":"2012","unstructured":"Balakrishnan R, Ranganathan K (2012) A textbook of graph theory, 2nd edn. Springer, New York","edition":"2"},{"key":"570_CR2","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1016\/j.akcej.2017.03.003","volume":"14","author":"J Barnett","year":"2017","unstructured":"Barnett J, Blumenthal A, Johnson P, Jones C, Matzke R, Mujuni E (2017) Connected minimum secure dominating sets in grids. AKCE Int J Gr Combin 14:216\u2013223","journal-title":"AKCE Int J Gr Combin"},{"key":"570_CR3","doi-asserted-by":"publisher","first-page":"1708","DOI":"10.1016\/j.dam.2007.03.009","volume":"155","author":"RC Brigham","year":"2007","unstructured":"Brigham RC, Dutton RD, Hedetniemi ST (2007) Security in graphs. Discret Appl Math 155:1708\u20131714","journal-title":"Discret Appl Math"},{"key":"570_CR4","doi-asserted-by":"publisher","first-page":"4443","DOI":"10.1016\/j.disc.2009.02.005","volume":"309","author":"RD Dutton","year":"2009","unstructured":"Dutton RD (2009) On a graph\u2019s security number. Discret Math 309:4443\u20134447","journal-title":"Discret Math"},{"key":"570_CR5","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1016\/j.dam.2007.08.037","volume":"156","author":"RD Dutton","year":"2008","unstructured":"Dutton RD, Lee R, Brigham RC (2008) Bounds on a graph\u2019s security number. Discret Appl Math 156:695\u2013704","journal-title":"Discret Appl Math"},{"issue":"5","key":"570_CR6","first-page":"530","volume":"3","author":"B Rajan","year":"2012","unstructured":"Rajan B, Willian A, Grigorious C, Stephen S (2012) On certain topological indices of silicate, honeycomb and hexagonal networks. J Comput Math Sci 3(5):530\u2013535","journal-title":"J Comput Math Sci"},{"issue":"2","key":"570_CR7","first-page":"457","volume":"22","author":"A Sharieh","year":"2008","unstructured":"Sharieh A, Qatawneh M, Almobaideen W, Sleit A (2008) Hex-cell: modelling, topological properties and routing algorithm. Eur J Sci Res 22(2):457\u2013468","journal-title":"Eur J Sci Res"},{"issue":"10","key":"570_CR8","doi-asserted-by":"publisher","first-page":"1036","DOI":"10.1109\/71.629486","volume":"8","author":"I Stomenovic","year":"1997","unstructured":"Stomenovic I (1997) Honeycomb networks: topological properties and communication algorithm. IEEE Trans Paral Distrib Syst 8(10):1036\u20131042","journal-title":"IEEE Trans Paral Distrib Syst"},{"issue":"13","key":"570_CR9","doi-asserted-by":"publisher","first-page":"2065","DOI":"10.1049\/iet-cta.2016.1237","volume":"11","author":"S Wang","year":"2017","unstructured":"Wang S, Liu JB, Wang C, Hayat S (2017) Further results on computation of topological indices of certain networks. IET Control Theory Appl 11(13):2065\u20132071","journal-title":"IET Control Theory Appl"}],"container-title":["Journal of Combinatorial Optimization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-020-00570-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10878-020-00570-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-020-00570-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T23:50:43Z","timestamp":1618098643000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10878-020-00570-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,11]]},"references-count":9,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["570"],"URL":"https:\/\/doi.org\/10.1007\/s10878-020-00570-8","relation":{},"ISSN":["1382-6905","1573-2886"],"issn-type":[{"value":"1382-6905","type":"print"},{"value":"1573-2886","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,11]]},"assertion":[{"value":"11 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}