{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T09:40:02Z","timestamp":1746178802753,"version":"3.40.4"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,4,10]],"date-time":"2014-04-10T00:00:00Z","timestamp":1397088000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["World Wide Web"],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1007\/s11280-014-0275-3","type":"journal-article","created":{"date-parts":[[2014,4,9]],"date-time":"2014-04-09T02:00:31Z","timestamp":1397008831000},"page":"749-766","source":"Crossref","is-referenced-by-count":9,"title":["K-core-based attack to the internet: Is it more malicious than degree-based attack?"],"prefix":"10.1007","volume":"18","author":[{"given":"Jichang","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Junjie","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Mingming","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhiwen","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Xu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,4,10]]},"reference":[{"issue":"6794","key":"275_CR1","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1038\/35019019","volume":"406","author":"R Albert","year":"2000","unstructured":"Albert, R., Jeong, H., Barab\u00e1si, A.L.: Error and attack tolerance of complex networks. Nature 406(6794), 378\u2013382 (2000)","journal-title":"Nature"},{"key":"275_CR2","unstructured":"Alvarez-Hamelin, J.I., Dall\u2019Asta, L., Barrat, A., Vespignani, A.: K-core Decomposition: A Tool for the Visualization of Large Scale Networks. arXiv: cs\/0504107v2 (2005)"},{"key":"275_CR3","doi-asserted-by":"crossref","unstructured":"Bogu\u00f1\u00e1, M., Papadopoulos, F., Krioukov, D.: Sustaining the internet with hyperbolic mapping. Nat. Commun. 1(62) (2010)","DOI":"10.1038\/ncomms1063"},{"key":"275_CR4","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1080\/0022250X.2001.9990249","volume":"25","author":"U Brandes","year":"2001","unstructured":"Brandes, U.: A faster algorithm for betweenness centrality. J. Math. Sociol. 25, 163\u2013177 (2001)","journal-title":"J. Math. Sociol."},{"key":"275_CR5","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1109\/JPROC.2009.2034031","volume":"98","author":"K Butler","year":"2010","unstructured":"Butler, K., Farley, T., McDaniel, P., Rexford, J.: A survey of bgp security issues and solutions. Proc. IEEE 98, 100\u2013122 (2010)","journal-title":"Proc. IEEE"},{"issue":"27","key":"275_CR6","doi-asserted-by":"crossref","first-page":"11150","DOI":"10.1073\/pnas.0701175104","volume":"104","author":"S Carmi","year":"2007","unstructured":"Carmi, S., Havlin, S., Kirkpatrick, S., Shavitt, Y., Shir, E.: A model of internet topology using k-shell decomposition. PNAS 104(27), 11150\u201311154 (2007)","journal-title":"PNAS"},{"key":"275_CR7","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1137\/070710111","volume":"51","author":"A Clauset","year":"2009","unstructured":"Clauset, A., Shalizi, C.R., Newman, M.: Power-law distributions in empirical data. SIAM Rev. 51, 661\u2013703 (2009)","journal-title":"SIAM Rev."},{"key":"275_CR8","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1016\/j.comcom.2009.09.009","volume":"33","author":"RG Clegg","year":"2010","unstructured":"Clegg, R.G., Cairano-Gilfedder, C.D., Zhou, S.: A critical look at power law modelling of the internet. Comput. Commun. 33, 259\u2013268 (2010)","journal-title":"Comput. Commun."},{"issue":"21","key":"275_CR9","doi-asserted-by":"crossref","first-page":"4626","DOI":"10.1103\/PhysRevLett.85.4626","volume":"85","author":"R Cohen","year":"2000","unstructured":"Cohen, R., Erez, K., Ben-Avraham, D., Havlin, S.: Resilience of the internet to random breakdowns. Phys. Rev. Lett. 85(21), 4626\u20134628 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"16","key":"275_CR10","doi-asserted-by":"crossref","first-page":"3682","DOI":"10.1103\/PhysRevLett.86.3682","volume":"86","author":"R Cohen","year":"2001","unstructured":"Cohen, R., Erez, K., Ben-Avraham, D., Havlin, S.: Breakdown of the internet under intentional attack. Phys. Rev. Lett. 86(16), 3682\u20133685 (2001)","journal-title":"Phys. Rev. Lett."},{"issue":"24","key":"275_CR11","doi-asserted-by":"crossref","first-page":"247,901","DOI":"10.1103\/PhysRevLett.91.247901","volume":"91","author":"R Cohen","year":"2003","unstructured":"Cohen, R., Havlin, S., ben Avraham, D.: Efficient immunization strategies for computer networks and populations. Phys. Rev. Lett. 91(24), 247,901 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"275_CR12","unstructured":"Con-ed steals the internet. http:\/\/www.renesys.com\/blog\/2006\/01\/coned_steals_the_net.shtml"},{"key":"275_CR13","doi-asserted-by":"crossref","unstructured":"Cowie, J., Ogielski, A.T., Premore, B.J., Yuan, Y.: Internet worms and global routing instabilities. Proc. SPIE 4868 (2002)","DOI":"10.1117\/12.475269"},{"issue":"4","key":"275_CR14","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/COMST.2007.4444750","volume":"9","author":"B Donnet","year":"2007","unstructured":"Donnet, B., Friedman, T.: Internet topology discovery: a survey. IEEE Commun. Surv. Tutor. 9(4), 2\u201315 (2007)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"275_CR15","doi-asserted-by":"crossref","first-page":"040601","DOI":"10.1103\/PhysRevLett.96.040601","volume":"96","author":"SN Dorogovtsev","year":"2006","unstructured":"Dorogovtsev, S.N., Goltsev, A.V., Mendes, J.: k-core organization of complex networks. Phys. Rev. Lett. 96, 040601 (2006)","journal-title":"Phys. Rev. Lett."},{"key":"275_CR16","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/j.socnet.2004.11.007","volume":"27","author":"M Everett","year":"2005","unstructured":"Everett, M., Borgatti, S.P.: Ego network betweenness. Soc. Netw. 27, 31\u201338 (2005)","journal-title":"Soc. Netw."},{"issue":"11","key":"275_CR17","doi-asserted-by":"crossref","first-page":"113043","DOI":"10.1088\/1367-2630\/12\/11\/113043","volume":"12","author":"A Garas","year":"2010","unstructured":"Garas, A., Argyrakis, P., Rozenblat, C., Tomassini, M., Havlin, S.: Worldwide spreading of economic crisis. New J. Phys. 12(11), 113043 (2010)","journal-title":"New J. Phys."},{"key":"275_CR18","doi-asserted-by":"crossref","first-page":"3197","DOI":"10.1016\/j.comnet.2005.12.010","volume":"50","author":"JL Guillaume","year":"2006","unstructured":"Guillaume, J.L., Latapy, M., Magoni, D.: Relevance of massively distributed explorations of the internet topology: qualitative results. Comput. Netw. 50, 3197\u20133224 (2006)","journal-title":"Comput. Netw."},{"issue":"5","key":"275_CR19","doi-asserted-by":"crossref","first-page":"056109","DOI":"10.1103\/PhysRevE.65.056109","volume":"65","author":"P Holme","year":"2002","unstructured":"Holme, P., Kim, B.J., Yoon, C.N., Han, S.K.: Attack vulnerability of complex networks. Phys. Rev. E 65(5), 056109 (2002)","journal-title":"Phys. Rev. E"},{"key":"275_CR20","doi-asserted-by":"crossref","unstructured":"Huffaker, B., Plummer, D., Moore, D., Claffy, K.C.: Topology discovery by active probing. In: SAINT-W \u201902, pp. 90\u201396 (2002)","DOI":"10.1109\/SAINTW.2002.994558"},{"issue":"3","key":"275_CR21","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1007\/s11280-009-0064-6","volume":"12","author":"H Kil","year":"2009","unstructured":"Kil, H., Oh, S.C., Elmacioglu, E., Nam, W., Lee, D.: Graph theoretic topological analysis of web service networks. World Wide Web 12(3), 321\u2013343 (2009)","journal-title":"World Wide Web"},{"key":"275_CR22","doi-asserted-by":"crossref","first-page":"888","DOI":"10.1038\/nphys1746","volume":"6","author":"M Kitsak","year":"2010","unstructured":"Kitsak, M., Gallos, L.K., Havlin, S., Liljeros, F., Muchnik, L., Stanley, H.E., Makse, H.A.: Identification of influential spreaders in complex networks. Nat. Phys. 6, 888\u2013893 (2010)","journal-title":"Nat. Phys."},{"issue":"22","key":"275_CR23","doi-asserted-by":"crossref","first-page":"228701","DOI":"10.1103\/PhysRevLett.99.228701","volume":"99","author":"JM Kumpula","year":"2007","unstructured":"Kumpula, J.M., Onnela, J.P., Saram\u00e4ki, J., Kaski, K., Kert\u00e9sz, J.: Emergence of communities in weighted networks. Phys. Rev. Lett. 99(22), 228701 (2007)","journal-title":"Phys. Rev. Lett."},{"issue":"19","key":"275_CR24","doi-asserted-by":"crossref","first-page":"198701","DOI":"10.1103\/PhysRevLett.87.198701","volume":"87","author":"V Latora","year":"2001","unstructured":"Latora, V., Marchiori, M.: Efficient behavior of small-world networks. Phys. Rev. Lett. 87(19), 198701 (2001)","journal-title":"Phys. Rev. Lett."},{"key":"275_CR25","doi-asserted-by":"crossref","unstructured":"Liljenstam, M., Yuan, Y., Premore, B.J., Nicol, D.M.: A mixed abstraction level simulation model of large-scale internet worm infestations. In: MASCOTS \u201902, pp. 109\u2013116 (2002)","DOI":"10.1109\/MASCOT.2002.1167067"},{"key":"275_CR26","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1145\/1111322.1111328","volume":"36","author":"P Mahadevan","year":"2006","unstructured":"Mahadevan, P., Krioukov, D., Fomenkov, M., Dimitropoulos, X., Claffy, K.C., Vahdat, A.: The internet as-level topology: three data sources and one definitive metric. SIGCOMM Comput. Commun. Rev. 36, 17\u201326 (2006)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"275_CR27","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1016\/S0378-8733(02)00016-3","volume":"24","author":"PV Marsden","year":"2002","unstructured":"Marsden, P.V.: Egocentric and sociocentric measures of network centrality. Soc. Netw. 24, 407\u2013422 (2002)","journal-title":"Soc. Netw."},{"key":"275_CR28","doi-asserted-by":"crossref","unstructured":"Musial, K., Budka, M., Juszczyszyn, K. Creation and growth of online social network: how do social networks evolve? World Wide Web (2013). doi: 10.1007\/s11280-012-0177-1","DOI":"10.1007\/s11280-012-0177-1"},{"key":"275_CR29","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/s11280-011-0155-z","volume":"16","author":"K Musial","year":"2013","unstructured":"Musial, K., Kazienko, P.: Social networks on the internet. World Wide Web 16, 31\u201372 (2013)","journal-title":"World Wide Web"},{"issue":"14","key":"275_CR30","doi-asserted-by":"crossref","first-page":"3200","DOI":"10.1103\/PhysRevLett.86.3200","volume":"86","author":"R Pastor-Satorras","year":"2001","unstructured":"Pastor-Satorras, R., Vespignani, A.: Epidemic spreading in scale-free networks. Phys. Rev. Lett. 86(14), 3200\u20133203 (2001)","journal-title":"Phys. Rev. Lett."},{"issue":"3","key":"275_CR31","doi-asserted-by":"crossref","first-page":"036104","DOI":"10.1103\/PhysRevE.65.036104","volume":"65","author":"R Pastor-Satorras","year":"2002","unstructured":"Pastor-Satorras, R., Vespignani, A.: Immunization of complex networks. Phys. Rev. E 65(3), 036104 (2002)","journal-title":"Phys. Rev. E"},{"key":"275_CR32","doi-asserted-by":"crossref","unstructured":"Qian, T., Li, Q., Srivastava, J., Peng, Z., Yang, Y., Wang, S.: Exploiting small world property for network clustering. World Wide Web (2013). doi: 10.1007\/s11280-013-0209-5","DOI":"10.1007\/s11280-013-0209-5"},{"key":"275_CR33","doi-asserted-by":"crossref","unstructured":"Rekhter, Y., Li, T., Hares, S.: A border gateway protocol 4 (bgp-4). In: RFC, pp. 4271 (2006)","DOI":"10.17487\/rfc4271"},{"issue":"10","key":"275_CR34","doi-asserted-by":"crossref","first-page":"3838","DOI":"10.1073\/pnas.1009440108","volume":"108","author":"CM Schneider","year":"2011","unstructured":"Schneider, C.M., Moreira, A.A., Andrade, J.S. Jr., Havlin, S., Herrmann, H.J.: Mitigation of malicious attacks on networks. PNAS 108(10), 3838\u20133841 (2011)","journal-title":"PNAS"},{"key":"275_CR35","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1016\/0378-8733(83)90028-X","volume":"5","author":"SB Seidman","year":"1983","unstructured":"Seidman, S.B.: Network structure and minum degree. Soc. Netw. 5, 269\u2013287 (1983)","journal-title":"Soc. Netw."},{"issue":"048","key":"275_CR36","first-page":"701","volume":"106","author":"MA Serrano","year":"2011","unstructured":"Serrano, M.A., Krioukov, D., Bogu\u00f1\u00e1, M.: Percolation in self-similar networks. Phys. Rev. Lett. 106(048), 701 (2011)","journal-title":"Phys. Rev. Lett."},{"key":"275_CR37","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1140\/epjb\/e2010-00057-x","volume":"74","author":"S Shakkottai","year":"2006","unstructured":"Shakkottai, S., Fomenkov, M., Koga, R., Krioukov, D., Claffy, K.: Evolution of the internet as-level ecosystem. Eur. Phys. J. B 74, 271\u2013278 (2006)","journal-title":"Eur. Phys. J. B"},{"key":"275_CR38","doi-asserted-by":"crossref","first-page":"1245","DOI":"10.1016\/j.comnet.2010.03.005","volume":"54","author":"JP Sterbenz","year":"2010","unstructured":"Sterbenz, J.P., Hutchison, D., Cetinkaya, E.K., Jabbar, A., Rohrer, P.J., Sch\u00f6ller, M., Smith, P.: Resilience and survivability in communication networks: strageties, principles, and survey of disciplines. Comput. Netw. 54, 1245\u20131265 (2010)","journal-title":"Comput. Netw."},{"key":"275_CR39","doi-asserted-by":"crossref","unstructured":"Sun, X., Hai, Z.: Modeling and navigation of social information networks in metric spaces. World Wide Web (2013). doi: 10.1007\/s11280-012-0199-8","DOI":"10.1007\/s11280-012-0199-8"},{"issue":"4","key":"275_CR40","doi-asserted-by":"crossref","first-page":"047101","DOI":"10.1103\/PhysRevE.71.047101","volume":"71","author":"T Tanizawa","year":"2005","unstructured":"Tanizawa, T., Paul, G., Cohen, R., Havlin, S., Stanley, H.E.: Optimization of network robustness to waves of targeted and random attacks. Phys. Rev. E 71(4), 047101 (2005)","journal-title":"Phys. Rev. E"},{"key":"275_CR41","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1002\/pmic.200400962","volume":"5","author":"S Wuchty","year":"2005","unstructured":"Wuchty, S., Almaas, E.: Peeling the yeast protein network. Proteomics 5, 444\u2013449 (2005)","journal-title":"Proteomics"},{"issue":"5","key":"275_CR42","first-page":"101","volume":"055","author":"S Xiao","year":"2011","unstructured":"Xiao, S., Xiao, G.: On imperfect node protection in complex communication networks. J. Phys. A: Math. Theor. 055(5), 101 (2011)","journal-title":"J. Phys. A: Math. Theor."},{"key":"275_CR43","doi-asserted-by":"crossref","first-page":"1169","DOI":"10.1016\/j.comnet.2009.11.002","volume":"54","author":"G Yan","year":"2010","unstructured":"Yan, G., Eidenbenz, S., Thulasidasan, S., Datta, P., Ramaswamy, V.: Criticality analysis of internet infrastructure. Comput. Netw. 54, 1169\u20131182 (2010)","journal-title":"Comput. Netw."},{"key":"275_CR44","unstructured":"Youtube hijacking: A ripe ncc ris case study. http:\/\/www.ripe.net\/internet-coordination\/news\/industry-developments\/youtube-hijacking-a-ripe-ncc-ris-case-study"},{"key":"275_CR45","unstructured":"Youtube. http:\/\/www.youtube.com"},{"issue":"12","key":"275_CR46","doi-asserted-by":"crossref","first-page":"123027","DOI":"10.1088\/1367-2630\/10\/12\/123027","volume":"10","author":"GQ Zhang","year":"2008","unstructured":"Zhang, G.Q., Zhang, G.Q., Yang, Q.F., Cheng, S.Q., Zhou, T.: Evolution of the internet and its cores. New J. Phys. 10(12), 123027 (2008)","journal-title":"New J. Phys."},{"key":"275_CR47","doi-asserted-by":"crossref","first-page":"2001","DOI":"10.1016\/j.comcom.2010.07.010","volume":"33","author":"J Zhang","year":"2010","unstructured":"Zhang, J., Zhao, H., Xu, J., Liu, Z.: Characterizing and modeling the internet router-level topology - the hierarchical features and hir model. Comput. Commun. 33, 2001\u20132011 (2010)","journal-title":"Comput. Commun."},{"issue":"19","key":"275_CR48","doi-asserted-by":"crossref","first-page":"195003","DOI":"10.1088\/1751-8113\/42\/19\/195003","volume":"42","author":"J Zhao","year":"2009","unstructured":"Zhao, J., Xu, K.: Enhancing the robustness of scale-free networks. J. Phys. A: Math. Theor. 42(19), 195003 (2009)","journal-title":"J. Phys. A: Math. Theor."},{"key":"275_CR49","doi-asserted-by":"crossref","first-page":"066108","DOI":"10.1103\/PhysRevE.70.066108","volume":"70","author":"S Zhou","year":"2004","unstructured":"Zhou, S., Mondrag\u00f3n, R.J.: Accurately modeling the internet topology. Phys. Rev. E 70, 066108 (2004)","journal-title":"Phys. Rev. E"}],"container-title":["World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-014-0275-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11280-014-0275-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-014-0275-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T09:24:01Z","timestamp":1746177841000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11280-014-0275-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,10]]},"references-count":49,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,5]]}},"alternative-id":["275"],"URL":"https:\/\/doi.org\/10.1007\/s11280-014-0275-3","relation":{},"ISSN":["1386-145X","1573-1413"],"issn-type":[{"type":"print","value":"1386-145X"},{"type":"electronic","value":"1573-1413"}],"subject":[],"published":{"date-parts":[[2014,4,10]]}}}