{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,18]],"date-time":"2025-05-18T04:05:04Z","timestamp":1747541104116,"version":"3.40.5"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s12083-024-01834-4","type":"journal-article","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T06:40:16Z","timestamp":1733985616000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Dynamical repair strategy of data network controllability processes against DoS attack on complex temporal networks"],"prefix":"10.1007","volume":"18","author":[{"given":"Zhixin","family":"Xie","sequence":"first","affiliation":[]},{"given":"Ying","family":"Su","sequence":"additional","affiliation":[]},{"given":"Guangbiao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yishi","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Peyman","family":"Arebi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,12]]},"reference":[{"issue":"12","key":"1834_CR1","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/16\/12\/123055","volume":"16","author":"M P\u00f3sfai","year":"2014","unstructured":"P\u00f3sfai M, H\u00f6vel P (2014) Structural controllability of temporal networks. New J Phys 16(12)","journal-title":"New J Phys"},{"issue":"4","key":"1834_CR2","doi-asserted-by":"publisher","first-page":"1517","DOI":"10.1002\/asjc.2561","volume":"24","author":"L Jiang","year":"2022","unstructured":"Jiang L, Tang L, L\u00fc J (2022) Controllability of multilayer networks. Asian J Control 24(4):1517\u20131527","journal-title":"Asian J Control"},{"key":"1834_CR3","doi-asserted-by":"publisher","first-page":"118886","DOI":"10.1016\/j.eswa.2022.118886","volume":"213","author":"P Arebi","year":"2023","unstructured":"Arebi P, Fatemi A, Ramezani R (2023) Event stream controllability on event-based complex networks. Expert Syst Appl 213:118886","journal-title":"Expert Syst Appl"},{"issue":"10","key":"1834_CR4","first-page":"2005","volume":"15","author":"B Borovic","year":"1917","unstructured":"Borovic B, Liu AQ, Popa D, Cai H, Lewis FL (1917) Open-loop versus closed-loop control of MEMS devices: choices and issues. J Micromech Microeng 15(10):2005","journal-title":"J Micromech Microeng"},{"issue":"5","key":"1834_CR5","doi-asserted-by":"publisher","first-page":"473","DOI":"10.2174\/1574893617666220404145517","volume":"17","author":"H Zhang","year":"2022","unstructured":"Zhang H, Zou Q, Ju Y, Song C, Chen D (2022) Distance-based support vector machine to predict DNA N6-methyladenine modification. Curr Bioinform 17(5):473\u2013482","journal-title":"Curr Bioinform"},{"key":"1834_CR6","doi-asserted-by":"publisher","DOI":"10.1002\/9781118122631","volume-title":"Optimal control","author":"FL Lewis","year":"2012","unstructured":"Lewis FL, Vrabie D, Syrmos VL (2012) Optimal control. Wiley"},{"issue":"D1","key":"1834_CR7","doi-asserted-by":"publisher","first-page":"D1123","DOI":"10.1093\/nar\/gkab957","volume":"50","author":"C Cao","year":"2022","unstructured":"Cao C et al (2022) webTWAS: a resource for disease candidate susceptibility genes identified by transcriptome-wide association study. Nucleic Acids Res 50(D1):D1123\u2013D1130","journal-title":"Nucleic Acids Res"},{"issue":"1","key":"1834_CR8","doi-asserted-by":"publisher","first-page":"e0170584","DOI":"10.1371\/journal.pone.0170584","volume":"12","author":"P Yao","year":"2017","unstructured":"Yao P, Hou B-Y, Pan Y-J, Li X (2017) Structural controllability of temporal networks with a single switching controller. PLoS ONE 12(1):e0170584","journal-title":"PLoS ONE"},{"issue":"1","key":"1834_CR9","doi-asserted-by":"publisher","first-page":"8414","DOI":"10.1038\/ncomms9414","volume":"6","author":"S Gu","year":"2015","unstructured":"Gu S et al (2015) Controllability of structural brain networks. Nat Commun 6(1):8414","journal-title":"Nat Commun"},{"issue":"4","key":"1834_CR10","doi-asserted-by":"publisher","first-page":"e94998","DOI":"10.1371\/journal.pone.0094998","volume":"9","author":"Y Pan","year":"2014","unstructured":"Pan Y, Li X (2014) Structural controllability and controlling centrality of temporal networks. PLoS ONE 9(4):e94998","journal-title":"PLoS ONE"},{"key":"1834_CR11","doi-asserted-by":"publisher","unstructured":"Wu W, Zhang L, Wu Y, Zhao H (2024) Adaptive saturated two-bit-triggered bipartite consensus control for networked MASs with periodic disturbances: a low-computation method. IMA J Math Control Inf dnae002 https:\/\/doi.org\/10.1093\/imamci\/dnae002","DOI":"10.1093\/imamci\/dnae002"},{"key":"1834_CR12","doi-asserted-by":"publisher","unstructured":"Zhao Y, Liang H, Zong G, Wang H (2023) Event-based distributed finite-horizon H_\\infty consensus control for constrained nonlinear multiagent systems. IEEE Syst J. https:\/\/doi.org\/10.1109\/JSYST.2023.3318525","DOI":"10.1109\/JSYST.2023.3318525"},{"key":"1834_CR13","doi-asserted-by":"publisher","unstructured":"Savkin AV, Evans RJ (2002) Hybrid dynamical systems: controller and sensor switching problems. Springer Science and Business Media. https:\/\/doi.org\/10.1007\/978-1-4612-0107-6","DOI":"10.1007\/978-1-4612-0107-6"},{"issue":"3","key":"1834_CR14","doi-asserted-by":"publisher","first-page":"1602","DOI":"10.1137\/16M1107681","volume":"78","author":"M Sun","year":"2018","unstructured":"Sun M, Small M, Lee SS, Fu X (2018) An exploration and simulation of epidemic spread and its control in multiplex networks. SIAM J Appl Math 78(3):1602\u20131631","journal-title":"SIAM J Appl Math"},{"key":"1834_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.trc.2017.08.009","volume":"94","author":"J Wang","year":"2018","unstructured":"Wang J, Kim YH, He X, Peeta S (2018) Analytical model for information flow propagation wave under an information relay control strategy in a congested vehicle-to-vehicle communication environment. Transp Res Part C Emerg Technol 94:1\u201318","journal-title":"Transp Res Part C Emerg Technol"},{"issue":"3","key":"1834_CR16","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.physrep.2012.03.001","volume":"519","author":"P Holme","year":"2012","unstructured":"Holme P, Saram\u00e4ki J (2012) Temporal networks. Phys Rep 519(3):97\u2013125","journal-title":"Phys Rep"},{"key":"1834_CR17","doi-asserted-by":"publisher","first-page":"103384","DOI":"10.1016\/j.artint.2020.103384","volume":"289","author":"S Akmal","year":"2020","unstructured":"Akmal S, Ammons S, Li H, Gao M, Popowski L, Boerkoel JC Jr (2020) Quantifying controllability in temporal networks with uncertainty. Artif Intell 289:103384","journal-title":"Artif Intell"},{"issue":"20","key":"1834_CR18","doi-asserted-by":"publisher","first-page":"14350","DOI":"10.1021\/acs.est.2c01323","volume":"56","author":"J Tan","year":"2022","unstructured":"Tan J et al (2022) Screening of endocrine disrupting potential of surface waters via an affinity-based biosensor in a rural community in the Yellow River Basin, China. Environ Sci Technol 56(20):14350\u201314360","journal-title":"Environ Sci Technol"},{"issue":"2","key":"1834_CR19","doi-asserted-by":"publisher","DOI":"10.3390\/e25020257","volume":"25","author":"K Abbas","year":"2023","unstructured":"Abbas K, Abbasi A, Dong S, Niu L, Chen L, Chen B (2023) A novel temporal network-embedding algorithm for link prediction in dynamic networks. Entropy 25(2)","journal-title":"Entropy"},{"key":"1834_CR20","doi-asserted-by":"publisher","unstructured":"Arebi P, Fatemi A, Ramezani R (2022) An effective Approach based on temporal centrality measures for improving temporal Network Controllability. Cybern Syst 1\u201320. https:\/\/doi.org\/10.1080\/01969722.2022.2159162","DOI":"10.1080\/01969722.2022.2159162"},{"issue":"1","key":"1834_CR21","first-page":"27","volume":"11","author":"P Arebi","year":"2024","unstructured":"Arebi P (2024) Improving AODV routing protocol using a multi-objective mechanism based on repairing broken links on the MANET networks. Int J Mobile Network Des Innov 11(1):27\u201338","journal-title":"Int J Mobile Network Des Innov"},{"key":"1834_CR22","doi-asserted-by":"publisher","unstructured":"Zhao H, Zong G, Wang H, Zhao X, Xu N (2023) Zero-sum game-based hierarchical sliding-mode fault-tolerant tracking control for interconnected nonlinear systems via adaptive critic design. IEEE Trans Autom Sci Eng. https:\/\/doi.org\/10.1109\/TASE.2023.3317902","DOI":"10.1109\/TASE.2023.3317902"},{"issue":"1","key":"1834_CR23","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1080\/23789689.2019.1708175","volume":"7","author":"M Salama","year":"2022","unstructured":"Salama M, Ezzeldin M, El-Dakhakhni W, Tait M (2022) Temporal networks: a review and opportunities for infrastructure simulation. Sustain Resilient Infrastruct 7(1):40\u201355","journal-title":"Sustain Resilient Infrastruct"},{"issue":"6","key":"1834_CR24","doi-asserted-by":"publisher","first-page":"869","DOI":"10.1108\/AA-05-2022-0126","volume":"42","author":"Z Cao","year":"2022","unstructured":"Cao Z, Zhang L, Ahmad AM, Alsaadi FE, Alassafi MO (2022) Adaptive neural prescribed performance control for switched pure-feedback non-linear systems with input quantization. Assembly Autom 42(6):869\u2013880","journal-title":"Assembly Autom"},{"key":"1834_CR25","doi-asserted-by":"publisher","unstructured":"Li F (2024) Improving the efficiency of network controllability processes on temporal networks. J King Saud University-Computer Inform Sci 36:101976. https:\/\/doi.org\/10.1016\/j.jksuci.2024.101976","DOI":"10.1016\/j.jksuci.2024.101976"},{"issue":"9","key":"1834_CR26","doi-asserted-by":"publisher","first-page":"3163","DOI":"10.1109\/TCSI.2020.2986215","volume":"67","author":"Y Lou","year":"2020","unstructured":"Lou Y, Wang L, Tsang K-F, Chen G (2020) Towards optimal robustness of network controllability: an empirical necessary condition. IEEE Trans Circuits Syst I Regul Pap 67(9):3163\u20133174","journal-title":"IEEE Trans Circuits Syst I Regul Pap"},{"issue":"3","key":"1834_CR27","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1049\/cth2.12228","volume":"16","author":"Y Cui","year":"2022","unstructured":"Cui Y, Wu M, Shao C, He S (2022) A temporal segmentation algorithm for restoring the controllability of networked control systems. IET Control Theory Appl 16(3):318\u2013329","journal-title":"IET Control Theory Appl"},{"issue":"3","key":"1834_CR28","doi-asserted-by":"publisher","first-page":"10894","DOI":"10.3182\/20140824-6-ZA-1003.01923","volume":"47","author":"J Ding","year":"2014","unstructured":"Ding J, Lu Y-Z, Chu J (2014) Recovering the controllability of complex networks. IFAC Proc Vol 47(3):10894\u201310901","journal-title":"IFAC Proc Vol"},{"key":"1834_CR29","doi-asserted-by":"publisher","unstructured":"Zhang S, Wolthusen SD (2017) Iterative recovery of controllability via maximum matching. In: 2017 13th IEEE Conference on automation science and engineering (CASE), 328\u2013333. https:\/\/doi.org\/10.1109\/COASE.2017.8256124","DOI":"10.1109\/COASE.2017.8256124"},{"key":"1834_CR30","doi-asserted-by":"crossref","unstructured":"Zhang S, Wolthusen SD (2019) \u201cStructural controllability recovery via the minimum-edge addition\u201d. In: 2019 American Control Conference (ACC).\u00a0IEEE, pp 5822\u20135827","DOI":"10.23919\/ACC.2019.8815176"},{"key":"1834_CR31","doi-asserted-by":"publisher","unstructured":"Ding J, Tan P, Ning Y (2018) Recovering the controllability of the temporal networks. In: 2018 5th International Conference on Information, Cybernetics, and Computational Social Systems (ICCSS) 218\u2013224. https:\/\/doi.org\/10.1109\/ICCSS.2018.8572378","DOI":"10.1109\/ICCSS.2018.8572378"},{"issue":"1","key":"1834_CR32","doi-asserted-by":"publisher","first-page":"8908","DOI":"10.3182\/20110828-6-IT-1002.02862","volume":"44","author":"Z-H Pang","year":"2011","unstructured":"Pang Z-H, Liu GP, Dong Z (2011) Secure networked control systems under denial of service attacks. IFAC Proceedings Volumes 44(1):8908\u20138913","journal-title":"IFAC Proceedings Volumes"},{"issue":"11","key":"1834_CR33","doi-asserted-by":"publisher","first-page":"2930","DOI":"10.1109\/TAC.2015.2416924","volume":"60","author":"C De Persis","year":"2015","unstructured":"De Persis C, Tesi P (2015) Input-to-state stabilizing control under denial-of-service. IEEE Trans Automat Contr 60(11):2930\u20132944","journal-title":"IEEE Trans Automat Contr"},{"key":"1834_CR34","doi-asserted-by":"publisher","unstructured":"Zhang J, Peng C, Masroor S, Sun H, Chai L (2016) Stability analysis of networked control systems with denial-of-service attacks. In: 2016 UKACC 11th international conference on control (CONTROL) 1\u20136. https:\/\/doi.org\/10.1109\/CONTROL.2016.7737622","DOI":"10.1109\/CONTROL.2016.7737622"},{"key":"1834_CR35","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.sysconle.2017.08.003","volume":"108","author":"S Feng","year":"2017","unstructured":"Feng S, Tesi P (2017) Networked control systems under denial-of-service: co-located vs. remote architectures. Syst Control Lett 108:40\u201347","journal-title":"Syst Control Lett"},{"issue":"8","key":"1834_CR36","doi-asserted-by":"publisher","first-page":"3560","DOI":"10.1109\/TAC.2019.2949096","volume":"65","author":"M Wakaiki","year":"2019","unstructured":"Wakaiki M, Cetinkaya A, Ishii H (2019) Stabilization of networked control systems under DoS attacks and output quantization. IEEE Trans Automat Contr 65(8):3560\u20133575","journal-title":"IEEE Trans Automat Contr"},{"issue":"4","key":"1834_CR37","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1007\/s12555-018-0324-2","volume":"17","author":"Y Shen","year":"2019","unstructured":"Shen Y, Zhang W, Ni H, Zhang D, Yu L (2019) Guaranteed cost control of networked control systems with DoS attack and time-varying delay. Int J Control Autom Syst 17(4):811\u2013821","journal-title":"Int J Control Autom Syst"},{"issue":"13","key":"1834_CR38","doi-asserted-by":"publisher","first-page":"5773","DOI":"10.3390\/s23135773","volume":"23","author":"A-WA Saif","year":"2023","unstructured":"Saif A-WA, El-Ferik S, Elkhider SM (2023) Robust stabilization of linear time-delay systems under denial-of-service attacks. Sensors 23(13):5773","journal-title":"Sensors"},{"key":"1834_CR39","doi-asserted-by":"publisher","unstructured":"Rossi R, Ahmed N (2015) The network data repository with interactive graph analytics and visualization. In: Proceedings of the AAAI conference on artificial intelligence. https:\/\/doi.org\/10.1609\/aaai.v29i1.9277","DOI":"10.1609\/aaai.v29i1.9277"},{"key":"1834_CR40","doi-asserted-by":"publisher","first-page":"109252","DOI":"10.1016\/j.ress.2023.109252","volume":"235","author":"S Li","year":"2023","unstructured":"Li S, Liu W, Wu R, Li J (2023) An adaptive attack model to network controllability. Reliab Eng Syst Saf 235:109252","journal-title":"Reliab Eng Syst Saf"},{"key":"1834_CR41","doi-asserted-by":"publisher","first-page":"105780","DOI":"10.1016\/j.cnsns.2021.105780","volume":"98","author":"Y Lou","year":"2021","unstructured":"Lou Y, Wang L, Chen G (2021) A framework of hierarchical attacks to network controllability. Commun Nonlinear Sci Numer Simul 98:105780","journal-title":"Commun Nonlinear Sci Numer Simul"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01834-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01834-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01834-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T09:32:39Z","timestamp":1747474359000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01834-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,12]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["1834"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01834-4","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2024,12,12]]},"assertion":[{"value":"24 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"42"}}