{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T17:11:41Z","timestamp":1771261901448,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T00:00:00Z","timestamp":1709164800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T00:00:00Z","timestamp":1709164800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2024,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Exploration in complex networks has surged. Centrality measures play a pivotal role in pinpointing essential components within these networks. Previous work focus on nodes with the highest Betweenness centrality through extensive simulations. This paper analyzes the attack and\/or defense strategy using one more centrality metric, bridging centrality and Bridging-Betweenness Fusion Attack (combination of both betweenness and bridging centrality). Our two-fold contribution is (1) Using high centrality removal as an attacking strategy and inspired by the dynamic node removal process, recalculated node method after each node removal is proposed. (2) In our defense techniques, new nodes are added to existing lower centrality nodes. They are added after attacks to restore the graph\u2019s connectivity according to proposed defense strategies. Note that some attacks and defense techniques were already introduced while others are presented first time, e.g., the combination of two centrality measures for attack and a bridging-based defense strategy. This innovative approach presents a promising advancement in enhancing the resilience and fortification of complex networks against potential attacks, signifying a notable advantage of this work.<\/jats:p>","DOI":"10.1007\/s40747-024-01354-x","type":"journal-article","created":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T10:02:33Z","timestamp":1709200953000},"page":"3907-3923","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Complex networks after centrality-based attacks and defense"],"prefix":"10.1007","volume":"10","author":[{"given":"Maham","family":"Zafar","sequence":"first","affiliation":[]},{"given":"Kashif","family":"Kifayat","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5854-1075","authenticated-orcid":false,"given":"Ammara","family":"Gul","sequence":"additional","affiliation":[]},{"given":"Usman","family":"Tahir","sequence":"additional","affiliation":[]},{"given":"Sarah Abu","family":"Ghazalah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,29]]},"reference":[{"issue":"12","key":"1354_CR1","doi-asserted-by":"publisher","first-page":"1670","DOI":"10.3390\/brainsci12121670","volume":"12","author":"H Sigmundsson","year":"2022","unstructured":"Sigmundsson H, Th\u00f3rsd\u00f3ttir HS, Nj\u00e1lsd\u00f3ttir HR, Hjaltal\u00edn ST (2022) Reading: From the simple to the complex. Brain Sci 12(12):1670. https:\/\/doi.org\/10.3390\/brainsci12121670","journal-title":"Brain Sci"},{"issue":"2","key":"1354_CR2","doi-asserted-by":"publisher","first-page":"111","DOI":"10.31887\/DCNS.2018.20.2\/osporns","volume":"20","author":"O Sporns","year":"2022","unstructured":"Sporns O (2022) Graph theory methods: applications in brain networks. Dialogues Clin Neurosci 20(2):111\u2013121. https:\/\/doi.org\/10.31887\/DCNS.2018.20.2\/osporns","journal-title":"Dialogues Clin Neurosci"},{"issue":"2","key":"1354_CR3","doi-asserted-by":"publisher","first-page":"91","DOI":"10.11188\/seisankenkyu.65.91","volume":"65","author":"A Kumar","year":"2013","unstructured":"Kumar A, Banno A, Ono S, Oishi T, Ikeuchi K (2013) Global coordinate adjustment of the 3d survey models under unstable gps condition. Seisan Kenkyu 65(2):91\u201395. https:\/\/doi.org\/10.11188\/seisankenkyu.65.91","journal-title":"Seisan Kenkyu"},{"issue":"2","key":"1354_CR4","doi-asserted-by":"publisher","first-page":"101","DOI":"10.11188\/seisankenkyu.66.101","volume":"66","author":"A Kumar","year":"2014","unstructured":"Kumar A, Sato Y, Oishi T, Ono S, Ikeuchi K (2014) Improving gps position accuracy by identification of reflected gps signals using range data for modeling of urban structures. Seisan Kenkyu 66(2):101\u2013107. https:\/\/doi.org\/10.11188\/seisankenkyu.66.101","journal-title":"Seisan Kenkyu"},{"issue":"1","key":"1354_CR5","doi-asserted-by":"publisher","first-page":"015-012","DOI":"10.1088\/2632-072X\/ac54c3","volume":"3","author":"L Fontoura Costa","year":"2022","unstructured":"Fontoura Costa L (2022) Coincidence complex networks. J Phys Complex 3(1):015\u2013012. https:\/\/doi.org\/10.1088\/2632-072X\/ac54c3","journal-title":"J Phys Complex"},{"issue":"1","key":"1354_CR6","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1109\/TCSII.2017.2705758","volume":"65","author":"Z Chen","year":"2017","unstructured":"Chen Z, Wu J, Xia Y, Zhang X (2017) Robustness of interdependent power grids and communication networks: a complex network perspective. IEEE Trans Circuits Syst II Express Briefs 65(1):115\u2013119. https:\/\/doi.org\/10.1109\/TCSII.2017.2705758","journal-title":"IEEE Trans Circuits Syst II Express Briefs"},{"issue":"6","key":"1354_CR7","doi-asserted-by":"publisher","first-page":"5915","DOI":"10.1109\/TKDE.2022.3163672","volume":"35","author":"S Freitas","year":"2022","unstructured":"Freitas S, Yang D, Kumar S, Tong H, Chau DH (2022) Graph vulnerability and robustness: a survey. IEEE Trans Knowl Data Eng 35(6):5915\u20135934. https:\/\/doi.org\/10.1109\/TKDE.2022.3163672","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1354_CR8","doi-asserted-by":"publisher","first-page":"93123","DOI":"10.1109\/ACCESS.2019.2928058","volume":"7","author":"W Liu","year":"2019","unstructured":"Liu W, Pellegrini M, Wu A (2019) Identification of bridging centrality in complex networks. IEEE Access 7:93123\u201393130. https:\/\/doi.org\/10.1109\/ACCESS.2019.2928058","journal-title":"IEEE Access"},{"key":"1354_CR9","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.physa.2019.121561","volume":"530","author":"Q Nguyen","year":"2019","unstructured":"Nguyen Q, Pham H-D, Cassi D, Bellingeri M (2019) Conditional attack strategy for real-world complex networks. Physica A 530:121\u2013561. https:\/\/doi.org\/10.1016\/j.physa.2019.121561","journal-title":"Physica A"},{"issue":"2","key":"1354_CR10","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1002\/acp.2988","volume":"28","author":"I Blix","year":"2014","unstructured":"Blix I, Solberg \u00d8, Heir T (2014) Centrality of event and symptoms of posttraumatic stress disorder after the 2011 oslo bombing attack. Appl Cogn Psychol 28(2):249\u2013253. https:\/\/doi.org\/10.1002\/acp.2988","journal-title":"Appl Cogn Psychol"},{"key":"1354_CR11","doi-asserted-by":"publisher","DOI":"10.1515\/9781400841356","author":"A-L Barab\u00e1si","year":"2006","unstructured":"Barab\u00e1si A-L, Watts DJ, Newman M (2006). The structure and dynamics of networks. https:\/\/doi.org\/10.1515\/9781400841356","journal-title":"The structure and dynamics of networks."},{"issue":"4\u20135","key":"1354_CR12","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.physrep.2005.10.009","volume":"424","author":"S Boccaletti","year":"2006","unstructured":"Boccaletti S, Latora V, Moreno Y, Chavez M, Hwang D-U (2006) Complex networks: structure and dynamics. Phys Rep 424(4\u20135):175\u2013308. https:\/\/doi.org\/10.1016\/j.physrep.2005.10.009","journal-title":"Phys Rep"},{"key":"1354_CR13","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199211517.001.0001","author":"G Caldarelli","year":"2007","unstructured":"Caldarelli G (2007). Scale-free networks: complex webs in nature and technology. https:\/\/doi.org\/10.1093\/acprof:oso\/9780199211517.001.0001","journal-title":"Scale-free networks: complex webs in nature and technology."},{"issue":"3\u20134","key":"1354_CR14","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1016\/S0378-4371(02)00618-0","volume":"309","author":"DH Zanette","year":"2002","unstructured":"Zanette DH, Kuperman M (2002) Effects of immunization in small-world epidemics. Physica A 309(3\u20134):445\u2013452. https:\/\/doi.org\/10.1016\/S0378-4371(02)00618-0","journal-title":"Physica A"},{"issue":"41","key":"1354_CR15","doi-asserted-by":"publisher","first-page":"14497","DOI":"10.1073\/pnas.0501426102","volume":"102","author":"JC Doyle","year":"2005","unstructured":"Doyle JC, Alderson DL, Li L, Low S, Roughan M, Shalunov S, Tanaka R, Willinger W (2005) The \u201crobust yet fragile\u2019\u2019 nature of the internet. Proc Natl Acad Sci 102(41):14497\u201314502. https:\/\/doi.org\/10.1073\/pnas.0501426102","journal-title":"Proc Natl Acad Sci"},{"key":"1354_CR16","doi-asserted-by":"publisher","DOI":"10.2307\/3033543","author":"LC Freeman","year":"1977","unstructured":"Freeman LC (1977) A set of measures of centrality based on betweenness. Sociometry. https:\/\/doi.org\/10.2307\/3033543","journal-title":"Sociometry"},{"issue":"4","key":"1354_CR17","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1007\/BF02289527","volume":"31","author":"G Sabidussi","year":"1966","unstructured":"Sabidussi G (1966) The centrality index of a graph. Psychometrika 31(4):581\u2013603. https:\/\/doi.org\/10.1007\/BF02289527","journal-title":"Psychometrika"},{"issue":"6794","key":"1354_CR18","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1038\/35019019","volume":"406","author":"R Albert","year":"2000","unstructured":"Albert R, Jeong H, Barab\u00e1si A-L (2000) Error and attack tolerance of complex networks. Nature 406(6794):378\u2013382. https:\/\/doi.org\/10.1038\/35019019","journal-title":"Nature"},{"issue":"5","key":"1354_CR19","doi-asserted-by":"publisher","first-page":"056","DOI":"10.1103\/PhysRevE.65.056109","volume":"65","author":"P Holme","year":"2002","unstructured":"Holme P, Kim BJ, Yoon CN, Han SK (2002) Attack vulnerability of complex networks. Phys Rev E 65(5):056\u2013109. https:\/\/doi.org\/10.1103\/PhysRevE.65.056109","journal-title":"Phys Rev E"},{"key":"1354_CR20","doi-asserted-by":"publisher","unstructured":"Mishkovski I, Kojchev R, Trajanov D, Kocarev L (2009) Vulnerability assessment of complex networks based on optimal flow measurements under intentional node and edge attacks. In: International Conference on ICT Innovations, pp 167\u2013176. https:\/\/doi.org\/10.1007\/978-3-642-10781-8_18","DOI":"10.1007\/978-3-642-10781-8_18"},{"issue":"4","key":"1354_CR21","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/S0378-8733(00)00031-9","volume":"22","author":"B Ruhnau","year":"2000","unstructured":"Ruhnau B (2000) Eigenvector-centrality-a node-centrality? Soc Netw 22(4):357\u2013365. https:\/\/doi.org\/10.1016\/S0378-8733(00)00031-9","journal-title":"Soc Netw"},{"key":"1354_CR22","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.ress.2021.108146","volume":"218","author":"S Wandelt","year":"2022","unstructured":"Wandelt S, Lin W, Sun X, Zanin M (2022) From random failures to targeted attacks in network dismantling. Reliab Eng Syst Safety 218:108\u2013146. https:\/\/doi.org\/10.1016\/j.ress.2021.108146","journal-title":"Reliab Eng Syst Safety"},{"issue":"26","key":"1354_CR23","doi-asserted-by":"publisher","first-page":"6671","DOI":"10.1016\/j.physa.2008.08.037","volume":"387","author":"J Wang","year":"2008","unstructured":"Wang J, Rong L, Zhang L, Zhang Z (2008) Attack vulnerability of scale-free networks due to cascading failures. Physica A 387(26):6671\u20136678. https:\/\/doi.org\/10.1016\/j.physa.2008.08.037","journal-title":"Physica A"},{"issue":"4","key":"1354_CR24","doi-asserted-by":"publisher","first-page":"59613","DOI":"10.1371\/journal.pone.0059613","volume":"8","author":"S Iyer","year":"2013","unstructured":"Iyer S, Killingback T, Sundaram B, Wang Z (2013) Attack robustness and centrality of complex networks. PLoS ONE 8(4):59613. https:\/\/doi.org\/10.1371\/journal.pone.0059613","journal-title":"PLoS ONE"},{"key":"1354_CR25","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.physa.2014.06.079","volume":"414","author":"M Bellingeri","year":"2014","unstructured":"Bellingeri M, Cassi D, Vincenzi S (2014) Efficiency of attack strategies on complex model and real-world networks. Physica A 414:174\u2013180. https:\/\/doi.org\/10.1016\/j.physa.2014.06.079","journal-title":"Physica A"},{"key":"1354_CR26","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1016\/j.physa.2015.01.004","volume":"424","author":"T Nie","year":"2015","unstructured":"Nie T, Guo Z, Zhao K, Lu Z-M (2015) New attack strategies for complex networks. Physica A 424:248\u2013253. https:\/\/doi.org\/10.1016\/j.physa.2015.01.004","journal-title":"Physica A"},{"key":"1354_CR27","doi-asserted-by":"publisher","unstructured":"Bhave AS, Crow ML, \u00c7etinkaya EK (2016) Robustness of power grid topologies against centrality-based attacks. In: 2016 Resilience Week (RWS), pp 115\u2013118. https:\/\/doi.org\/10.1109\/RWEEK.2016.7573317","DOI":"10.1109\/RWEEK.2016.7573317"},{"key":"1354_CR28","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.physa.2018.09.069","volume":"514","author":"Z-Y Jiang","year":"2019","unstructured":"Jiang Z-Y, Zeng Y, Liu Z-H, Ma J-F (2019) Identifying critical nodes\u2019 group in complex networks. Physica A 514:121\u2013132. https:\/\/doi.org\/10.1016\/j.physa.2018.09.069","journal-title":"Physica A"},{"key":"1354_CR29","doi-asserted-by":"publisher","unstructured":"Zhang S, Si W, Qiu T, Cao Q (2020) Toward more effective centrality-based attacks on network topologies. In: ICC 2020-2020 IEEE International Conference on Communications (ICC), pp 1\u20136. https:\/\/doi.org\/10.1109\/ICC40277.2020.9148785","DOI":"10.1109\/ICC40277.2020.9148785"},{"issue":"3\u20134","key":"1354_CR30","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1016\/j.physa.2005.03.040","volume":"357","author":"A Beygelzimer","year":"2005","unstructured":"Beygelzimer A, Grinstein G, Linsker R, Rish I (2005) Improving network robustness by edge modification. Physica A 357(3\u20134):593\u2013612. https:\/\/doi.org\/10.1016\/j.physa.2005.03.040","journal-title":"Physica A"},{"key":"1354_CR31","doi-asserted-by":"publisher","unstructured":"Motter AE, Yang Y (2017) The unfolding and control of network cascades. 70(1):32\u201339. https:\/\/doi.org\/10.1063\/PT.3.3426. arXiv:1701.00578","DOI":"10.1063\/PT.3.3426"},{"issue":"2","key":"1354_CR32","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1002\/acs.3529","volume":"37","author":"Z Zhang","year":"2023","unstructured":"Zhang Z, Song X, Sun X, Stojanovic V (2023) Hybrid-driven-based fuzzy secure filtering for nonlinear parabolic partial differential equation systems with cyber attacks. Int J Adapt Control Signal Process 37(2):380\u2013398. https:\/\/doi.org\/10.1002\/acs.3529","journal-title":"Int J Adapt Control Signal Process"},{"key":"1354_CR33","doi-asserted-by":"publisher","unstructured":"Stojanovi\u0107 V (2023) Fault-tolerant control of a hydraulic servo actuator via adaptive dynamic programming. Math Modell Control. https:\/\/doi.org\/10.3934\/mmc.2023016","DOI":"10.3934\/mmc.2023016"},{"key":"1354_CR34","doi-asserted-by":"publisher","first-page":"8997","DOI":"10.1007\/s11063-023-11189-1","volume":"55","author":"X Song","year":"2023","unstructured":"Song X, Wu N, Song S, Stojanovic V (2023) Switching-like event-triggered state estimation for reaction-diffusion neural networks against dos attacks. Neural Process Lett 55:8997\u20139018. https:\/\/doi.org\/10.1007\/s11063-023-11189-1","journal-title":"Neural Process Lett"},{"key":"1354_CR35","doi-asserted-by":"publisher","unstructured":"Anderson R, Nagaraja S (2007) The topology of covert conflict. at WEIS, pp 329\u2013332.https:\/\/doi.org\/10.1007\/978-3-540-77156-2_41","DOI":"10.1007\/978-3-540-77156-2_41"},{"issue":"1","key":"1354_CR36","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.comnet.2010.07.011","volume":"55","author":"J Domingo-Ferrer","year":"2011","unstructured":"Domingo-Ferrer J, Gonz\u00e1lez-Nicol\u00e1s \u00da (2011) Decapitation of networks with and without weights and direction: the economics of iterated attack and defense. Comput Netw 55(1):119\u2013130. https:\/\/doi.org\/10.1016\/j.comnet.2010.07.011","journal-title":"Comput Netw"},{"issue":"2","key":"1354_CR37","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1109\/JSYST.2012.2221851","volume":"7","author":"H Kim","year":"2013","unstructured":"Kim H, Anderson R (2013) An experimental evaluation of robustness of networks. IEEE Syst J 7(2):179\u2013188. https:\/\/doi.org\/10.1109\/JSYST.2012.2221851","journal-title":"IEEE Syst J"},{"key":"1354_CR38","doi-asserted-by":"publisher","unstructured":"Jiang Y, Wang Y (2013) Analysis of attack and defense strategies on complex networks. In: Proceedings OF 2013 International Conference on Sensor Network Security Technology and Privacy Communication System, pp 58\u201362. https:\/\/doi.org\/10.1109\/SNS-PCS.2013.6553835","DOI":"10.1109\/SNS-PCS.2013.6553835"},{"issue":"6","key":"1354_CR39","doi-asserted-by":"publisher","first-page":"1630","DOI":"10.1007\/s11424-019-7420-0","volume":"32","author":"Y Li","year":"2019","unstructured":"Li Y, Deng Y, Xiao Y, Wu J (2019) Attack and defense strategies in complex networks based on game theory. J Syst Sci Complexity 32(6):1630\u20131640. https:\/\/doi.org\/10.1007\/s11424-019-7420-0","journal-title":"J Syst Sci Complexity"},{"key":"1354_CR40","doi-asserted-by":"publisher","unstructured":"Chakraborty T, Narayanam R (2016) Cross-layer betweenness centrality in multiplex networks with applications. In: 2016 IEEE 32nd International Conference on Data Engineering (ICDE), pp 397\u2013408. https:\/\/doi.org\/10.1109\/ICDE.2016.7498257","DOI":"10.1109\/ICDE.2016.7498257"},{"key":"1354_CR41","doi-asserted-by":"publisher","unstructured":"Mittal R, Bhatia MPS (2018) Cross-layer closeness centrality in multiplex social networks. In: 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp 1\u20135. https:\/\/doi.org\/10.1109\/ICCCNT.2018.8494042","DOI":"10.1109\/ICCCNT.2018.8494042"},{"issue":"5","key":"1354_CR42","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1093\/comnet\/cnx050","volume":"6","author":"C Rahmede","year":"2018","unstructured":"Rahmede C, Iacovacci J, Arenas A, Bianconi G (2018) Centralities of nodes and influences of layers in large multiplex networks. J Complex Netw 6(5):733\u2013752. https:\/\/doi.org\/10.1093\/comnet\/cnx050","journal-title":"J Complex Netw"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01354-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-024-01354-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01354-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,16]],"date-time":"2024-05-16T18:21:19Z","timestamp":1715883679000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-024-01354-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,29]]},"references-count":42,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["1354"],"URL":"https:\/\/doi.org\/10.1007\/s40747-024-01354-x","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,29]]},"assertion":[{"value":"12 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 February 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest. The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}