{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:08:10Z","timestamp":1771517290222,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Syst Sci Complex"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s11424-019-7420-0","type":"journal-article","created":{"date-parts":[[2019,12,14]],"date-time":"2019-12-14T12:05:42Z","timestamp":1576325142000},"page":"1630-1640","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["Attack and Defense Strategies in Complex Networks Based on Game Theory"],"prefix":"10.1007","volume":"32","author":[{"given":"Yapeng","family":"Li","sequence":"first","affiliation":[]},{"given":"Ye","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,14]]},"reference":[{"key":"7420_CR1","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"D Watts","year":"1998","unstructured":"Watts D and Strogatz S, Cllective dynamics of \u2018small-world\u2019 networks, Nature, 1998, 393: 440\u2013442.","journal-title":"Nature"},{"issue":"5439","key":"7420_CR2","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"A L Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si A L and Albert R, Emergence of scaling in random networks, Science, 1999, 286(5439): 509\u2013512.","journal-title":"Science"},{"issue":"1","key":"7420_CR3","first-page":"xii","volume":"26","author":"R Albert","year":"2002","unstructured":"Albert R and Barab\u00e1si A L, Statistical mechanics of complex networks, Reviews of Modern Physics, 2002, 26(1): xii.","journal-title":"Reviews of Modern Physics"},{"issue":"2","key":"7420_CR4","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1137\/S003614450342480","volume":"45","author":"M Newman","year":"2003","unstructured":"Newman M, The structure and function of complex networks, SIAM Review, 2003, 45(2): 167\u2013256.","journal-title":"SIAM Review"},{"key":"7420_CR5","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.physrep.2005.10.009","volume":"424","author":"S Boccaletti","year":"2006","unstructured":"Boccaletti S, Latora V, Moreno Y, et al., Complex networks: Structure and dynamics, Physics Reports, 2006, 424: 175\u2013308.","journal-title":"Physics Reports"},{"issue":"6794","key":"7420_CR6","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1038\/35019019","volume":"406","author":"R Albert","year":"2000","unstructured":"Albert R, Jeong H, and Barab\u00e1si A L, Error and attack tolerance of complex networks, Nature, 2000, 406(6794): 378\u2013382.","journal-title":"Nature"},{"key":"7420_CR7","doi-asserted-by":"publisher","first-page":"2538","DOI":"10.1073\/pnas.012582499","volume":"99","author":"J M Carlson","year":"2002","unstructured":"Carlson J M and Doyle J, Complexity and robustness, Proceedings of the National Academy of Sciences of the United States of America, 2002, 99: 2538\u20132545.","journal-title":"Proceedings of the National Academy of Sciences of the United States of America"},{"issue":"7","key":"7420_CR8","doi-asserted-by":"publisher","first-page":"2138","DOI":"10.1088\/0256-307X\/24\/7\/098","volume":"24","author":"J Wu","year":"2007","unstructured":"Wu J, Tan Y J, Deng H Z, et al., A robustness model of complex networks with tunable attack information parameter, Chinese Physics Letters, 2007, 24(7): 2138\u20132141.","journal-title":"Chinese Physics Letters"},{"issue":"11","key":"7420_CR9","doi-asserted-by":"publisher","first-page":"2665","DOI":"10.1088\/1751-8113\/40\/11\/005","volume":"40","author":"J Wu","year":"2007","unstructured":"Wu J, Deng H Z, Tan Y J, et al., Vulnerability of complex networks under intentional attack with incomplete information, Journal of Physics A, 2007, 40(11): 2665.","journal-title":"Journal of Physics A"},{"issue":"7","key":"7420_CR10","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1080\/00207721003605468","volume":"42","author":"J B Wu","year":"2011","unstructured":"Wu J, Barahona, Tan Y J, et al., Robustness of regular ring lattices based on natural connectivity, International Journal of Systems Science, 2011, 42(7): 1085\u20131092.","journal-title":"International Journal of Systems Science"},{"issue":"1","key":"7420_CR11","doi-asserted-by":"publisher","first-page":"7559","DOI":"10.1038\/s41598-017-07878-2","volume":"7","author":"J Wu","year":"2017","unstructured":"Wu J, Tan S Y, Liu Z, et al., Enhancing structural robustness of scale-free networks by information disturbance, Scientific Reports, 2017, 7(1): 7559.","journal-title":"Scientific Reports"},{"issue":"26","key":"7420_CR12","doi-asserted-by":"publisher","first-page":"6671","DOI":"10.1016\/j.physa.2008.08.037","volume":"387","author":"J W Wang","year":"2008","unstructured":"Wang J W, Rong L L, Zhang L, et al., Attack vulnerability of scale-free networks due to cascading failures, Physica A Statistical Mechanics & Its Applications, 2008, 387(26): 6671\u20136678.","journal-title":"Physica A Statistical Mechanics & Its Applications"},{"issue":"10","key":"7420_CR13","doi-asserted-by":"publisher","first-page":"3838","DOI":"10.1073\/pnas.1009440108","volume":"108","author":"C M Schneider","year":"2011","unstructured":"Schneider C M, Moreira A, Andrade J, et al., Mitigation of malicious attacks on networks, Proceedings of the National Academy of Sciences of the United States of America, 2011, 108(10): 3838.","journal-title":"Proceedings of the National Academy of Sciences of the United States of America"},{"issue":"7590","key":"7420_CR14","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1038\/nature16948","volume":"530","author":"J Gao","year":"2016","unstructured":"Gao J, Barzel B, and Barab\u00e1si A L, Universal resilience patterns in complex networks, Nature, 2016, 530(7590): 307.","journal-title":"Nature"},{"issue":"14","key":"7420_CR15","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1142\/S0217984906010883","volume":"20","author":"J G Liu","year":"2006","unstructured":"Liu J G, Wang Z T, and Dang Y Z, Optimization of robustness and connectivity in complex networks, Modern Physics Letters B, 2006, 20(14): 815\u2013820.","journal-title":"Modern Physics Letters B"},{"issue":"11","key":"7420_CR16","doi-asserted-by":"publisher","first-page":"118702","DOI":"10.1103\/PhysRevLett.92.118702","volume":"92","author":"A X Valente","year":"2004","unstructured":"Valente A X, Sarkar A, and Stone H A, Two-peak and three-peak optimal complex networks, Physical Review Letters, 2004, 92(11): 118702.","journal-title":"Physical Review Letters"},{"issue":"6","key":"7420_CR17","doi-asserted-by":"publisher","first-page":"068701","DOI":"10.1103\/PhysRevLett.90.068701","volume":"90","author":"B Shargel","year":"2003","unstructured":"Shargel B, Sayama H, Epstein I R, et al., Optimization of robustness and connectivity in complex networks, Physical Review Letters, 2003, 90(6): 068701.","journal-title":"Physical Review Letters"},{"issue":"16","key":"7420_CR18","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1142\/S0217984905008773","volume":"19","author":"J G Liu","year":"2005","unstructured":"Liu J G, Wang Z T, and Dang Y Z, Optimization of robustness of scale-free network to random and targeted attacks, Modern Physics Letters B, 2005, 19(16): 785\u2013792.","journal-title":"Modern Physics Letters B"},{"key":"7420_CR19","doi-asserted-by":"publisher","first-page":"37317","DOI":"10.1038\/srep37317","volume":"6","author":"G S Peng","year":"2016","unstructured":"Peng G S, Tan S Y, Wu J, et al., Trade-offs between robustness and small-world effect in complex networks, Scientific Reports, 2016, 6: 37317.","journal-title":"Scientific Reports"},{"issue":"1","key":"7420_CR20","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1016\/j.physa.2007.02.080","volume":"380","author":"Y Hayashi","year":"2007","unstructured":"Hayashi Y and Matsukubo J, Improvement of the robustness on geographical networks by adding shortcuts, Physica A Statistical Mechanics & Its Applications, 2007, 380(1): 552\u2013562.","journal-title":"Physica A Statistical Mechanics & Its Applications"},{"issue":"6","key":"7420_CR21","doi-asserted-by":"publisher","first-page":"068901","DOI":"10.1088\/0256-307X\/27\/6\/060504","volume":"27","author":"Y Li","year":"2010","unstructured":"Li Y, Wu J, and Zou A Q, Effect of eliminating edges on robustness of scale-free networks under intentional attack, Chinese Physics Letters, 2010, 27(6): 068901.","journal-title":"Chinese Physics Letters"},{"issue":"1","key":"7420_CR22","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1016\/j.physa.2006.12.058","volume":"380","author":"J Ash","year":"2007","unstructured":"Ash J and Newth D, Optimizing complex networks for resilience against cascading failure, Physica A Statistical Mechanics & Its Applications, 2007, 380(1): 673\u2013683.","journal-title":"Physica A Statistical Mechanics & Its Applications"},{"issue":"6","key":"7420_CR23","doi-asserted-by":"publisher","first-page":"066130","DOI":"10.1103\/PhysRevE.85.066130","volume":"85","author":"A Zeng","year":"2012","unstructured":"Zeng A and Liu W P, Enhancing network robustness against malicious attacks, Physical Review E Statistical Nonlinear & Soft Matter Physics, 2012, 85(6): 066130.","journal-title":"Physical Review E Statistical Nonlinear & Soft Matter Physics"},{"key":"7420_CR24","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.physa.2015.08.043","volume":"442","author":"Y Deng","year":"2012","unstructured":"Deng Y, Wu J, and Tan Y J, Optimal attack strategy of complex networks based on tabu search, Physica A Statistical Mechanics & Its Applications, 2012, 442: 74\u201381.","journal-title":"Physica A Statistical Mechanics & Its Applications"},{"key":"7420_CR25","doi-asserted-by":"publisher","first-page":"22916","DOI":"10.1038\/srep22916","volume":"6","author":"S Y Tan","year":"2016","unstructured":"Tan S Y, Wu J, L\u00fc L Y, et al., Efficient network disintegration under incomplete information: The comic effect of link prediction, Scientific Reports, 2016, 6: 22916.","journal-title":"Scientific Reports"},{"issue":"5","key":"7420_CR26","doi-asserted-by":"publisher","first-page":"056109","DOI":"10.1103\/PhysRevE.65.056109","volume":"65","author":"P Holme","year":"2002","unstructured":"Holme P, Kim B J, Yoon C N, et al., Attack vulnerability of complex networks, Physical Review E Statistical Nonlinear & Soft Matter Physics, 2002, 65(5): 056109.","journal-title":"Physical Review E Statistical Nonlinear & Soft Matter Physics"},{"issue":"1","key":"7420_CR27","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1109\/TR.2006.884599","volume":"56","author":"G Levitin","year":"2007","unstructured":"Levitin G, Optimal defense strategy against intentional attacks, IEEE Transactions on Reliability, 2007, 56(1): 148\u2013157.","journal-title":"IEEE Transactions on Reliability"},{"key":"7420_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.physrep.2016.06.007","volume":"650","author":"L Y L\u00fc","year":"2016","unstructured":"L\u00fc L Y, Chen D B, Ren X L, et al., Vital nodes identification in complex networks, Physics Reports, 2016, 650: 1\u201363.","journal-title":"Physics Reports"},{"issue":"18","key":"7420_CR29","doi-asserted-by":"publisher","first-page":"4154","DOI":"10.1016\/j.physa.2013.04.037","volume":"392","author":"J G Liu","year":"2013","unstructured":"Liu J G, Ren Z M, and Guo Q, Ranking the spreading influence in complex networks, Physica A Statistical Mechanics & Its Applications, 2013, 392(18): 4154\u20134159.","journal-title":"Physica A Statistical Mechanics & Its Applications"},{"issue":"1","key":"7420_CR30","first-page":"13","volume":"5","author":"K Hausken","year":"2009","unstructured":"Hausken K, Strategic defense and attack of complex networks, International Journal of Performability Engineering, 2009, 5(1): 13\u201330.","journal-title":"International Journal of Performability Engineering"},{"key":"7420_CR31","volume-title":"A Course in Game Theory","author":"M J Osborne","year":"1994","unstructured":"Osborne M J and Rubinstein A, A Course in Game Theory, MIT Press, MA, 1994."}],"container-title":["Journal of Systems Science and Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-019-7420-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11424-019-7420-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-019-7420-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,13]],"date-time":"2020-12-13T00:04:35Z","timestamp":1607817875000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11424-019-7420-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":31,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["7420"],"URL":"https:\/\/doi.org\/10.1007\/s11424-019-7420-0","relation":{},"ISSN":["1009-6124","1559-7067"],"issn-type":[{"value":"1009-6124","type":"print"},{"value":"1559-7067","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"7 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 May 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 December 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}