{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:57:29Z","timestamp":1775145449597,"version":"3.50.1"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,2,1]],"date-time":"2017-02-01T00:00:00Z","timestamp":1485907200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Syst Sci Complex"],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1007\/s11424-017-6181-x","type":"journal-article","created":{"date-parts":[[2017,2,13]],"date-time":"2017-02-13T04:29:29Z","timestamp":1486960169000},"page":"46-67","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":118,"title":["Complex cyber-physical networks: From cybersecurity to security control"],"prefix":"10.1007","volume":"30","author":[{"given":"Guanghui","family":"Wen","sequence":"first","affiliation":[]},{"given":"Wenwu","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Xinghuo","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Jinhu","family":"L\u00fc","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,14]]},"reference":[{"key":"6181_CR1","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"A L Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si A L and Albert R, Emergence of scaling in random networks. Science, 1999, 286: 509\u2013512.","journal-title":"Science"},{"key":"6181_CR2","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1038\/35065725","volume":"410","author":"S H Strogatz","year":"2001","unstructured":"Strogatz S H, Exploring complex networks. Nature, 2001, 410: 268\u2013276.","journal-title":"Nature"},{"key":"6181_CR3","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1103\/RevModPhys.74.47","volume":"74","author":"R Albert","year":"2002","unstructured":"Albert R and Barab\u00e1si A L, Statistical mechanics of complex networks. Rev. Modern Phys., 2002, 74: 47\u201397.","journal-title":"Rev. Modern Phys."},{"key":"6181_CR4","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1016\/S0378-4371(03)00567-3","volume":"328","author":"X Li","year":"2003","unstructured":"Li X, Jin Y, and Chen G, Complexity and synchronization of the World Trade Web. Physica A, 2003, 328: 287\u2013296.","journal-title":"Physica A"},{"key":"6181_CR5","doi-asserted-by":"crossref","first-page":"1719","DOI":"10.1142\/S0129183109014692","volume":"20","author":"G Wen","year":"2009","unstructured":"Wen G and Duan Z, Dynamics behaviors of weighted local-world evolving netowrks with extended links. Int. J. Modern Phys. C, 2009, 20: 1719\u20131735.","journal-title":"Int. J. Modern Phys. C"},{"key":"6181_CR6","doi-asserted-by":"crossref","first-page":"4012","DOI":"10.1016\/j.physa.2011.06.027","volume":"390","author":"G Wen","year":"2011","unstructured":"Wen G, Duan Z, Chen G, et al., A weighted local-world evolving network model with aging nodes, Physica A, 2011, 390: 4012\u20134026.","journal-title":"Physica A"},{"key":"6181_CR7","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MCAS.2003.1228503","volume":"3","author":"X Wang","year":"2003","unstructured":"Wang X and Chen G, Complex networks: Small-world, scale-free and beyond. IEEE Circuits Syst. Mag., 2003, 3: 6\u201320.","journal-title":"IEEE Circuits Syst. Mag."},{"key":"6181_CR8","first-page":"2074","volume":"51","author":"X Li","year":"2004","unstructured":"Li X, Wang X, and Chen G, Pinning a complex dynamical network to its equilibrium, IEEE Trans. Circuits Syst. I. Reg. Papers, 2004, 51: 2074\u20132087.","journal-title":"Reg. Papers"},{"key":"6181_CR9","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1109\/TAC.2005.849233","volume":"50","author":"J L\u00fc","year":"2005","unstructured":"L\u00fc J and Chen G, A time-varying complex dynamical network model and its controlled synchronization criteria, IEEE Trans. Autom. Control, 2005, 50: 841\u2013846.","journal-title":"IEEE Trans. Autom. Control"},{"key":"6181_CR10","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1109\/MCAS.2010.937887","volume":"10","author":"X Wang","year":"2010","unstructured":"Wang X, Li X, and L\u00fc J, Control and flocking of networked systems via pinning. IEEE Circuits Syst. Mag., 2010, 10: 83\u201391.","journal-title":"IEEE Circuits Syst. Mag."},{"key":"6181_CR11","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1080\/23307706.2014.885293","volume":"1","author":"W Yu","year":"2014","unstructured":"Yu W, Wen G, Yu X, et al., Bridging the gap between complex networks and smart grids, J. Control Decision, 2014, 1: 102\u2013114.","journal-title":"J. Control Decision"},{"key":"6181_CR12","doi-asserted-by":"crossref","first-page":"3239","DOI":"10.1109\/TNNLS.2015.2443064","volume":"26","author":"G Wen","year":"2015","unstructured":"Wen G, Yu W, Hu G, et al., Pinning synchronization of directed networks with switching topologies: A multiple Lyapunov functions approach, IEEE Trans. Neural Netw. Learn. Syst., 2015, 26: 3239\u20133250.","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"6181_CR13","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1109\/TSG.2011.2161892","volume":"2","author":"L Xie","year":"2011","unstructured":"Xie L, Mo Y, and Sinopoli B, Integrity data attacks in power market operations. IEEE Trans. Smart Grid, 2011, 2: 659\u2013666.","journal-title":"IEEE Trans. Smart Grid"},{"key":"6181_CR14","volume-title":"Handbook on Securing Cyber-Physical Critical Infrastructure: Foundation and Challenges","author":"S Das","year":"2012","unstructured":"Das S, Kant K, and Zhang N, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundation and Challenges, Morgan Kaufmann, MA, 2012."},{"key":"6181_CR15","doi-asserted-by":"crossref","first-page":"2715","DOI":"10.1109\/TAC.2013.2266831","volume":"58","author":"F Pasqualetti","year":"2013","unstructured":"Pasqualetti F, Dorfler F, and Bullo F, Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control, 2013, 58: 2715\u20132729.","journal-title":"IEEE Trans. Autom. Control"},{"key":"6181_CR16","doi-asserted-by":"crossref","first-page":"1396","DOI":"10.1109\/TCST.2013.2280899","volume":"22","author":"Y Mo","year":"2014","unstructured":"Mo Y, Chabukswar R, and Sinopoli B, Detecting integrity attacks on SCADA systems. IEEE Trans. Control Syst. Technol., 2014, 22: 1396\u20131407.","journal-title":"IEEE Trans. Control Syst. Technol."},{"key":"6181_CR17","doi-asserted-by":"crossref","first-page":"1145","DOI":"10.1109\/TAC.2014.2350231","volume":"60","author":"Y Mo","year":"2015","unstructured":"Mo Y and Sinopoli B, Secure estimation in the presence of integrity attacks. IEEE Trans. Autom. Control, 2015, 60: 1145\u20131151.","journal-title":"IEEE Trans. Autom. Control"},{"key":"6181_CR18","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MCS.2014.2364709","volume":"35","author":"A Teixeira","year":"2015","unstructured":"Teixeira A, Sou K, Sandberg H, et al., Secure control systems: A quantitative risk management approach, IEEE Control Syst., 2015, 35: 24\u201345.","journal-title":"IEEE Control Syst."},{"key":"6181_CR19","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/TII.2015.2496309","volume":"12","author":"G Wen","year":"2016","unstructured":"Wen G, Hu G, Hu J, et al., Frequency regulation of source-grid-load systems: A compound control strategy, IEEE Trans. Ind. Informat., 2016, 12: 69\u201378.","journal-title":"IEEE Trans. Ind. Informat."},{"key":"6181_CR20","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1038\/35075138","volume":"411","author":"H Jeong","year":"2001","unstructured":"Jeong H, Mason S P, Barab\u00e1si A L, et al., Lethality and centrality in protein networks. Nature, 2001, 411: 41\u201342.","journal-title":"Nature"},{"key":"6181_CR21","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"D J Watts","year":"1998","unstructured":"Watts D J and Strogatz S H, Collective dynamics of \u2018small-world\u2019 networks. Nature, 1998, 393: 440\u2013442.","journal-title":"Nature"},{"key":"6181_CR22","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1038\/35019019","volume":"406","author":"R Albert","year":"2000","unstructured":"Albert R, Jeong H, and Barab\u00e1si A L, Error and attack tolerance of complex networks. Nature, 2000, 406: 378\u2013382.","journal-title":"Nature"},{"key":"6181_CR23","doi-asserted-by":"crossref","first-page":"065102","DOI":"10.1103\/PhysRevE.66.065102","volume":"66","author":"A E Motter","year":"2002","unstructured":"Motter A E and Lai Y C, Cascade-based attacks on complex networks, Phys. Rev. E, 2002, 66: 065102-1\u2013065102-4.","journal-title":"Phys. Rev. E"},{"key":"6181_CR24","doi-asserted-by":"crossref","first-page":"025103","DOI":"10.1103\/PhysRevE.69.025103","volume":"69","author":"R Albert","year":"2004","unstructured":"Albert R, Albert I, and Nakarado G L, Structural vulnerability of the North American power grid. Phys. Rev. E, 2004, 69: 025103-1\u2013025103-4.","journal-title":"Phys. Rev. E"},{"key":"6181_CR25","doi-asserted-by":"crossref","first-page":"043110","DOI":"10.1063\/1.2801687","volume":"17","author":"S Boccaletti","year":"2007","unstructured":"Boccaletti S, Buld\u00fa J, Criado R, et al., Multiscale vulnerability of complex networks, Chaos, 2007, 17: 043110-1\u2013043110-4.","journal-title":"Chaos"},{"key":"6181_CR26","doi-asserted-by":"crossref","first-page":"1291","DOI":"10.1142\/S0129183109014357","volume":"20","author":"J Wang","year":"2009","unstructured":"Wang J and Rong L, Vulnerability of effective attack on edges in scale-free networks due to cascading failures. Int. J. Mod. Phys. C, 2009, 20: 1291\u20131298.","journal-title":"Int. J. Mod. Phys. C"},{"key":"6181_CR27","unstructured":"Cyber-physical systems\u2014A concept map. [Online]. Available: http:\/\/cyberphysicalsystems.org\/."},{"key":"6181_CR28","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MIE.2011.942176","volume":"5","author":"X Yu","year":"2011","unstructured":"Yu X, Cecati C, Dillon T, et al., The new frontier of smart grids, IEEE Ind. Electron. Mag., 2011, 5: 49\u201363.","journal-title":"IEEE Ind. Electron. Mag."},{"key":"6181_CR29","doi-asserted-by":"crossref","first-page":"2005","DOI":"10.1073\/pnas.1212134110","volume":"110","author":"F D\u00f6rfler","year":"2013","unstructured":"D\u00f6rfler F, Chertkov M, and Bullo F, Synchronization in complex oscillator networks and smart grids. Proc. Natl. Acad. Sci. USA, 2013, 110: 2005\u20132010.","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"6181_CR30","doi-asserted-by":"crossref","first-page":"064101","DOI":"10.1103\/PhysRevLett.109.064101","volume":"109","author":"M Rohden","year":"2012","unstructured":"Rohden M, Sorge A, Timme M, et al., Self-organized synchronization in decentralized power grids, Phys. Rev. Lett., 2012, 109: 064101-1\u2013064101-5.","journal-title":"Phys. Rev. Lett."},{"key":"6181_CR31","doi-asserted-by":"crossref","first-page":"1183","DOI":"10.1109\/TSG.2014.2302476","volume":"5","author":"S Liu","year":"2014","unstructured":"Liu S, Chen B, Zourntos T, et al., A coordinated multi-switch attack for cascading failures in smart grid, IEEE Trans. Smart Grid, 2014, 5: 1183\u20131195.","journal-title":"IEEE Trans. Smart Grid"},{"key":"6181_CR32","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori L, Iera A, and Morabito G, The Internet of Things: A survey. Comput. Netw., 2010, 54: 2787\u20132805.","journal-title":"Comput. Netw."},{"key":"6181_CR33","doi-asserted-by":"crossref","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","volume":"10","author":"L Xu","year":"2014","unstructured":"Xu L, He W, and Li S, Internet of Things in industries: A survey. IEEE Trans. Ind. Informat., 2014, 10: 2233\u20132243.","journal-title":"IEEE Trans. Ind. Informat."},{"key":"6181_CR34","doi-asserted-by":"crossref","first-page":"1344","DOI":"10.1016\/j.comnet.2012.12.017","volume":"57","author":"W Wang","year":"2013","unstructured":"Wang W and Lu Z, Cyber security in the smart grid: Survey and challenges. Comput. Netw., 2013, 57: 1344\u20131371.","journal-title":"Comput. Netw."},{"key":"6181_CR35","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1109\/JIOT.2014.2346813","volume":"1","author":"W Tan","year":"2014","unstructured":"Tan W, Xu K, and Wang D, An anti-tracking source-location privacy protection protocol in WSNs based on path extension. IEEE Internet Things J., 2014, 1: 461\u2013471.","journal-title":"IEEE Internet Things J."},{"key":"6181_CR36","doi-asserted-by":"crossref","first-page":"1058","DOI":"10.1109\/JPROC.2015.2503119","volume":"104","author":"X Yu","year":"2016","unstructured":"Yu X and Xue Y, Smart grids: A cyber-physical systems perspective. Proc. IEEE, 2016, 104: 1058\u20131070.","journal-title":"Proc. IEEE"},{"key":"6181_CR37","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/MNET.2016.7437031","volume":"30","author":"K Xu","year":"2016","unstructured":"Xu K, Qu Y, and Yang K, A tutorial on the Internet of Things: From a heterogeneous network integration perspective, IEEE Netw., 2016, 30: 102\u2013108.","journal-title":"IEEE Netw."},{"key":"6181_CR38","first-page":"811","volume-title":"Proc. International Conference on Unmanned Aircraft Systems (ICUAS), Arlington, VA USA. Jun. 7\u201310","author":"L Petnga","year":"2016","unstructured":"Petnga L and Xu H, Security of unmanned aerial vehicles: Dynamic state estimation under cyber-physical attacks, Proc. International Conference on Unmanned Aircraft Systems (ICUAS), Arlington, VA USA. Jun. 7\u201310, 2016, 811\u2013819."},{"key":"6181_CR39","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/TAC.2011.2158130","volume":"57","author":"F Pasqualetti","year":"2012","unstructured":"Pasqualetti F, Bicchi A, and Bullo F, Consensus computation in unreliable networks: A system theoretic approach. IEEE Trans. Autom. Control, 2012, 57: 90\u2013104.","journal-title":"IEEE Trans. Autom. Control"},{"key":"6181_CR40","unstructured":"Stuxnet. Available online: https:\/\/en.wikipedia.org\/wiki\/Stuxnet."},{"key":"6181_CR41","first-page":"21","volume-title":"Nov. 9\u201313","author":"Y Liu","year":"2009","unstructured":"Liu Y, Ning P, and Reiter M K, False data injection attacks against state estimation in electric power grids, Proc. 16th ACM Conference on Computer and Communications Security (CCS\u201909), Chicago, IL. Nov. 9\u201313, 2009, 21\u201332."},{"key":"6181_CR42","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/MC.2011.291","volume":"44","author":"R Roman","year":"2011","unstructured":"Roman R, Najera P, and Lopez J, Securing the Internet of Things. Computer, 2011, 44: 51\u201358.","journal-title":"Computer"},{"key":"6181_CR43","doi-asserted-by":"crossref","first-page":"1151","DOI":"10.1016\/j.sysconle.2013.09.009","volume":"62","author":"G Wen","year":"2013","unstructured":"Wen G, Hu G, Yu W, et al., Consensus tracking for higher-order multi-agents systems with switching directed topologies and occasionally missing control inputs, Syst. Control Lett., 2013, 62: 1151\u20131158.","journal-title":"Syst. Control Lett."},{"key":"6181_CR44","first-page":"66","volume-title":"Proc. 9th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes, Paris, France, Sept. 2\u20134","author":"M Khalili","year":"2015","unstructured":"Khalili M, Zhang X, Polycarpou M, et al., Distributed adaptive fault-tolerant control of uncertain multi-agent systems, Proc. 9th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes, Paris, France, Sept. 2\u20134, 2015, 66\u201371."},{"key":"6181_CR45","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/MCS.2014.2364724","volume":"35","author":"Y Mo","year":"2015","unstructured":"Mo Y, Weerakkody S, and Sinopoli B, Physical authentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs. IEEE Control Syst. Mag., 2015, 35: 93\u2013109.","journal-title":"IEEE Control Syst. Mag."},{"key":"6181_CR46","first-page":"4480","volume-title":"Proc. IEEE 54th Annual Conference on Decision and Control (CDC), Osaka, Japan, Dec. 15\u201318","author":"M Khalili","year":"2015","unstructured":"Khalili M, Zhang X, Cao Y, et al., Distributed adaptive fault-tolerant control of nonlinear uncertain second-order multi-agent systems, Proc. IEEE 54th Annual Conference on Decision and Control (CDC), Osaka, Japan, Dec. 15\u201318, 2015, 4480\u20134485."},{"key":"6181_CR47","doi-asserted-by":"crossref","first-page":"896","DOI":"10.1002\/rnc.3342","volume":"26","author":"Z Feng","year":"2016","unstructured":"Feng Z, Hu G, and Wen G, Distributed consensus tracking for multi-agent systems under two types of attacks. Int. J. Robust and Nonlinear Control, 2016, 26: 896\u2013918.","journal-title":"Int. J. Robust and Nonlinear Control"},{"key":"6181_CR48","doi-asserted-by":"crossref","unstructured":"Riverso S, Boem F, Ferrari-Trecate G, et al., Plug-and-play fault detection and controlreconfiguration for a class of nonlinear large-scale constrained systems, IEEE Trans. Autom. Control, doi: 10.1109\/TAC.2016.2535724.","DOI":"10.1109\/TAC.2016.2535724"},{"key":"6181_CR49","doi-asserted-by":"crossref","unstructured":"Boem F, Ferrari R, Keliris C, et al., A distributed networked approach for fault detection of large-scale systems, IEEE Trans. Autom. Control, doi: 10.1109\/TAC.2016.2539326.","DOI":"10.1109\/TAC.2016.2539326"},{"key":"6181_CR50","doi-asserted-by":"crossref","unstructured":"Feng Z, Wen G, and Hu G, Distributed secure coordinated control for multi-agent systems under strategic attacks, IEEE Trans. Cybern., doi: 10.1109\/TCYB.2016.2544062.","DOI":"10.1109\/TCYB.2016.2544062"},{"key":"6181_CR51","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1109\/TAC.2005.846556","volume":"50","author":"W Ren","year":"2005","unstructured":"Ren W and Beard R W, Consensus seeking in multiagent systems under dynamically changing interaction topologies. IEEE Trans. Autom. Control, 2005, 50: 655\u2013661.","journal-title":"IEEE Trans. Autom. Control"},{"key":"6181_CR52","unstructured":"Poulsen K, Slammer worm crashed Ohio nuke plant network, Available online: http:\/\/www. securityfocus.com\/news\/6767."},{"key":"6181_CR53","unstructured":"NIST framework and roadmap for smart grid interoperability national institute of standards and technology, 2010, Available online: http:\/\/www.nist.gov\/public affairs\/releases\/upload\/ smartgrid interoperability final.pdf."},{"key":"6181_CR54","doi-asserted-by":"crossref","first-page":"813","DOI":"10.1049\/iet-cta.2011.0532","volume":"6","author":"G Wen","year":"2012","unstructured":"Wen G, Duan Z, Su H, et al., A connectivity-preserving flocking algorithm for multi-agent dynamical systems with bounded potential function, IET Control Theory Appl., 2012, 6: 813\u2013821.","journal-title":"IET Control Theory Appl."},{"key":"6181_CR55","doi-asserted-by":"crossref","first-page":"1152","DOI":"10.1109\/TAC.2014.2350391","volume":"60","author":"Z Li","year":"2015","unstructured":"Li Z, Wen G, Duan Z, et al., Designing fully distributed consensus protocols for linear multi-agent systems with directed graphs, IEEE Trans. Autom. Control, 2015, 60: 1152\u20131157.","journal-title":"IEEE Trans. Autom. Control"},{"key":"6181_CR56","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1109\/TCSI.2013.2268091","volume":"61","author":"G Wen","year":"2014","unstructured":"Wen G, Duan Z, Chen G, et al., Consensus tracking of multi-agent systems with Lipschitz-type node dynamics and switching topologies, IEEE Trans. Circuits Syst. I, Reg. Papers, 2014, 61: 499\u2013511.","journal-title":"IEEE Trans. Circuits Syst. I, Reg. Papers"},{"key":"6181_CR57","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.automatica.2009.10.024","volume":"46","author":"Y W Wang","year":"2010","unstructured":"Wang Y W, Wang H O, Xiao J W, et al., Synchronization of complex dynamical networks under recoverable attacks, Automatica, 2010, 46: 197\u2013203.","journal-title":"Automatica"},{"key":"6181_CR58","doi-asserted-by":"crossref","first-page":"4812","DOI":"10.1109\/TPWRS.2013.2272092","volume":"28","author":"G Mokhtari","year":"2013","unstructured":"Mokhtari G, Nourbakhsh G, and Ghosh A, Smart coordination of energy storage units (ESUs) for voltage and loading management in distribution networks. IEEE Trans. Power Syst., 2013, 28: 4812\u20134820.","journal-title":"IEEE Trans. Power Syst."},{"key":"6181_CR59","doi-asserted-by":"crossref","first-page":"1261","DOI":"10.1103\/RevModPhys.87.1261","volume":"87","author":"L Ermann","year":"2015","unstructured":"Ermann L, Frahm K, and Shepelyansky D, Google matrix analysis of directed networks. Rev. Mod. Phys., 2015, 87: 1261\u20131310.","journal-title":"Rev. Mod. Phys."}],"container-title":["Journal of Systems Science and Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-017-6181-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11424-017-6181-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-017-6181-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,22]],"date-time":"2023-08-22T05:55:24Z","timestamp":1692683724000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11424-017-6181-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2]]},"references-count":59,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,2]]}},"alternative-id":["6181"],"URL":"https:\/\/doi.org\/10.1007\/s11424-017-6181-x","relation":{},"ISSN":["1009-6124","1559-7067"],"issn-type":[{"value":"1009-6124","type":"print"},{"value":"1559-7067","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,2]]}}}