{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T18:08:27Z","timestamp":1762625307721,"version":"3.41.0"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T00:00:00Z","timestamp":1724803200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T00:00:00Z","timestamp":1724803200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Dyn Games Appl"],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s13235-024-00585-4","type":"journal-article","created":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T10:02:12Z","timestamp":1724839332000},"page":"947-979","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Exploring Centrality Dynamics for Epidemic Control in Complex Networks: An Asymmetrical Centralities Game Approach"],"prefix":"10.1007","volume":"15","author":[{"given":"Willie","family":"Kouam","sequence":"first","affiliation":[]},{"given":"Yezekael","family":"Hayel","sequence":"additional","affiliation":[]},{"given":"Gabriel","family":"Deugoue","sequence":"additional","affiliation":[]},{"given":"Charles","family":"Kamhoua","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,28]]},"reference":[{"key":"585_CR1","doi-asserted-by":"crossref","unstructured":"Baldick R, Chowdhury B, Dobson I, Dong Z, Gou B, Hawkins D, Huang Z, Joung M, Kim J, Kirschen D et\u00a0al (2009) Vulnerability assessment for cascading failures in electric power systems. In: 2009 IEEE\/PES power systems conference and exposition, IEEE, pp 1\u20139","DOI":"10.1109\/PSCE.2009.4839939"},{"key":"585_CR2","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511791383","volume-title":"Dynamical processes on complex networks","author":"A Barrat","year":"2008","unstructured":"Barrat A, Barthelemy M, Vespignani A (2008) Dynamical processes on complex networks. Cambridge University Press, Cambridge"},{"key":"585_CR3","doi-asserted-by":"crossref","first-page":"3682","DOI":"10.1103\/PhysRevLett.86.3682","volume":"86","author":"R Cohen","year":"2001","unstructured":"Cohen R, Erez K, Avraham DB, Havlin S (2001) Breakdown of the internet under intentional attack. Phys Rev Lett 86:3682\u20133685","journal-title":"Phys Rev Lett"},{"key":"585_CR4","doi-asserted-by":"crossref","unstructured":"Ding M, Han P (2006) Reliability assessment to large-scale power grid based on small-world topological model. In: 2006 international conference on power system technology, IEEE, pp 1\u20135","DOI":"10.1109\/ICPST.2006.321525"},{"issue":"2","key":"585_CR5","first-page":"1","volume":"50","author":"CT Do","year":"2017","unstructured":"Do CT, Tran NH, Hong C, Kamhoua CA, Kwiat KA, Blasch E, Ren S, Pissinou N, Iyengar SS (2017) Game theory for cyber security and privacy. ACM Comput Surv (CSUR) 50(2):1\u201337","journal-title":"ACM Comput Surv (CSUR)"},{"key":"585_CR6","doi-asserted-by":"crossref","first-page":"35","DOI":"10.2307\/3033543","volume":"40","author":"LC Freeman","year":"1977","unstructured":"Freeman LC (1977) A set of measures of centrality based on betweenness. Sociometry 40:35\u201341","journal-title":"Sociometry"},{"key":"585_CR7","first-page":"238","volume-title":"Social network: critical concepts in sociology","author":"LC Freeman","year":"2002","unstructured":"Freeman LC et al (2002) Centrality in social networks: conceptual clarification. Social network: critical concepts in sociology, vol 1. Routledge, Londres, pp 238\u2013263"},{"issue":"11","key":"585_CR8","doi-asserted-by":"crossref","first-page":"113043","DOI":"10.1088\/1367-2630\/12\/11\/113043","volume":"12","author":"A Garas","year":"2010","unstructured":"Garas A, Argyrakis P, Rozenblat C, Tomassini M, Havlin S (2010) Worldwide spreading of economic crisis. New J Phys 12(11):113043","journal-title":"New J Phys"},{"key":"585_CR9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s13278-019-0591-9","volume":"9","author":"Z Ghalmane","year":"2019","unstructured":"Ghalmane Z, El Hassouni M, Cherifi H (2019) Immunization of networks with non-overlapping community structure. Soc Netw Anal Min 9:1\u201322","journal-title":"Soc Netw Anal Min"},{"key":"585_CR10","volume-title":"Nmap network scanning: the official Nmap project guide to network discovery and security scanning","author":"Gordon Fyodor Lyon","year":"2009","unstructured":"Gordon Fyodor Lyon (2009) Nmap network scanning: the official Nmap project guide to network discovery and security scanning. Insecure, Sunnyvale, CA"},{"issue":"8","key":"585_CR11","volume":"11","author":"Q Guo","year":"2016","unstructured":"Guo Q, Lei Y, Chengyi Xia L, Guo XJ, Zheng Z (2016) The role of node heterogeneity in the coupled spreading of epidemics and awareness. PLoS ONE 11(8):e0161037","journal-title":"PLoS ONE"},{"key":"585_CR12","doi-asserted-by":"crossref","unstructured":"Hayel Y, Trajanovski S, Altman E, Wang H, Van\u00a0Mieghem P (2014) Complete game-theoretic characterization of sis epidemics protection strategies. In: 53rd IEEE conference on decision and control, IEEE, pp 1179\u20131184","DOI":"10.1109\/CDC.2014.7039541"},{"key":"585_CR13","volume":"65","author":"P Holme","year":"2002","unstructured":"Holme P, Kim BJ, Yoon CN, Han SK (2002) Attack vulnerability of complex networks. Phys Rev E 65:056109","journal-title":"Phys Rev E"},{"issue":"11","key":"585_CR14","doi-asserted-by":"crossref","first-page":"2745","DOI":"10.1080\/00207721.2015.1022890","volume":"47","author":"S Hong","year":"2016","unstructured":"Hong S, Yang H, Zhao T, Ma X (2016) Epidemic spreading model of complex dynamical network with the heterogeneity of nodes. Int J Syst Sci 47(11):2745\u20132752","journal-title":"Int J Syst Sci"},{"key":"585_CR15","doi-asserted-by":"crossref","unstructured":"Hor\u00e1k K, Bo\u0161ansk\u1ef3 B, P\u011bchou\u010dek M (2017) Heuristic search value iteration for one-sided partially observable stochastic games. In: Proceedings of the AAAI conference on artificial intelligence, vol\u00a031","DOI":"10.1609\/aaai.v31i1.10597"},{"key":"585_CR16","doi-asserted-by":"crossref","DOI":"10.4324\/9780203403181","volume-title":"Understanding global security","author":"P Hough","year":"2013","unstructured":"Hough P (2013) Understanding global security. Routledge, London"},{"key":"585_CR17","doi-asserted-by":"crossref","DOI":"10.1515\/9781400841035","volume-title":"Modeling infectious diseases in humans and animals","author":"MJ Keeling","year":"2008","unstructured":"Keeling MJ, Rohani P (2008) Modeling infectious diseases in humans and animals. Princeton University Press, Princeton, NJ"},{"issue":"11","key":"585_CR18","doi-asserted-by":"crossref","first-page":"888","DOI":"10.1038\/nphys1746","volume":"6","author":"M Kitsak","year":"2010","unstructured":"Kitsak M, Gallos LK, Havlin S, Liljeros F, Muchnik L, Stanley HE, Makse HA (2010) Identification of influential spreaders in complex networks. Nat Phys 6(11):888\u2013893","journal-title":"Nat Phys"},{"issue":"7","key":"585_CR19","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias C, Kambourakis G, Stavrou A, Voas J (2017) Ddos in the IoT: Mirai and other botnets. Computer 50(7):80\u201384","journal-title":"Computer"},{"key":"585_CR20","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/978-3-031-50670-3_5","volume-title":"Decision and game theory for security","author":"W Kouam","year":"2023","unstructured":"Kouam W, Hayel Y, Deugou\u00e9 G, Tsemogne O, Kamhoua C (2023) Asymmetric centrality game against network epidemic propagation. Decision and game theory for security. Springer, Cham, pp 86\u2013109"},{"issue":"2","key":"585_CR21","doi-asserted-by":"crossref","first-page":"160","DOI":"10.3934\/jdg.2024001","volume":"11","author":"W Kouam","year":"2024","unstructured":"Kouam W, Hayel Y, Kamhoua C, Deugou\u00e9 G, Tsemogne O (2024) A network centrality game based on a compact representation of defender\u2019s belief for epidemic control. J Dyn Games 11(2):160\u2013196","journal-title":"J Dyn Games"},{"key":"585_CR22","doi-asserted-by":"crossref","unstructured":"Kumaran P, Chitrakala S (2016) A survey on influence spreader identification in online social network. In: 2016 international conference on information communication and embedded systems (ICICES), IEEE, pp 1\u20137","DOI":"10.1109\/ICICES.2016.7518924"},{"issue":"03","key":"585_CR23","doi-asserted-by":"crossref","first-page":"1550037","DOI":"10.1142\/S1793830915500378","volume":"7","author":"H Ma","year":"2015","unstructured":"Ma H, Zhu Y, Li D, Kim D, Liang J (2015) Improving the influence under IC-N model in social networks. Discret Math Algorithms Appl 7(03):1550037","journal-title":"Discret Math Algorithms Appl"},{"issue":"1","key":"585_CR24","doi-asserted-by":"crossref","first-page":"3125","DOI":"10.1038\/s41467-024-47380-8","volume":"15","author":"Y Meng","year":"2024","unstructured":"Meng Y, Cornelius SP, Liu Y-Y, Li A (2024) Dynamics of collective cooperation under personalised strategy updates. Nat Commun 15(1):3125","journal-title":"Nat Commun"},{"key":"585_CR25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s13278-018-0544-8","volume":"9","author":"JS More","year":"2019","unstructured":"More JS, Lingam C (2019) A gradient-based methodology for optimizing time for influence diffusion in social networks. Soc Netw Anal Min 9:1\u201310","journal-title":"Soc Netw Anal Min"},{"issue":"2","key":"585_CR26","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1137\/S003614450342480","volume":"45","author":"MEJ Newman","year":"2003","unstructured":"Newman MEJ (2003) The structure and function of complex networks. SIAM Rev 45(2):167\u2013256","journal-title":"SIAM Rev"},{"key":"585_CR27","first-page":"05","volume":"36","author":"C Nowzari","year":"2015","unstructured":"Nowzari C, Preciado V, Pappas G (2015) Analysis and control of epidemics: a survey of spreading processes on complex networks. IEEE Control Syst 36:05","journal-title":"IEEE Control Syst"},{"issue":"7","key":"585_CR28","doi-asserted-by":"crossref","first-page":"e0220061","DOI":"10.1371\/journal.pone.0220061","volume":"14","author":"S Oldham","year":"2019","unstructured":"Oldham S, Fulcher B, Parkes L, Arnatkevici\u016bt\u0117 A, Suo C, Fornito A (2019) Consistency and differences between centrality measures across distinct classes of networks. PLoS ONE 14(7):e0220061","journal-title":"PLoS ONE"},{"issue":"14","key":"585_CR29","doi-asserted-by":"crossref","first-page":"3200","DOI":"10.1103\/PhysRevLett.86.3200","volume":"86","author":"R Pastor-Satorras","year":"2001","unstructured":"Pastor-Satorras R, Vespignani A (2001) Epidemic spreading in scale-free networks. Phys Rev Lett 86(14):3200","journal-title":"Phys Rev Lett"},{"issue":"3","key":"585_CR30","doi-asserted-by":"crossref","first-page":"925","DOI":"10.1103\/RevModPhys.87.925","volume":"87","author":"R Pastor-Satorras","year":"2015","unstructured":"Pastor-Satorras R, Castellano C, Van Mieghem P, Vespignani A (2015) Epidemic processes in complex networks. Rev Modern Phys 87(3):925","journal-title":"Rev Modern Phys"},{"issue":"2","key":"585_CR31","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.biosystems.2009.10.003","volume":"99","author":"M Perc","year":"2010","unstructured":"Perc M, Szolnoki A (2010) Coevolutionary games-a mini review. BioSystems 99(2):109\u2013125","journal-title":"BioSystems"},{"key":"585_CR32","first-page":"4","volume-title":"Epidemic spreading on complex networks","author":"M Poghosyan","year":"2017","unstructured":"Poghosyan M, Baronchelli A (2017) Epidemic spreading on complex networks. University of London-United Kingdom, London, p 4"},{"issue":"4","key":"585_CR33","doi-asserted-by":"crossref","first-page":"1507","DOI":"10.1109\/TCNS.2017.2728202","volume":"5","author":"JR Riehl","year":"2018","unstructured":"Riehl JR, Cao M (2018) A centrality-based security game for multihop networks. IEEE Trans Control Netw Syst 5(4):1507\u20131516","journal-title":"IEEE Trans Control Netw Syst"},{"key":"585_CR34","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-41187-3","volume-title":"Introduction to cyberdeception","author":"NC Rowe","year":"2016","unstructured":"Rowe NC, Rrushi J et al (2016) Introduction to cyberdeception. Springer, Cham"},{"issue":"3","key":"585_CR35","doi-asserted-by":"crossref","first-page":"032301","DOI":"10.1103\/PhysRevE.93.032301","volume":"93","author":"Z Shen","year":"2016","unstructured":"Shen Z, Cao S, Wang W-X, Di Z, Eugene Stanley H (2016) Locating the source of diffusion in complex networks by time-reversal backward spreading. Phys Rev E 93(3):032301","journal-title":"Phys Rev E"},{"issue":"8","key":"585_CR36","doi-asserted-by":"crossref","first-page":"e37367","DOI":"10.2196\/37367","volume":"24","author":"I Skafle","year":"2022","unstructured":"Skafle I, Nordahl-Hansen A, Quintana DS, Wynn R, Gabarron E (2022) Misinformation about COVID-19 vaccines on social media: rapid review. J Med Internet Res 24(8):e37367","journal-title":"J Med Internet Res"},{"issue":"4","key":"585_CR37","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1109\/TCNS.2015.2426755","volume":"2","author":"S Trajanovski","year":"2015","unstructured":"Trajanovski S, Hayel Y, Altman E, Wang H, Van Mieghem P (2015) Decentralized protection strategies against sis epidemics in networks. IEEE Trans Control Netw Syst 2(4):406\u2013419","journal-title":"IEEE Trans Control Netw Syst"},{"issue":"4","key":"585_CR38","doi-asserted-by":"crossref","first-page":"1682","DOI":"10.1109\/TCNS.2017.2747840","volume":"5","author":"S Trajanovski","year":"2017","unstructured":"Trajanovski S, Kuipers FA, Hayel Y, Altman E, Mieghem PV (2017) Designing virus-resistant, high-performance networks: a game-formation approach. IEEE Trans Control Netw Syst 5(4):1682\u20131692","journal-title":"IEEE Trans Control Netw Syst"},{"issue":"4","key":"585_CR39","doi-asserted-by":"crossref","first-page":"2678","DOI":"10.1109\/JIOT.2021.3081751","volume":"9","author":"O Tsemogne","year":"2021","unstructured":"Tsemogne O, Hayel Y, Kamhoua C, Deugou\u00e9 G (2021) Game theoretic modeling of cyber deception against epidemic botnets in internet of things. IEEE Internet Things J 9(4):2678\u20132687","journal-title":"IEEE Internet Things J"},{"key":"585_CR40","doi-asserted-by":"crossref","unstructured":"Tsemogne O, Hayel Y, Kamhoua C, Deugoue G (2020) Partially observable stochastic games for cyber deception against network epidemic. In: 11th international conference GameSec","DOI":"10.1007\/978-3-030-64793-3_17"},{"key":"585_CR41","doi-asserted-by":"crossref","unstructured":"Tsemogne O, Kouam W, Anwar AH, Hayel Y, Kamhoua C, Deugou\u00e9 G (2022) A network centrality game for epidemic control. In: Decision and game theory for security: 13th international conference, GameSec","DOI":"10.1007\/978-3-031-26369-9_13"},{"issue":"4","key":"585_CR42","volume":"90","author":"W Wang","year":"2014","unstructured":"Wang W, Tang M, Zhang H-F, Gao H, Do Y, Liu Z-H (2014) Epidemic spreading on complex networks with general degree and weight distributions. Phys Rev E 90(4):042803","journal-title":"Phys Rev E"},{"key":"585_CR43","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-38852-2","volume-title":"Modeling information diffusion in online social networks with partial differential equations","author":"H Wang","year":"2020","unstructured":"Wang H, Wang F, Xu K (2020) Modeling information diffusion in online social networks with partial differential equations, vol 7. Springer, Cham"},{"issue":"10","key":"585_CR44","doi-asserted-by":"crossref","first-page":"10058","DOI":"10.1109\/TKDE.2023.3267854","volume":"35","author":"M Waniek","year":"2023","unstructured":"Waniek M, Woznica J, Zhou K, Vorobeychik Y, Michalak TP, Rahwan T (2023) Hiding from centrality measures: a stackelberg game perspective. IEEE Trans Knowl Data Eng 35(10):10058\u201310071","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"585_CR45","volume-title":"Viral marketing for the real world","author":"DJ Watts","year":"2007","unstructured":"Watts DJ, Peretti J, Frumin M (2007) Viral marketing for the real world. Harvard Business School Publishing, Boston"},{"issue":"6","key":"585_CR46","volume":"10","author":"C-Y Xia","year":"2015","unstructured":"Xia C-Y, Meng X-K, Wang Z (2015) Heterogeneous coupling between interdependent lattices promotes the cooperation in the prisoner\u2019s dilemma game. PLoS ONE 10(6):e0129542","journal-title":"PLoS ONE"},{"key":"585_CR47","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/978-3-030-03026-1_5","volume-title":"Science of cyber security","author":"D Yan","year":"2018","unstructured":"Yan D, Liu F, Zhang Y, Jia K, Zhang Y (2018) Characterizing the optimal attack strategy decision in cyber epidemic attacks with limited resources. In: Liu F, Xu S, Yung M (eds) Science of cyber security. Springer, Cham, pp 65\u201380"},{"issue":"11","key":"585_CR48","doi-asserted-by":"crossref","first-page":"4419","DOI":"10.1080\/03610929008830448","volume":"19","author":"A Zaman","year":"1990","unstructured":"Zaman A, Marsaglia G (1990) Random selection of subsets with specified element probabilities. Commun Stat Theory Methods 19(11):4419\u20134434","journal-title":"Commun Stat Theory Methods"}],"container-title":["Dynamic Games and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13235-024-00585-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13235-024-00585-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13235-024-00585-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T05:05:03Z","timestamp":1751432703000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13235-024-00585-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,28]]},"references-count":48,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["585"],"URL":"https:\/\/doi.org\/10.1007\/s13235-024-00585-4","relation":{},"ISSN":["2153-0785","2153-0793"],"issn-type":[{"type":"print","value":"2153-0785"},{"type":"electronic","value":"2153-0793"}],"subject":[],"published":{"date-parts":[[2024,8,28]]},"assertion":[{"value":"22 July 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}}]}}