{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T17:11:20Z","timestamp":1763572280977,"version":"3.40.5"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,12,3]],"date-time":"2014-12-03T00:00:00Z","timestamp":1417564800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1007\/s11432-014-5182-9","type":"journal-article","created":{"date-parts":[[2014,12,2]],"date-time":"2014-12-02T20:44:41Z","timestamp":1417553081000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Strategies for network security"],"prefix":"10.1007","volume":"58","author":[{"given":"AngSheng","family":"Li","sequence":"first","affiliation":[]},{"given":"XueChen","family":"Li","sequence":"additional","affiliation":[]},{"given":"YiCheng","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,3]]},"reference":[{"key":"5182_CR1","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1126\/science.1173299","volume":"325","author":"A Barab\u00e1si","year":"2009","unstructured":"Barab\u00e1si A. Scale-free networks: a decade and beyond. Science, 2009, 325: 412\u2013413","journal-title":"Science"},{"key":"5182_CR2","first-page":"290","volume":"6","author":"P Erd\u00f6s","year":"1959","unstructured":"Erd\u00f6s P, R\u00e9nyi A. On random graphs. Publ Math, 1959, 6: 290\u2013297","journal-title":"Publ Math"},{"key":"5182_CR3","first-page":"17","volume":"5","author":"P Erd\u00f6s","year":"1960","unstructured":"Erd\u00f6s P, R\u00e9nyi A. On the evolution of random graphsrandom graphs. Magyar Tud Akad Mat, 1960, 5: 17\u201361","journal-title":"Magyar Tud Akad Mat"},{"key":"5182_CR4","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"A Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si A, Albert R. Emergence of scaling in random networks. Science, 1999, 286: 509\u2013512","journal-title":"Science"},{"key":"5182_CR5","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1038\/35019019","volume":"406","author":"R Albert","year":"2000","unstructured":"Albert R, Jeong H, Barab\u00e1si A. Error and attack tolerance of complex networks. Nature, 2000, 406: 378\u2013381","journal-title":"Nature"},{"key":"5182_CR6","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198545996.001.0001","volume-title":"Infectious Diseases of Humans: Dynamics and Control","author":"R M Andersen","year":"1991","unstructured":"Andersen R M, May R M. Infectious Diseases of Humans: Dynamics and Control. New York: Oxford University Press, 1991"},{"key":"5182_CR7","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1145\/956750.956769","volume-title":"Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"D Kempe","year":"2003","unstructured":"Kempe D, Kleinberg J, Tardos \u00c9. Maximizing the spread of influence through a social network. In: Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2003. 137\u2013146"},{"key":"5182_CR8","doi-asserted-by":"crossref","first-page":"1127","DOI":"10.1007\/11523468_91","volume-title":"Proceedings of the 32nd International Conference on Automata, Languages and Programming","author":"D Kempe","year":"2005","unstructured":"Kempe D, Kleinberg J, Tardos \u00c9. Influential nodes in a diffusion model for social networks. In: Proceedings of the 32nd International Conference on Automata, Languages and Programming, 2005. 1127\u20131138"},{"key":"5182_CR9","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1111\/1467-937X.00121","volume":"67","author":"S Morris","year":"2000","unstructured":"Morris S. Contagion. Rev Econ Stud, 2000, 67: 57\u201378","journal-title":"Rev Econ Stud"},{"key":"5182_CR10","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1126\/science.1173644","volume":"325","author":"F Schweitzer","year":"2009","unstructured":"Schweitzer F, Fagiolo G, Sornette D, et al. Economic networks: the new challenge. Science, 2009, 325: 422\u2013425","journal-title":"Science"},{"key":"5182_CR11","doi-asserted-by":"crossref","first-page":"219801","DOI":"10.1103\/PhysRevLett.87.219802","volume":"87","author":"R Cohen","year":"2001","unstructured":"Cohen R, Reez K, Ben-Avraham D, et al. Breakdown of the internet intentional attack. Phys Rev Lett, 2001, 87: 219801","journal-title":"Phys Rev Lett"},{"key":"5182_CR12","doi-asserted-by":"crossref","first-page":"098701","DOI":"10.1103\/PhysRevLett.93.098701","volume":"93","author":"A E Motter","year":"2004","unstructured":"Motter A E. Cascade control and defense in complex networks. Phys Rev Lett, 2004, 93: 098701","journal-title":"Phys Rev Lett"},{"key":"5182_CR13","first-page":"5766","volume-title":"Proceedings of the National Academy of Sciences","author":"D J Watta","year":"2002","unstructured":"Watta D J. A simple model of global cascades on random networks. In: Proceedings of the National Academy of Sciences, 2002. 5766\u20135771"},{"key":"5182_CR14","doi-asserted-by":"crossref","first-page":"3200","DOI":"10.1103\/PhysRevLett.86.3200","volume":"86","author":"R Pastor-Satorras","year":"2001","unstructured":"Pastor-Satorras R, Vespignani A. Epidemic spreading in scale-free networks. Phys Rev Lett, 2001, 86: 3200\u20133203","journal-title":"Phys Rev Lett"},{"key":"5182_CR15","doi-asserted-by":"crossref","first-page":"118702","DOI":"10.1103\/PhysRevLett.92.118702","volume":"92","author":"A X Valente","year":"2004","unstructured":"Valente A X, Sarkar A, Stone H A. Two-peak and three-peak optimal complex networks. Phys Rev Lett, 2004, 92: 118702","journal-title":"Phys Rev Lett"},{"key":"5182_CR16","doi-asserted-by":"crossref","first-page":"047101","DOI":"10.1103\/PhysRevE.71.047101","volume":"71","author":"T Tanizawa","year":"2005","unstructured":"Tanizawa T, Paul R, Cohen G, et al. Optimization of network robustness to waves of targeted and random attacks. Phys Rev E, 2005, 71: 047101","journal-title":"Phys Rev E"},{"key":"5182_CR17","doi-asserted-by":"crossref","first-page":"247901","DOI":"10.1103\/PhysRevLett.91.247901","volume":"91","author":"R Cohen","year":"2003","unstructured":"Cohen R, Havlin S, Avraham D. Efficient immunization strategies for computer networks and populations. Phys Rev Lett, 2003, 91: 247901","journal-title":"Phys Rev Lett"},{"key":"5182_CR18","first-page":"3838","volume-title":"Proceedings of the National Academy of Sciences","author":"C M Schneider","year":"2011","unstructured":"Schneider C M, Moreire A A, Andrade J J S, et al. Mitigation of malicious attacks on networks. In: Proceedings of the National Academy of Sciences, 2011. 3838\u20133841"},{"key":"5182_CR19","first-page":"12758","volume-title":"Proceedings of the National Academy of Sciences","author":"O Simsek","year":"2008","unstructured":"Simsek O, Jensen D. Navigating networks by using homophily and degree. In: Proceedings of the National Academy of Sciences, 2008. 12758\u201312762"},{"key":"5182_CR20","volume-title":"The Art of War","author":"Tzu Sun","year":"2007","unstructured":"Sun Tzu. The Art of War. Minneapolis: Filiquarian Publishing, 2007"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-014-5182-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-014-5182-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-014-5182-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T22:37:40Z","timestamp":1747175860000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-014-5182-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,3]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1]]}},"alternative-id":["5182"],"URL":"https:\/\/doi.org\/10.1007\/s11432-014-5182-9","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"type":"print","value":"1674-733X"},{"type":"electronic","value":"1869-1919"}],"subject":[],"published":{"date-parts":[[2014,12,3]]}}}