{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T20:48:20Z","timestamp":1768337300894,"version":"3.49.0"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,9,22]],"date-time":"2018-09-22T00:00:00Z","timestamp":1537574400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,9,22]],"date-time":"2018-09-22T00:00:00Z","timestamp":1537574400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["EFRI-1441231"],"award-info":[{"award-number":["EFRI-1441231"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","award":["FA8651-16-2-0009"],"award-info":[{"award-number":["FA8651-16-2-0009"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Glob Optim"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s10898-018-0703-5","type":"journal-article","created":{"date-parts":[[2018,9,22]],"date-time":"2018-09-22T04:21:35Z","timestamp":1537590095000},"page":"803-838","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Critical nodes in interdependent networks with deterministic and probabilistic cascading failures"],"prefix":"10.1007","volume":"74","author":[{"given":"Alexander","family":"Veremyev","sequence":"first","affiliation":[]},{"given":"Konstantin","family":"Pavlikov","sequence":"additional","affiliation":[]},{"given":"Eduardo L.","family":"Pasiliao","sequence":"additional","affiliation":[]},{"given":"My T.","family":"Thai","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1571-0481","authenticated-orcid":false,"given":"Vladimir","family":"Boginski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,22]]},"reference":[{"key":"703_CR1","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1061\/(ASCE)1076-0342(2002)8:3(67)","volume":"8","author":"M Amin","year":"2002","unstructured":"Amin, M.: Toward secure and resilient interdependent infrastructures. J. Infrastruct. Syst. 8, 67 (2002)","journal-title":"J. Infrastruct. Syst."},{"issue":"7","key":"703_CR2","doi-asserted-by":"publisher","first-page":"2193","DOI":"10.1016\/j.cor.2008.08.016","volume":"36","author":"A Arulselvan","year":"2009","unstructured":"Arulselvan, A., Commander, C., Elefteriadou, L., Pardalos, P.: Detecting critical nodes in sparse graphs. Comput. Oper. Res. 36(7), 2193\u20132200 (2009)","journal-title":"Comput. Oper. Res."},{"key":"703_CR3","doi-asserted-by":"crossref","unstructured":"Badanidiyuru, A., Kleinberg, R., Lee, H.: Approximating low-dimensional coverage problems. In: Proceedings of the 2012 Symposuim on Computational Geometry, pp. 161\u2013170. ACM (2012)","DOI":"10.1145\/2261250.2261274"},{"issue":"5\u20136","key":"703_CR4","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1016\/0375-9601(90)90451-S","volume":"147","author":"P Bak","year":"1990","unstructured":"Bak, P., Chen, K., Tang, C.: A forest-fire model and some thoughts on turbulence. Phys. Lett. A 147(5\u20136), 297\u2013300 (1990)","journal-title":"Phys. Lett. A"},{"key":"703_CR5","doi-asserted-by":"crossref","unstructured":"Barrett, C., Beckman, R., Channakeshava, K., Huang, F., Kumar, V., Marathe, A., Marathe, M., Pei, G.: Cascading failures in multiple infrastructures: from transportation to communication network. In: 2010 5th International Conference on Critical Infrastructure (CRIS), pp. 1\u20138 (2010). https:\/\/doi.org\/10.1109\/CRIS.2010.5617569","DOI":"10.1109\/CRIS.2010.5617569"},{"key":"703_CR6","doi-asserted-by":"crossref","unstructured":"Bienstock, D.: Optimal control of cascading power grid failures. In: 2011 50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC), pp. 2166\u20132173 (2011). https:\/\/doi.org\/10.1109\/CDC.2011.6160415","DOI":"10.1109\/CDC.2011.6160415"},{"issue":"12","key":"703_CR7","doi-asserted-by":"publisher","first-page":"E680","DOI":"10.1073\/pnas.1110586109","volume":"109","author":"CD Brummitt","year":"2012","unstructured":"Brummitt, C.D., DSouza, R.M., Leicht, E.: Suppressing cascades of load in interdependent networks. Proc. Natl. Acad. Sci. 109(12), E680\u2013E689 (2012)","journal-title":"Proc. Natl. Acad. Sci."},{"issue":"7291","key":"703_CR8","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1038\/nature08932","volume":"464","author":"S Buldyrev","year":"2010","unstructured":"Buldyrev, S., Parshani, R., Paul, G., Stanley, H., Havlin, S.: Catastrophic cascade of failures in interdependent networks. Nature 464(7291), 1025\u20131028 (2010)","journal-title":"Nature"},{"issue":"1","key":"703_CR9","doi-asserted-by":"publisher","first-page":"016112","DOI":"10.1103\/PhysRevE.83.016112","volume":"83","author":"SV Buldyrev","year":"2011","unstructured":"Buldyrev, S.V., Shere, N.W., Cwilich, G.A.: Interdependent networks with identical degrees of mutually dependent nodes. Phys. Rev. E 83(1), 016112 (2011)","journal-title":"Phys. Rev. E"},{"key":"703_CR10","unstructured":"Carreras, B.A., Newman, D.E., Gradney, P., Lynch, V.E., Dobson, I.: interdependent risk in interacting infrastructure systems. In: 40th Annual Hawaii International Conference on System Sciences, 2007. HICSS 2007, pp. 112\u2013112. IEEE (2007)"},{"issue":"3","key":"703_CR11","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1007\/s10589-012-9458-y","volume":"53","author":"M Di Summa","year":"2012","unstructured":"Di Summa, M., Grosso, A., Locatelli, M.: Branch and cut algorithms for detecting critical nodes in undirected graphs. Comput. Optim. Appl. 53(3), 649\u2013680 (2012)","journal-title":"Comput. Optim. Appl."},{"key":"703_CR12","unstructured":"Dinh, T.N., Thai, M.T.: Precise structural vulnerability assessment via mathematical programming. In: Military Communications Conference, 2011-MILCOM 2011, pp. 1351\u20131356. IEEE (2011)"},{"key":"703_CR13","doi-asserted-by":"publisher","first-page":"052804","DOI":"10.1103\/PhysRevE.87.052804","volume":"87","author":"G Dong","year":"2013","unstructured":"Dong, G., Gao, J., Du, R., Tian, L., Stanley, H.E., Havlin, S.: Robustness of network of networks under targeted attack. Phys. Rev. E 87, 052804 (2013)","journal-title":"Phys. Rev. E"},{"issue":"2","key":"703_CR14","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/0378-4371(93)90001-K","volume":"199","author":"B Drossel","year":"1993","unstructured":"Drossel, B., Schwabl, F.: Forest-fire model with immune trees. Phys. A Stat. Mech. Appl. 199(2), 183\u2013197 (1993)","journal-title":"Phys. A Stat. Mech. Appl."},{"key":"703_CR15","unstructured":"Due\u00f1as-Osorio, L., Craig, J., Goodno, B.: Probabilistic response of interdependent infrastructure networks. In: 2nd Annual Meeting of the Asian-Pacific Network of Centers for Earthquake Engineering Research (ANCER). Honolulu, Hawaii, July pp. 28\u201330 (2004)"},{"key":"703_CR16","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1061\/(ASCE)1076-0342(2007)13:3(185)","volume":"13","author":"L Due\u00f1as-Osorio","year":"2007","unstructured":"Due\u00f1as-Osorio, L., Craig, J., Goodno, B., Bostrom, A.: Interdependent response of networked systems. J. Infrastruct. Syst. 13, 185 (2007)","journal-title":"J. Infrastruct. Syst."},{"issue":"2","key":"703_CR17","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1002\/eqe.626","volume":"36","author":"L Due\u00f1as-Osorio","year":"2007","unstructured":"Due\u00f1as-Osorio, L., Craig, J.I., Goodno, B.J.: Seismic response of critical interdependent networks. Earthq. Eng. Struct. Dyn. 36(2), 285\u2013306 (2007). https:\/\/doi.org\/10.1002\/eqe.626","journal-title":"Earthq. Eng. Struct. Dyn."},{"key":"703_CR18","doi-asserted-by":"crossref","first-page":"290","DOI":"10.5486\/PMD.1959.6.3-4.12","volume":"6","author":"P Erd\u0151s","year":"1959","unstructured":"Erd\u0151s, P., R\u00e9nyi, A.: On random graphs. Publ. Math. Debr. 6, 290\u2013297 (1959)","journal-title":"Publ. Math. Debr."},{"key":"703_CR19","unstructured":"$$\\text{FICO}^{{\\rm TM}}$$ Xpress Optimization Suite 7.6. http:\/\/www.fico.com\/ (2013)"},{"issue":"16","key":"703_CR20","first-page":"6661","volume":"9","author":"C Gao","year":"2013","unstructured":"Gao, C., Li, X., Zhang, X., Li, K.: Network immunization for interdependent networks. J. Comput. Inf. Syst. 9(16), 6661\u20136668 (2013)","journal-title":"J. Comput. Inf. Syst."},{"key":"703_CR21","doi-asserted-by":"publisher","first-page":"195701","DOI":"10.1103\/PhysRevLett.107.195701","volume":"107","author":"J Gao","year":"2011","unstructured":"Gao, J., Buldyrev, S.V., Havlin, S., Stanley, H.E.: Robustness of a network of networks. Phys. Rev. Lett. 107, 195701 (2011). https:\/\/doi.org\/10.1103\/PhysRevLett.107.195701","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"703_CR22","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1038\/nphys2180","volume":"8","author":"J Gao","year":"2011","unstructured":"Gao, J., Buldyrev, S.V., Stanley, H.E., Havlin, S.: Networks formed from interdependent networks. Nat. Phys. 8(1), 40\u201348 (2011)","journal-title":"Nat. Phys."},{"key":"703_CR23","volume-title":"Computers and Intractability: A Guide to the Theory of NP-Completeness","author":"M Garey","year":"1979","unstructured":"Garey, M., Johnson, D.: Computers and Intractability: A Guide to the Theory of NP-Completeness. Freeman and Co., New York (1979)"},{"key":"703_CR24","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.omega.2013.08.002","volume":"46","author":"J Gong","year":"2013","unstructured":"Gong, J., Mitchell, J.E., Krishnamurthy, A., Wallace, W.A.: An Interdependent Layered Network Model for a Resilient Supply Chain. Omega 46, 104\u2013116 (2013)","journal-title":"Omega"},{"issue":"6","key":"703_CR25","doi-asserted-by":"publisher","first-page":"065101","DOI":"10.1103\/PhysRevE.83.065101","volume":"83","author":"X Huang","year":"2011","unstructured":"Huang, X., Gao, J., Buldyrev, S., Havlin, S., Stanley, H.: Robustness of interdependent networks under targeted attack. Phys. Rev. E 83(6), 065101 (2011)","journal-title":"Phys. Rev. E"},{"issue":"12","key":"703_CR26","doi-asserted-by":"publisher","first-page":"1335","DOI":"10.1016\/j.ress.2010.06.010","volume":"95","author":"J Johansson","year":"2010","unstructured":"Johansson, J., Hassel, H.: An approach for modelling interdependent infrastructures in the context of vulnerability analysis. Reliab. Eng. Syst. Saf. 95(12), 1335\u20131344 (2010)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"703_CR27","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J., Tardos, \u00c9.: Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 137\u2013146. ACM (2003)","DOI":"10.1145\/956750.956769"},{"issue":"1","key":"703_CR28","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/S0020-0190(99)00031-9","volume":"70","author":"S Khuller","year":"1999","unstructured":"Khuller, S., Moss, A., Naor, J.S.: The budgeted maximum coverage problem. Inf. Process. Lett. 70(1), 39\u201345 (1999)","journal-title":"Inf. Process. Lett."},{"issue":"3","key":"703_CR29","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1093\/comnet\/cnu016","volume":"2","author":"M Kivel\u00e4","year":"2014","unstructured":"Kivel\u00e4, M., Arenas, A., Barthelemy, M., Gleeson, J.P., Moreno, Y., Porter, M.A.: Multilayer networks. J. Complex Netw. 2(3), 203\u2013271 (2014)","journal-title":"J. Complex Netw."},{"key":"703_CR30","doi-asserted-by":"publisher","first-page":"43","DOI":"10.21314\/JOR.2002.057","volume":"4","author":"P Krokhmal","year":"2002","unstructured":"Krokhmal, P., Palmquist, J., Uryasev, S.: Portfolio optimization with conditional value-at-risk objective and constraints. J. Risk 4, 43\u201368 (2002)","journal-title":"J. Risk"},{"key":"703_CR31","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.cosrev.2018.02.002","volume":"28","author":"M Lalou","year":"2018","unstructured":"Lalou, M., Tahraoui, M.A., Kheddouci, H.: The critical node detection problem in networks: a survey. Comput. Sci. Rev. 28, 92\u2013117 (2018)","journal-title":"Comput. Sci. Rev."},{"issue":"1","key":"703_CR32","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1080\/106307302317379855","volume":"9","author":"R Little","year":"2002","unstructured":"Little, R.: Controlling cascading failure: understanding the vulnerabilities of interconnected infrastructures. J. Urban Technol. 9(1), 109\u2013123 (2002)","journal-title":"J. Urban Technol."},{"key":"703_CR33","first-page":"302","volume-title":"Critical Information Infrastructure Security, Lecture Notes in Computer Science","author":"E Luiijf","year":"2009","unstructured":"Luiijf, E., Nieuwenhuijs, A., Klaver, M., van Eeten, M., Cruz, E.: Empirical findings on critical infrastructure dependencies in Europe. In: Setola, R., Geretshuber, S. (eds.) Critical Information Infrastructure Security, Lecture Notes in Computer Science, vol. 5508, pp. 302\u2013310. Springer, Berlin (2009)"},{"key":"703_CR34","doi-asserted-by":"crossref","unstructured":"Newman, D., Nkei, B., Carreras, B., Dobson, I., Lynch, V., Gradney, P.: Risk assessment in complex interacting infrastructure systems. In: HICSS \u201905. Proceedings of the 38th Annual Hawaii International Conference on System Sciences, 2005, p. 63c (2005). https:\/\/doi.org\/10.1109\/HICSS.2005.524","DOI":"10.1109\/HICSS.2005.524"},{"key":"703_CR35","unstructured":"Newman, D.E., Nkei, B., Carreras, B.A., Dobson, I., Lynch, V.E., Gradney, P.: Risk assessment in complex interacting infrastructure systems. In: Proceedings of the 38th Annual Hawaii International Conference on System Sciences, 2005. HICSS\u201905, pp. 63c\u201363c. IEEE (2005)"},{"issue":"1","key":"703_CR36","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1109\/TSG.2012.2229398","volume":"4","author":"D Nguyen","year":"2013","unstructured":"Nguyen, D., Shen, Y., Thai, M.: Detecting critical nodes in interdependent power networks for vulnerability assessment. IEEE Trans. Smart Grid 4(1), 151\u2013159 (2013)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"1","key":"703_CR37","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1111\/j.1467-9574.2007.00350.x","volume":"61","author":"M Oosten","year":"2007","unstructured":"Oosten, M., Rutten, J., Spieksma, F.: Disconnecting graphs by removing vertices: a polyhedral approach. Stat. Neerl. 61(1), 35\u201360 (2007)","journal-title":"Stat. Neerl."},{"key":"703_CR38","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.ress.2013.06.040","volume":"121","author":"M Ouyang","year":"2014","unstructured":"Ouyang, M.: Review on modeling and simulation of interdependent critical infrastructure systems. Reliab. Eng. Syst. Saf. 121, 43\u201360 (2014)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"703_CR39","unstructured":"Ouyang, M., Hong, L., Mao, Z.J., Yu, M.H., Qi, F.: A methodological approach to analyze vulnerability of interdependent infrastructures. Simul. Modell. Pract. Theory 17(5), 817\u2013828 (2009). https:\/\/doi.org\/10.1016\/j.simpat.2009.02.001 . http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1569190X0900015X"},{"key":"703_CR40","doi-asserted-by":"publisher","first-page":"048701","DOI":"10.1103\/PhysRevLett.105.048701","volume":"105","author":"R Parshani","year":"2010","unstructured":"Parshani, R., Buldyrev, S.V., Havlin, S.: Interdependent networks: reducing the coupling strength leads to a change from a first to second order percolation transition. Phys. Rev. Lett. 105, 048701 (2010)","journal-title":"Phys. Rev. Lett."},{"key":"703_CR41","unstructured":"Parshani, R., Rozenblat, C., Ietri, D., Ducruet, C., Havlin, S.: Inter-similarity between coupled networks. EPL (Europhys. Lett.) 92(6), 68002 (2010). http:\/\/stacks.iop.org\/0295-5075\/92\/i=6\/a=68002"},{"key":"703_CR42","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.cor.2018.04.012","volume":"97","author":"K Pavlikov","year":"2018","unstructured":"Pavlikov, K.: Improved formulations for minimum connectivity network interdiction problems. Comput. Oper. Res. 97, 48\u201357 (2018)","journal-title":"Comput. Oper. Res."},{"issue":"2","key":"703_CR43","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1109\/JSYST.2009.2017396","volume":"3","author":"D Reed","year":"2009","unstructured":"Reed, D., Kapur, K., Christie, R.: Methodology for assessing the resilience of networked infrastructure. IEEE Sys. J. 3(2), 174\u2013180 (2009). https:\/\/doi.org\/10.1109\/JSYST.2009.2017396","journal-title":"IEEE Sys. J."},{"issue":"6","key":"703_CR44","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/37.969131","volume":"21","author":"S Rinaldi","year":"2001","unstructured":"Rinaldi, S., Peerenboom, J., Kelly, T.: Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Syst. 21(6), 11\u201325 (2001)","journal-title":"IEEE Control Syst."},{"key":"703_CR45","unstructured":"Rinaldi, S.M.: Modeling and simulating critical infrastructures and their interdependencies. In: Proceedings of the 37th Annual Hawaii International Conference on System Sciences, 2004, pp. 8\u2013pp. IEEE (2004)"},{"key":"703_CR46","doi-asserted-by":"publisher","first-page":"21","DOI":"10.21314\/JOR.2000.038","volume":"2","author":"RT Rockafellar","year":"2000","unstructured":"Rockafellar, R.T., Uryasev, S.: Optimization of conditional value-at-risk. J. Risk 2, 21\u201341 (2000)","journal-title":"J. Risk"},{"issue":"7","key":"703_CR47","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1016\/S0378-4266(02)00271-6","volume":"26","author":"RT Rockafellar","year":"2002","unstructured":"Rockafellar, R.T., Uryasev, S.: Conditional value-at-risk for general loss distributions. J. Bank. Finance 26(7), 1443\u20131471 (2002)","journal-title":"J. Bank. Finance"},{"issue":"1","key":"703_CR48","first-page":"33","volume":"18","author":"RT Rockafellar","year":"2013","unstructured":"Rockafellar, R.T., Uryasev, S.: The fundamental risk quadrangle in risk management, optimization and statistical estimation. Surv. Oper. Res. Manag. Sci. 18(1), 33\u201353 (2013)","journal-title":"Surv. Oper. Res. Manag. Sci."},{"key":"703_CR49","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/j.endm.2018.02.007","volume":"64","author":"D Santos","year":"2018","unstructured":"Santos, D., de Sousa, A., Monteiro, P.: Compact models for critical node detection in telecommunication networks. Electron. Notes Discrete Math. 64, 325\u2013334 (2018)","journal-title":"Electron. Notes Discrete Math."},{"key":"703_CR50","doi-asserted-by":"crossref","unstructured":"Schneider, C.M., Yazdani, N., Ara\u00fajo, N.A., Havlin, S., Herrmann, H.J.: Towards designing robust coupled networks. Sci. Rep. 3 (2013)","DOI":"10.1038\/srep01969"},{"issue":"3","key":"703_CR51","doi-asserted-by":"publisher","first-page":"036116","DOI":"10.1103\/PhysRevE.83.036116","volume":"83","author":"J Shao","year":"2011","unstructured":"Shao, J., Buldyrev, S.V., Havlin, S., Stanley, H.E.: Cascade of failures in coupled network systems with multiple support-dependence relations. Phys. Rev. E 83(3), 036116 (2011)","journal-title":"Phys. Rev. E"},{"issue":"3","key":"703_CR52","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.disopt.2012.07.001","volume":"9","author":"S Shen","year":"2012","unstructured":"Shen, S., Smith, J.C., Goli, R.: Exact interdiction models and algorithms for disconnecting networks via node deletions. Discrete Optim. 9(3), 172\u2013188 (2012)","journal-title":"Discrete Optim."},{"issue":"21","key":"703_CR53","doi-asserted-by":"publisher","first-page":"218701","DOI":"10.1103\/PhysRevLett.100.218701","volume":"100","author":"I Simonsen","year":"2008","unstructured":"Simonsen, I., Buzna, L., Peters, K., Bornholdt, S., Helbing, D.: Transient dynamics increasing network vulnerability to cascading failures. Phys. Rev. Lett. 100(21), 218701 (2008)","journal-title":"Phys. Rev. Lett."},{"issue":"4","key":"703_CR54","doi-asserted-by":"publisher","first-page":"1245","DOI":"10.1007\/s11590-013-0666-x","volume":"8","author":"A Veremyev","year":"2014","unstructured":"Veremyev, A., Boginski, V., Pasiliao, E.L.: Exact identification of critical nodes in sparse networks via new compact formulations. Optim. Lett. 8(4), 1245\u20131259 (2014)","journal-title":"Optim. Lett."},{"issue":"1","key":"703_CR55","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s10878-014-9730-4","volume":"28","author":"A Veremyev","year":"2014","unstructured":"Veremyev, A., Prokopyev, O.A., Pasiliao, E.L.: An integer programming framework for critical elements detection in graphs. J. Comb. Optim. 28(1), 233\u2013273 (2014)","journal-title":"J. Comb. Optim."},{"issue":"3","key":"703_CR56","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1016\/j.ejor.2013.08.008","volume":"232","author":"A Veremyev","year":"2014","unstructured":"Veremyev, A., Sorokin, A., Boginski, V., Pasiliao, E.L.: Minimum vertex cover problem for coupled interdependent networks with cascading failures. Eur. J. Oper. Res. 232(3), 499\u2013511 (2014)","journal-title":"Eur. J. Oper. Res."},{"issue":"11","key":"703_CR57","doi-asserted-by":"publisher","first-page":"3323","DOI":"10.1016\/j.physa.2011.12.043","volume":"391","author":"S Wang","year":"2012","unstructured":"Wang, S., Hong, L., Chen, X.: Vulnerability analysis of interdependent infrastructure systems: a methodological framework. Phys. A Stat. Mech. Appl. 391(11), 3323\u20133335 (2012)","journal-title":"Phys. A Stat. Mech. Appl."},{"issue":"9","key":"703_CR58","doi-asserted-by":"publisher","first-page":"1708","DOI":"10.1109\/TPDS.2012.62","volume":"23","author":"O Yagan","year":"2012","unstructured":"Yagan, O., Qian, D., Zhang, J., Cochran, D.: Optimal allocation of interconnecting links in cyber-physical systems: interdependence, cascading failures, and robustness. IEEE Trans. Parallel Distrib. Syst. 23(9), 1708\u20131720 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."}],"container-title":["Journal of Global Optimization"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10898-018-0703-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10898-018-0703-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10898-018-0703-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T09:19:06Z","timestamp":1693905546000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10898-018-0703-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,22]]},"references-count":58,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["703"],"URL":"https:\/\/doi.org\/10.1007\/s10898-018-0703-5","relation":{},"ISSN":["0925-5001","1573-2916"],"issn-type":[{"value":"0925-5001","type":"print"},{"value":"1573-2916","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,22]]},"assertion":[{"value":"30 June 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 September 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}