{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,31]],"date-time":"2024-01-31T16:34:12Z","timestamp":1706718852736},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,6,9]],"date-time":"2015-06-09T00:00:00Z","timestamp":1433808000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2016,2]]},"DOI":"10.1007\/s11276-015-0984-2","type":"journal-article","created":{"date-parts":[[2015,6,10]],"date-time":"2015-06-10T16:37:24Z","timestamp":1433954244000},"page":"537-552","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A cooperative forwarding scheme for social preference-based selfishness in mobile social networks"],"prefix":"10.1007","volume":"22","author":[{"given":"Sun-Kyum","family":"Kim","sequence":"first","affiliation":[]},{"given":"Ji-Hyeun","family":"Yoon","sequence":"additional","affiliation":[]},{"given":"JunYeop","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Gi-Young","family":"Jang","sequence":"additional","affiliation":[]},{"given":"Sung-Bong","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,9]]},"reference":[{"key":"984_CR1","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.jnca.2014.01.014","volume":"42","author":"Z Yan","year":"2014","unstructured":"Yan, Z., Peng, Z., & Vasilakos, A. V. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120\u2013134.","journal-title":"Journal of Network and Computer Applications"},{"issue":"6","key":"984_CR2","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/MWC.2013.6704479","volume":"20","author":"Z Sheng","year":"2013","unstructured":"Sheng, Z., Yang, S., Yu, Y., Vasilakos, A. V., Mccann, J., & Leung, K. (2013). A survey on the ietf protocol suite for the internet of things: Standards, challenges, and opportunities. Wireless Communications, 20(6), 91\u201398.","journal-title":"Wireless Communications"},{"issue":"12","key":"984_CR3","doi-asserted-by":"crossref","first-page":"2538","DOI":"10.1109\/JPROC.2013.2257631","volume":"101","author":"M Li","year":"2013","unstructured":"Li, M., Li, Z., & Vasilakos, A. V. (2013). A survey on topology control in wireless sensor networks: Taxonomy, comparative study, and open issues. Proceedings of the IEEE, 101(12), 2538\u20132557.","journal-title":"Proceedings of the IEEE"},{"key":"984_CR4","doi-asserted-by":"crossref","unstructured":"Yao,Y., Cao, Q., & Vasilakos, AV. (2013). EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for wireless sensor networks. In Proceedings of Mobile ad-hoc and sensor systems, 182\u2013190.","DOI":"10.1109\/MASS.2013.44"},{"key":"984_CR5","doi-asserted-by":"crossref","unstructured":"Xiang, L., Luo, J., & Vasilakos, AV. (2011). Compressed data aggregation for energy efficient wireless sensor networks. In Proceedings of Sensor, mesh and ad hoc communications and networks (SECON), 46\u201354.","DOI":"10.1109\/SAHCN.2011.5984932"},{"issue":"3","key":"984_CR6","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1109\/TNSM.2014.2346080","volume":"11","author":"Y Song","year":"2014","unstructured":"Song, Y., Liu, L., Ma, H., & Vasilakos, A. V. (2014). A biology-based algorithm to minimal exposure problem of wireless sensor networks. IEEE Transactions on Network and Service Management, 11(3), 417\u2013430.","journal-title":"IEEE Transactions on Network and Service Management"},{"issue":"5","key":"984_CR7","doi-asserted-by":"crossref","first-page":"760","DOI":"10.1016\/j.adhoc.2011.02.004","volume":"10","author":"H Cheng","year":"2012","unstructured":"Cheng, H., Xiong, N., Vasilakos, A. V., Yang, L. T., Chen, G., & Zhuang, X. (2012). Nodes organization for channel assignment with topology preservation in multi-radio wireless mesh networks. Ad Hoc Networks, 10(5), 760\u2013773.","journal-title":"Ad Hoc Networks"},{"issue":"1","key":"984_CR8","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1109\/JSAC.2012.120111","volume":"30","author":"PB Duarte","year":"2012","unstructured":"Duarte, P. B., Fadlullah, Z. M., Vasilakos, A. V., & Kato, N. (2012). On the partially overlapped channel assignment on wireless mesh network backbone: A game theoretic approach. IEEE Journal on Selected Areas in Communications, 30(1), 119\u2013127.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"1","key":"984_CR9","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1007\/s11036-014-0533-8","volume":"20","author":"M Yang","year":"2015","unstructured":"Yang, M., Li, Y., Jin, D., Zeng, L., Wu, X., & Vasilakos, A. V. (2015). Software-defined and virtualized future mobile and wireless networks: A survey. Mobile Networks and Applications, 20(1), 4\u201318. Software-defined networks.","journal-title":"Mobile Networks and Applications"},{"issue":"1","key":"984_CR10","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/SURV.2013.082713.00184","volume":"16","author":"M Youssef","year":"2014","unstructured":"Youssef, M., Ibrahim, M., Abdelatif, M., Chen, L., & Vasilakos, A. V. (2014). Routing metrics of cognitive radio networks: A survey. Communications Surveys & Tutorials, 16(1), 92\u2013109.","journal-title":"Communications Surveys & Tutorials"},{"issue":"12","key":"984_CR11","doi-asserted-by":"crossref","first-page":"3172","DOI":"10.1109\/JPROC.2012.2208211","volume":"100","author":"AH Attar","year":"2012","unstructured":"Attar, A. H., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. C. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100(12), 3172\u20133186.","journal-title":"Proceedings of the IEEE"},{"issue":"2","key":"984_CR12","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/s11276-012-0457-9","volume":"19","author":"Y Zeng","year":"2013","unstructured":"Zeng, Y., Xiang, K., Li, D., & Vasilakos, A. V. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19(2), 161\u2013173.","journal-title":"Wireless Networks"},{"issue":"1","key":"984_CR13","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1007\/s11036-011-0316-4","volume":"17","author":"X Wang","year":"2012","unstructured":"Wang, X., Vasilakos, A. V., Chen, M., Liu, Y., & Kwon, T. T. (2012). A survey of green mobile networks: Opportunities and challenges. Mobile Networks and Applications, 17(1), 4\u201320.","journal-title":"Mobile Networks and Applications"},{"issue":"1","key":"984_CR14","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/TSMCC.2003.818500","volume":"34","author":"PP Demestichas","year":"2004","unstructured":"Demestichas, P. P., Stavroulaki, V. A. G., Papadopoulou, L. M., Vasilakos, A. V., & Theologou, M. E. (2004). Service configuration and traffic distribution in composite radio environments. IEEE Transactions on Systems, Man, and Cybernetics Part C: Applications and Reviews, 34(1), 69\u201381.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics Part C: Applications and Reviews"},{"key":"984_CR15","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1016\/j.ins.2014.09.019","volume":"293","author":"Y Li","year":"2015","unstructured":"Li, Y., Qian, M., Jin, D., Hui, P., & Vasilakos, A. V. (2015). Revealing the efficiency of information diffusion in online social networks of microblog. Information Sciences, 293, 383\u2013389.","journal-title":"Information Sciences"},{"issue":"1","key":"984_CR16","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/MNET.2014.6724100","volume":"28","author":"D Zhang","year":"2014","unstructured":"Zhang, D., Zhang, D., Xiong, H., Hsu, C. H., & Vasilakos, A. V. (2014). BASA: Building mobile Ad-hoc social networks on top of android. IEEE Network, 28(1), 4\u20139.","journal-title":"IEEE Network"},{"issue":"9","key":"984_CR17","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1109\/MCOM.2010.5560597","volume":"48","author":"M Conti","year":"2010","unstructured":"Conti, M., Giordano, S., May, M., & Passarella, A. (2010). From opportunistic networks to opportunistic computing networks. IEEE Communication Magazine, 48(9), 126\u2013139.","journal-title":"IEEE Communication Magazine"},{"key":"984_CR18","doi-asserted-by":"crossref","unstructured":"Hui, P., Chaintreau, A., Scott, J., Gass, R., Crowcroft, J & Diot, C. (2005). Pocket switched networks and human mobility in conference environments. In Proceedings of ACM SIGCOMM Workshop on Delay-Tolerant Networking, 244\u2013251.","DOI":"10.1145\/1080139.1080142"},{"issue":"3","key":"984_CR19","first-page":"193","volume":"3","author":"H Zafar","year":"2011","unstructured":"Zafar, H., Alhamahmy, N., Harle, D., & Andonovic, I. (2011). Survey of reactive and hybrid routing protocols for mobile ad hoc networks. Communication Networks and Information Security, 3(3), 193\u2013202.","journal-title":"Communication Networks and Information Security"},{"key":"984_CR20","volume-title":"Delay tolerant networks: Protocols and applications","author":"AV Vasilakos","year":"2011","unstructured":"Vasilakos, A. V., Zhang, Y., & Spyropoulos, T. (2011). Delay tolerant networks: Protocols and applications. Boca Raton: CRC Press."},{"issue":"9","key":"984_CR21","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1109\/MCOM.2013.6588663","volume":"51","author":"L Jin","year":"2013","unstructured":"Jin, L., Chen, Y., Wang, T., Hui, P., & Vasilakos, A. V. (2013). Understanding user behavior in online social networks: A survey. Communications Magazine, 51(9), 144\u2013150.","journal-title":"Communications Magazine"},{"issue":"2","key":"984_CR22","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1109\/TSMC.2014.2359857","volume":"45","author":"Y Wang","year":"2015","unstructured":"Wang, Y., Vasilakos, A. V., Ma, J., & Xiong, N. (2015). On studying the impact of uncertainty on behavior diffusion in social networks. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 45(2), 185\u2013197.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"issue":"1","key":"984_CR23","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MC.2010.19","volume":"43","author":"M Conti","year":"2010","unstructured":"Conti, M., & Kumar, M. (2010). Opportunities in opportunistic computing. IEEE Computer, 43(1), 42\u201350.","journal-title":"IEEE Computer"},{"issue":"2","key":"984_CR24","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1109\/TMC.2011.57","volume":"11","author":"J Choi","year":"2012","unstructured":"Choi, J., Shim, K., Lee, S., & Wu, K. (2012). Handling selfishness in replica allocation over a mobile ad hoc network. IEEE Transaction on Mobile Computing, 11(2), 278\u2013291.","journal-title":"IEEE Transaction on Mobile Computing"},{"issue":"1","key":"984_CR25","first-page":"5","volume":"40","author":"LC Freeman","year":"1997","unstructured":"Freeman, L. C. (1997). A set of measures of centrality based on betweenness. Sociometry, 40(1), 5\u201341.","journal-title":"Sociometry"},{"key":"984_CR26","unstructured":"Vahdat, A., & Becker D. (2000). Epidemic routing for partially-connected ad hoc networks. Technical Report CS-2000-06, Duke University."},{"key":"984_CR27","doi-asserted-by":"crossref","unstructured":"Spyropoulos, T., Psounis, K., & Raghavendra C. (2005). Spray and wait: An efficient routing scheme for intermittently connected mobile networks. In Proceedings of ACM SIGCOMM, 252\u2013259.","DOI":"10.1145\/1080139.1080143"},{"key":"984_CR28","doi-asserted-by":"crossref","unstructured":"Wu, J., Xiao, M., & Huang L. (2013). Homing spread: Community home-based multi-copy routing in mobile social networks. In Proceedings of IEEE INFOCOM, 138\u2013146.","DOI":"10.1109\/INFCOM.2013.6567036"},{"key":"984_CR29","unstructured":"Dvir, A., & Vasilakous, AV. (2011). Backpressure-based routing protocol for DTNs. In Proceedings of ACM SIGCOMM, 405\u2013406."},{"key":"984_CR30","unstructured":"Alresaini, M., Sathiamoorthy, M., Krishnamachari, B., & Neely MJ. (2010). Backpressure with adaptive redundancy. In Proceedings of IEEE INFOCOM, 2300\u20132308."},{"key":"984_CR31","unstructured":"Li, P., Guo, S., Yu, S., & Vasilakos AV. (2012). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. In Proceedings of IEEE INFOCOM, 100\u2013108."},{"key":"984_CR32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TCAD.2015.2495196","volume":"99","author":"T Meng","year":"2015","unstructured":"Meng, T., Wu, F., Yang, Z., Chen, G., & Vasilakos, A. V. (2015). Spatial reusability-aware routing in multi-hop wireless networks. IEEE Transactions on Computer, 99, 1\u201313.","journal-title":"IEEE Transactions on Computer"},{"key":"984_CR33","unstructured":"Kim, S., Choi, J., & Yang, S. Hotspot: Location-based forwarding scheme in an opportunistic network. Ad hoc & Sensor Wireless Network, In press."},{"key":"984_CR34","doi-asserted-by":"crossref","unstructured":"Daly, E., & Haahr, M. (2007). Social network analysis for routing in disconnected delay-tolerant MANETs. In Proceedings of ACM MobiHoc, 32\u201340.","DOI":"10.1145\/1288107.1288113"},{"issue":"11","key":"984_CR35","doi-asserted-by":"crossref","first-page":"1576","DOI":"10.1109\/TMC.2010.246","volume":"10","author":"P Hui","year":"2008","unstructured":"Hui, P., Crowcroft, J., & Yoneki, E. (2008). Bubble rap: Social-based forwarding in delay tolerant networks. IEEE Transaction on Mobile Computing, 10(11), 1576\u20131589.","journal-title":"IEEE Transaction on Mobile Computing"},{"key":"984_CR36","doi-asserted-by":"crossref","unstructured":"Mei, A., Morabitto, G., Santi, P., & Stefa, J. (2011). Social-aware stateless forwarding in pocket switched networks, In Proceedings of IEEE INFOCOM, 251\u2013255.","DOI":"10.1109\/INFCOM.2011.5935076"},{"key":"984_CR37","doi-asserted-by":"crossref","unstructured":"P. Hui and J. Crowcroft (2007). How small labels create big improvements. In Proceedings of Pervasive Computing and Communications Workshops, 244\u2013251.","DOI":"10.1109\/PERCOMW.2007.55"},{"issue":"5","key":"984_CR38","doi-asserted-by":"crossref","first-page":"633","DOI":"10.1016\/j.pmcj.2008.04.003","volume":"4","author":"C Boldrini","year":"2008","unstructured":"Boldrini, C., Conti, M., & Passarella, A. (2008). Exploiting users\u2019 social relations to forward data in opportunistic networks: The HiBop solution. Pervasive and Mobile Computing, 4(5), 633\u2013657.","journal-title":"Pervasive and Mobile Computing"},{"key":"984_CR39","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/978-3-540-27767-5_24","volume":"3126","author":"A Lindgren","year":"2004","unstructured":"Lindgren, A., Doria, A., & Schelen, O. (2004). Probabilistic routing in intermittently connected networks. Service Assurance with Partial and Intermittent Resources (LNCS), 3126, 239\u2013254.","journal-title":"Service Assurance with Partial and Intermittent Resources (LNCS)"},{"key":"984_CR40","doi-asserted-by":"crossref","unstructured":"Mtibaa, A., May, M., Diot, C., & Ammar M. (2010). PeopleRank: Social opportunistic forwarding. In Proceedings of IEEE INFOCOM, 1\u20135.","DOI":"10.1109\/INFCOM.2010.5462261"},{"issue":"10","key":"984_CR41","doi-asserted-by":"crossref","first-page":"1171","DOI":"10.1002\/wcm.520","volume":"7","author":"J Leguay","year":"2007","unstructured":"Leguay, J., Friedman, T., & Conan, V. (2007). Evaluating mobyspace based routing strategies in delay tolerant networks. Wireless Communications and Mobile Computing, 7(10), 1171\u20131182.","journal-title":"Wireless Communications and Mobile Computing"},{"key":"984_CR42","doi-asserted-by":"crossref","unstructured":"Erramilli, V., Crovella, M., Chaintreau, A., & Diot, C. (2008). Delegation forwarding. In Proceedings of ACM MobiHoc, 251\u2013259.","DOI":"10.1145\/1374618.1374653"},{"issue":"11","key":"984_CR43","doi-asserted-by":"crossref","first-page":"2238","DOI":"10.1016\/j.mcm.2010.10.008","volume":"53","author":"YS Yen","year":"2011","unstructured":"Yen, Y. S., Chao, H. C., Chang, R. S., & Vasilakos, A. V. (2011). Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs. Mathematical and Computer Modelling, 53(11), 2238\u20132250.","journal-title":"Mathematical and Computer Modelling"},{"key":"984_CR44","doi-asserted-by":"crossref","unstructured":"Busch, C., Kannan, R., & Vasilakos, AV. (2012). Approximating Congestion+Dilation in Networks via Quality of Routing&# x201D. IEEE Transactions on Games. Computers, 61(9), 1270\u20131283.","DOI":"10.1109\/TC.2011.145"},{"issue":"3","key":"984_CR45","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1109\/TNSM.2012.031512.110165","volume":"9","author":"A Cianfrani","year":"2012","unstructured":"Cianfrani, A., Eramo, V., Listanti, M., Polverini, M., & Vasilakos, A. V. (2012). An OSPF-integrated routing strategy for QoS-aware energy saving in IP backbone networks. IEEE Transactions on Network and Service Management, 9(3), 254\u2013267.","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"984_CR46","doi-asserted-by":"crossref","unstructured":"Vasilakos, AV., Ricudis, C., Anagnostakis, K., Pedryca, W., & Pitsillides, A. (1998). Evolutionary-fuzzy prediction for strategic QoS routing in broadband networks. In Proceedings of Fuzzy Systems, 2, 1488\u20131493.","DOI":"10.1109\/FUZZY.1998.686339"},{"issue":"4","key":"984_CR47","doi-asserted-by":"crossref","first-page":"742","DOI":"10.1109\/TMC.2014.2331966","volume":"14","author":"X Zhang","year":"2014","unstructured":"Zhang, X., Zhang, Y., Yan, F., & Vasilakos, A. V. (2014). Interference-based topology control algorithm for delay-constrained mobile ad hoc networks. IEEE Transactions on Mobile Computing, 14(4), 742\u2013754.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"7","key":"984_CR48","doi-asserted-by":"crossref","first-page":"1358","DOI":"10.1109\/JSAC.2011.110803","volume":"29","author":"L Zhou","year":"2011","unstructured":"Zhou, L., Chao, H. C., & Vasilakos, A. V. (2011). Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks. IEEE Journal on Selected Areas in Communications, 29(7), 1358\u20131367.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"8","key":"984_CR49","doi-asserted-by":"crossref","first-page":"1619","DOI":"10.1016\/j.adhoc.2011.07.007","volume":"10","author":"Q Li","year":"2012","unstructured":"Li, Q., Gao, W., Zhu, S., & Cao, G. (2012). A routing protocol for socially selfish delay tolerant networks. Ad Hoc Networks, 10(8), 1619\u20131632.","journal-title":"Ad Hoc Networks"},{"issue":"4","key":"984_CR50","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1109\/TDSC.2012.37","volume":"9","author":"A Mei","year":"2012","unstructured":"Mei, A., & Stefa, J. (2012). Give2Get: Forwarding in social mobile wireless networks of selfish individuals. IEEE Transaction on Dependable Secure Computing, 9(4), 569\u2013582.","journal-title":"IEEE Transaction on Dependable Secure Computing"},{"issue":"1","key":"984_CR51","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1007\/s11276-013-0583-z","volume":"20","author":"VKC Manam","year":"2014","unstructured":"Manam, V. K. C., Mahedran, V., & Murthy, C. S. R. (2014). Performance modeling of DTN routing with heterogeneous and selfish nodes. Wireless Networks, 20(1), 25\u201340.","journal-title":"Wireless Networks"},{"issue":"5","key":"984_CR52","doi-asserted-by":"crossref","first-page":"2224","DOI":"10.1109\/TVT.2011.2149552","volume":"60","author":"Y Li","year":"2011","unstructured":"Li, Y., Su, G., Wu, D. O., Jin, D., Su, L., & Zeng, L. (2011). The impact of node selfishness on multicasting in delay tolerant networks. IEEE Transaction on Vehicular Technology, 60(5), 2224\u20132237.","journal-title":"IEEE Transaction on Vehicular Technology"},{"issue":"6","key":"984_CR53","doi-asserted-by":"crossref","first-page":"1124","DOI":"10.1109\/JSAC.2013.130614","volume":"31","author":"S Yang","year":"2013","unstructured":"Yang, S., Adeel, U., & McCann, J. A. (2013). Selfish mules: Social profit maximization in sparse sensornets using rationally-selfish human relays. IEEE Journal on Selected Areas in Communication, 31(6), 1124\u20131134.","journal-title":"IEEE Journal on Selected Areas in Communication"},{"key":"984_CR54","doi-asserted-by":"crossref","unstructured":"Hui, P., Xu, K., Li, V., Crowcroft, J., Latora, V & Lio, P. (2009). Selfishness, altruism and message spreading in mobile social networks. In Proceedings of IEEE INFOCOM Workshop, 1\u20136.","DOI":"10.1109\/INFCOMW.2009.5072186"},{"issue":"9","key":"984_CR55","doi-asserted-by":"crossref","first-page":"1056","DOI":"10.1016\/j.comcom.2010.01.013","volume":"33","author":"C Boldrini","year":"2010","unstructured":"Boldrini, C., & Passarella, A. (2010). HCMM: Modelling spatial and temporal properties of human mobility driven by users\u2019 social relationships. Computer Communications, 33(9), 1056\u20131074.","journal-title":"Computer Communications"},{"key":"984_CR56","unstructured":"Network simulator-2, http:\/\/www.isi.edu\/nsnam\/ns\/"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-015-0984-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-015-0984-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-015-0984-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T12:56:36Z","timestamp":1566824196000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-015-0984-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,9]]},"references-count":56,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,2]]}},"alternative-id":["984"],"URL":"https:\/\/doi.org\/10.1007\/s11276-015-0984-2","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,6,9]]}}}