{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:56:24Z","timestamp":1763348184946,"version":"3.37.3"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,4,18]],"date-time":"2019-04-18T00:00:00Z","timestamp":1555545600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"JSPS Grant-in-Aid for Scientific Researc","award":["17H01785"],"award-info":[{"award-number":["17H01785"]}]},{"name":"JST CREST","award":["JPMJCR1687"],"award-info":[{"award-number":["JPMJCR1687"]}]},{"name":"Indonesia Endowment Fund for Education","award":["-"],"award-info":[{"award-number":["-"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Netw Sci"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s41109-019-0122-7","type":"journal-article","created":{"date-parts":[[2019,4,18]],"date-time":"2019-04-18T09:22:43Z","timestamp":1555579363000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Effective and scalable methods for graph protection strategies against epidemics on dynamic networks"],"prefix":"10.1007","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5686-7218","authenticated-orcid":false,"given":"Arie Wahyu","family":"Wijayanto","sequence":"first","affiliation":[]},{"given":"Tsuyoshi","family":"Murata","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,18]]},"reference":[{"key":"122_CR1","doi-asserted-by":"publisher","unstructured":"Bakker, C, Halappanavar M, Visweswara Sathanur A (2018) Dynamic graphs, community detection, and riemannian geometry. Appl Netw Sci 3(1):3. https:\/\/doi.org\/10.1007\/s41109-018-0059-2 .","DOI":"10.1007\/s41109-018-0059-2"},{"issue":"1","key":"122_CR2","doi-asserted-by":"publisher","first-page":"18005","DOI":"10.1209\/0295-5075\/95\/18005","volume":"95","author":"AN Bishop","year":"2011","unstructured":"Bishop, AN, Shames I (2011) Link operations for slowing the spread of disease in complex networks. EPL (Europhys Lett) 95(1):18005.","journal-title":"EPL (Europhys Lett)"},{"key":"122_CR3","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-642-01284-6_3","volume-title":"Understanding Complex Systems","author":"D. Braha","year":"2009","unstructured":"Braha, D, Bar-Yam Y (2009) Time-Dependent Complex Networks: Dynamic Centrality, Dynamic Motifs, and Cycles of Social Interactions(Gross T, Sayama H, eds.). Springer, Berlin. https:\/\/doi.org\/10.1007\/978-3-642-01284-6_3 ."},{"key":"122_CR4","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1002\/cplx.20156","volume":"12","author":"D Braha","year":"2006","unstructured":"Braha, D, Bar-Yam Y (2006) From centrality to temporary fame: Dynamic centrality in complex networks. Complexity 12:59\u201363.","journal-title":"Complexity"},{"issue":"44","key":"122_CR5","doi-asserted-by":"publisher","first-page":"12368","DOI":"10.1073\/pnas.1605083113","volume":"113","author":"Alfredo Braunstein","year":"2016","unstructured":"Braunstein, A, Dall\u2019Asta L, Semerjian G, Zdeborov\u00e1 L (2016) Network dismantling. Proc Natl Acad Sci 113(44):12368\u201312373. https:\/\/doi.org\/10.1073\/pnas.1605083113 .","journal-title":"Proceedings of the National Academy of Sciences"},{"issue":"2","key":"122_CR6","doi-asserted-by":"publisher","first-page":"26001","DOI":"10.1209\/0295-5075\/109\/26001","volume":"109","author":"C Buono","year":"2015","unstructured":"Buono, C, Braunstein LA (2015) Immunization strategy for epidemic spreading on multilayer networks. EPL (Europhys Lett) 109(2):26001.","journal-title":"EPL (Europhys Lett)"},{"key":"122_CR7","unstructured":"Chakrabarti, AApproximation Algorithms: Vertex Cover (Computer Science 105 - Winter 2005). http:\/\/tandy.cs.illinois.edu\/dartmouth-cs-approx.pdf Accessed 27 Dec 2017."},{"issue":"1","key":"122_CR8","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1109\/TKDE.2015.2465378","volume":"28","author":"C Chen","year":"2016","unstructured":"Chen, C, Tong H, Prakash BA, Tsourakakis CE, Eliassi-Rad T, Faloutsos C, Chau DH (2016) Node immunization on large graphs: Theory and algorithms. IEEE Trans Knowl Data Eng 28(1):113\u2013126.","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"122_CR9","first-page":"2702","volume-title":"Proceedings of The 33rd International Conference on Machine Learning. Proceedings of Machine Learning Research, vol. 48","author":"H Dai","year":"2016","unstructured":"Dai, H, Dai B, Song L (2016) Discriminative embeddings of latent variable models for structured data. In: Balcan MF Weinberger KQ (eds)Proceedings of The 33rd International Conference on Machine Learning. Proceedings of Machine Learning Research, vol. 48, 2702\u20132711.. PMLR, New York."},{"key":"122_CR10","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.epidem.2018.04.003","volume":"24","author":"Jessica Enright","year":"2018","unstructured":"Enright, J, Kao RR (2018) Epidemics on dynamic networks. Epidemics 24:88\u201397. https:\/\/doi.org\/10.1016\/j.epidem.2018.04.003 .","journal-title":"Epidemics"},{"key":"122_CR11","doi-asserted-by":"publisher","unstructured":"Gemmetto, V, Barrat A, Cattuto C (2014) Mitigation of infectious disease at school: targeted class closure vs school closure. BMC Infect Dis 14(1):695. https:\/\/doi.org\/10.1186\/PREACCEPT-6851518521414365 .","DOI":"10.1186\/PREACCEPT-6851518521414365"},{"key":"122_CR12","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-14929-0_4","volume-title":"Advances in Social Network Mining and Analysis","author":"Y Yu","year":"2010","unstructured":"Habiba, Yu Y, Berger-Wolf TY, Saia J (2010) Finding spread blockers in dynamic networks. In: Giles L, Smith M, Yen J, Zhang H (eds)Advances in Social Network Mining and Analysis, 55\u201376.. Springer, Berlin."},{"key":"122_CR13","volume-title":"Phase Transitions in Combinatorial Optimization Problems: Basics, Algorithms and Statistical Mechanics","author":"AK Hartman","year":"2006","unstructured":"Hartman, AK, Weigt M (2006) Phase Transitions in Combinatorial Optimization Problems: Basics, Algorithms and Statistical Mechanics. Wiley-VCH Verlag, Weinheim."},{"key":"122_CR14","doi-asserted-by":"publisher","first-page":"046105","DOI":"10.1103\/PhysRevE.82.046105","volume":"82","author":"SA Hill","year":"2010","unstructured":"Hill, SA, Braha D (2010) Dynamic model of time-dependent complex networks. Phys Rev E 82:046105.","journal-title":"Phys Rev E"},{"key":"122_CR15","doi-asserted-by":"publisher","unstructured":"Holme, P (2015) Modern temporal network theory: a colloquium. Eur Phys J B 88(9). https:\/\/doi.org\/10.1140\/epjb\/e2015-60657-4 .","DOI":"10.1140\/epjb\/e2015-60657-4"},{"issue":"3","key":"122_CR16","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.physrep.2012.03.001","volume":"519","author":"Petter Holme","year":"2012","unstructured":"Holme, P, Saram\u00e4ki J (2012) Temporal networks. Phys Rep 519(3):97\u2013125. https:\/\/doi.org\/10.1016\/j.physrep.2012.03.001 . Temporal Networks.","journal-title":"Physics Reports"},{"issue":"1","key":"122_CR17","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1016\/j.jtbi.2010.11.033","volume":"271","author":"Lorenzo Isella","year":"2011","unstructured":"Isella, L, Stehl\u00e9 J, Barrat A, Cattuto C, Pinton J, Van den Broeck W (2011) What\u2019s in a crowd? analysis of face-to-face behavioral networks. J Theor Biol 271(1):166\u2013180. https:\/\/doi.org\/10.1016\/j.jtbi.2010.11.033 .","journal-title":"Journal of Theoretical Biology"},{"key":"122_CR18","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.tcs.2011.11.011","volume":"447","author":"Giuseppe F. Italiano","year":"2012","unstructured":"Italiano, GF, Laura L, Santaroni F (2012) Finding strong bridges and strong articulation points in linear time. Theor Comput Sci 447:74\u201384. https:\/\/doi.org\/10.1016\/j.tcs.2011.11.011 . Combinational Algorithms and Applications (COCOA 2010).","journal-title":"Theoretical Computer Science"},{"issue":"772","key":"122_CR19","doi-asserted-by":"publisher","first-page":"700","DOI":"10.1098\/rspa.1927.0118","volume":"115","author":"W. O. Kermack","year":"1927","unstructured":"Kermack, WO, McKendrick AG (1927) A contribution to the mathematical theory of epidemics. Proc R Soc Lond A Math Phys Eng Sci 115(772):700\u2013721. https:\/\/doi.org\/10.1098\/rspa.1927.0118 .","journal-title":"Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences"},{"key":"122_CR20","first-page":"6339","volume-title":"Advances in Neural Information Processing Systems 30","author":"E Khalil","year":"2017","unstructured":"Khalil, E, Dai H, Zhang Y, Dilkina B, Song L (2017) Learning combinatorial optimization algorithms over graphs. In: Guyon I, Luxburg UV, Bengio S, Wallach H, Fergus R, Vishwanathan S, Garnett R (eds)Advances in Neural Information Processing Systems 30, 6339\u20136349.. Curran Associates, Inc., New York."},{"key":"122_CR21","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.adhoc.2014.08.016","volume":"24","author":"Saad Ahmad Khan","year":"2015","unstructured":"Khan, SA, B\u00f6l\u00f6ni L, Turgut D (2015) Bridge protection algorithms \u2013 a technique for fault-tolerance in sensor networks. Ad Hoc Netw 24:186\u2013199. https:\/\/doi.org\/10.1016\/j.adhoc.2014.08.016 .","journal-title":"Ad Hoc Networks"},{"key":"122_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50806-1","volume-title":"Mathematics of Epidemics on Networks: From Exact to Approximate Models","author":"IZ Kiss","year":"2017","unstructured":"Kiss, IZ, Miller JC, Simon PL (2017) Mathematics of Epidemics on Networks: From Exact to Approximate Models. Springer, New York."},{"issue":"1","key":"122_CR23","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/s10115-017-1028-2","volume":"53","author":"C. Largeron","year":"2017","unstructured":"Largeron, C, Mougel PN, Benyahia O, Za\u00efane OR (2017) Dancer: dynamic attributed networks with community structure generation. Knowl Inf Syst 53(1):109\u2013151. https:\/\/doi.org\/10.1007\/s10115-017-1028-2 .","journal-title":"Knowledge and Information Systems"},{"key":"122_CR24","doi-asserted-by":"crossref","unstructured":"Lawyer, G (2015) Understanding the influence of all nodes in a network. Sci Rep 5(8665):1\u20139. http:\/\/dx.doi.org\/10.1038\/srep08665 .","DOI":"10.1038\/srep08665"},{"key":"122_CR25","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1007\/978-3-642-21916-0_71","volume-title":"Lecture Notes in Computer Science","author":"Jiming Liu","year":"2011","unstructured":"Liu, J, Gao C (2011) Adaptive immunization in dynamic networks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 6804 LNAI:673\u2013683. https:\/\/doi.org\/10.1007\/978-3-642-21916-0_71 ."},{"issue":"9","key":"122_CR26","doi-asserted-by":"publisher","first-page":"e0136497","DOI":"10.1371\/journal.pone.0136497","volume":"10","author":"Rossana Mastrandrea","year":"2015","unstructured":"Mastrandrea, R, Fournet J, Barrat A (2015) Contact patterns in a high school: A comparison between data collected using wearable sensors, contact diaries and friendship surveys. PLoS ONE 10:1\u201326. https:\/\/doi.org\/10.1371\/journal.pone.0136497 .","journal-title":"PLOS ONE"},{"issue":"12","key":"122_CR27","doi-asserted-by":"publisher","first-page":"eaau4212","DOI":"10.1126\/sciadv.aau4212","volume":"4","author":"Joan T. Matamalas","year":"2018","unstructured":"Matamalas, JT, Arenas A, G\u00f3mez S (2018) Effective approach to epidemic containment using link equations in complex networks. Sci Adv 4(12). https:\/\/doi.org\/10.1126\/sciadv.aau4212 .","journal-title":"Science Advances"},{"issue":"7540","key":"122_CR28","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1038\/nature14236","volume":"518","author":"Volodymyr Mnih","year":"2015","unstructured":"Mnih, V, Kavukcuoglu K, Silver D, Rusu AA, Veness J, Bellemare MG, Graves A, Riedmiller M, Fidjeland AK, Ostrovski G, Petersen S, Beattie C, Sadik A, Antonoglou I, King H, Kumaran D, Wierstra D, Legg S, Hassabis D (2015) Human-level control through deep reinforcement learning. Nature 518:529\u2013533. https:\/\/doi.org\/10.1038\/nature14236 .","journal-title":"Nature"},{"key":"122_CR29","doi-asserted-by":"publisher","first-page":"036121","DOI":"10.1103\/PhysRevE.74.036121","volume":"74","author":"C Moore","year":"2006","unstructured":"Moore, C, Ghoshal G, Newman MEJ (2006) Exact solutions for models of evolving networks with addition and deletion of nodes. Phys Rev E 74:036121.","journal-title":"Phys Rev E"},{"key":"122_CR30","doi-asserted-by":"publisher","unstructured":"Murata, T, Koga H (2018) Extended methods for influence maximization in dynamic networks. Comput Soc Netw 5(8):1\u201321. https:\/\/doi.org\/10.1186\/s40649-018-0056-8 .","DOI":"10.1186\/s40649-018-0056-8"},{"key":"122_CR31","doi-asserted-by":"publisher","unstructured":"Paranjape, A, Benson AR, Leskovec J (2017) Motifs in temporal networks In: Proceedings of the Tenth ACM International Conference on Web Search and Data Mining. WSDM \u201917, 601\u2013610.. ACM, New York. https:\/\/doi.org\/10.1145\/3018661.3018731 .","DOI":"10.1145\/3018661.3018731"},{"issue":"3","key":"122_CR32","doi-asserted-by":"publisher","first-page":"925","DOI":"10.1103\/RevModPhys.87.925","volume":"87","author":"Romualdo Pastor-Satorras","year":"2015","unstructured":"Pastor-Satorras, R, Castellano C, Van Mieghem P, Vespignani A (2015) Epidemic processes in complex networks. Rev Mod Phys 87:925\u2013979. https:\/\/doi.org\/10.1103\/RevModPhys.87.925 .","journal-title":"Reviews of Modern Physics"},{"key":"122_CR33","doi-asserted-by":"publisher","unstructured":"Pastor-Satorras, R, Vespignani A (2002) Immunization of complex networks. Phys Rev E 65:036104. https:\/\/doi.org\/10.1103\/PhysRevE.65.036104 .","DOI":"10.1103\/PhysRevE.65.036104"},{"key":"122_CR34","doi-asserted-by":"publisher","unstructured":"Prakash, BA, Chakrabarti D, Faloutsos M, Valler N, Faloutsos C (2011) Threshold conditions for arbitrary cascade models on arbitrary networks In: 2011 IEEE 11th International Conference on Data Mining, 537\u2013546.. IEEE, New York. https:\/\/doi.org\/10.1109\/ICDM.2011.145 .","DOI":"10.1109\/ICDM.2011.145"},{"key":"122_CR35","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-642-15939-8_7","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"BA Prakash","year":"2010","unstructured":"Prakash, BA, Tong H, Valler N, Faloutsos M, Faloutsos C (2010) Virus propagation on time-varying networks: Theory and immunization algorithms. In: Balc\u00e1zar JL, Bonchi F, Gionis A, Sebag M (eds)Machine Learning and Knowledge Discovery in Databases, 99\u2013114.. Springer, Berlin."},{"key":"122_CR36","doi-asserted-by":"crossref","unstructured":"Ren, X, Gleinig N, Helbing D, Antulov-Fantulin N (2018) Generalized network dismantling. CoRR abs\/1801.01357. http:\/\/arxiv.org\/abs\/1801.01357 .","DOI":"10.1155\/2018\/9826243"},{"key":"122_CR37","first-page":"317","volume-title":"Proceedings of the 16th European Conference on Machine Learning. ECML\u201905","author":"M Riedmiller","year":"2005","unstructured":"Riedmiller, M (2005) Neural fitted q iteration \u2013 first experiences with a data efficient neural reinforcement learning method In: Proceedings of the 16th European Conference on Machine Learning. ECML\u201905, 317\u2013328.. Springer, Berlin."},{"key":"122_CR38","first-page":"831","volume-title":"Proceedings of the 24th ACM International on Conference on Information and Knowledge Management. CIKM \u201915","author":"C Song","year":"2015","unstructured":"Song, C, Hsu W, Lee ML (2015) Node immunization over infectious period In: Proceedings of the 24th ACM International on Conference on Information and Knowledge Management. CIKM \u201915, 831\u2013840.. ACM, New York."},{"issue":"8","key":"122_CR39","doi-asserted-by":"publisher","first-page":"e23176","DOI":"10.1371\/journal.pone.0023176","volume":"6","author":"Juliette Stehl\u00e9","year":"2011","unstructured":"Stehl\u00e9, J, Voirin N, Barrat A, Cattuto C, Isella L, Pinton J, Quaggiotto M, Van den Broeck W, R\u00e9gis C, Lina B, Vanhems P (2011) High-resolution measurements of face-to-face contact patterns in a primary school. PLoS ONE 6(8):23176. https:\/\/doi.org\/10.1371\/journal.pone.0023176 .","journal-title":"PLoS ONE"},{"key":"122_CR40","volume-title":"Reinforcement Learning: An Introduction","author":"RS Sutton","year":"1998","unstructured":"Sutton, RS, Barto AG (1998) Reinforcement Learning: An Introduction. MIT Press, Cambridge."},{"key":"122_CR41","doi-asserted-by":"publisher","unstructured":"Tong, H, Prakash BA, Tsourakakis C, Eliassi-Rad T, Faloutsos C, Chau DH (2010) On the vulnerability of large graphs In: 2010 IEEE International Conference on Data Mining, 1091\u20131096.. IEEE, New York. https:\/\/doi.org\/10.1109\/ICDM.2010.54 .","DOI":"10.1109\/ICDM.2010.54"},{"issue":"1","key":"122_CR42","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/TNET.2016.2563397","volume":"25","author":"Guangmo Tong","year":"2017","unstructured":"Tong, G, Wu W, Tang S, Du D (2017) Adaptive influence maximization in dynamic social networks. IEEE\/ACM Trans Netw 25(1):112\u2013125. https:\/\/doi.org\/10.1109\/TNET.2016.2563397 .","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"2","key":"122_CR43","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1023\/A:1009683123448","volume":"5","author":"GG Van de Bunt","year":"1999","unstructured":"Van de Bunt, GG, Van Duijn MAJ, Snijders TAB (1999) Friendship networks through time: An actor-oriented dynamic statistical network model. Comput Math Org Theory 5(2):167\u2013192.","journal-title":"Comput Math Org Theory"},{"key":"122_CR44","doi-asserted-by":"crossref","unstructured":"Van Mieghem, P, Stevanovi\u0107 D, Kuipers F, Li C, van de Bovenkamp R, Liu D, Wang H (2011) Decreasing the spectral radius of a graph by link removals. Phys Rev E 84:016101. http:\/\/dx.doi.org\/10.1103\/PhysRevE.84.016101 .","DOI":"10.1103\/PhysRevE.84.016101"},{"issue":"9","key":"122_CR45","doi-asserted-by":"publisher","first-page":"e73970","DOI":"10.1371\/journal.pone.0073970","volume":"8","author":"Philippe Vanhems","year":"2013","unstructured":"Vanhems, P, Barrat A, Cattuto C, Pinton JF, Khanafer N, Regis C, Kim B-a, Comte B, Voirin N (2013) Estimating potential infection transmission routes in hospital wards using wearable proximity sensors. PLoS ONE 8(9):73970. https:\/\/doi.org\/10.1371\/journal.pone.0073970 .","journal-title":"PLoS ONE"},{"key":"122_CR46","doi-asserted-by":"crossref","unstructured":"Wang, B, Chen G, Fu L, Song L, Wang X, Liu X (2016) Drimux: Dynamic rumor influence minimization with user experience in social networks In: Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence (AAAI-16), 791\u2013797.","DOI":"10.1609\/aaai.v30i1.10063"},{"issue":"10","key":"122_CR47","doi-asserted-by":"publisher","first-page":"2168","DOI":"10.1109\/TKDE.2017.2728064","volume":"29","author":"B Wang","year":"2017","unstructured":"Wang, B, Chen G, Fu L, Song L, Wang X (2017) Drimux : Dynamic rumor influence minimization with user experience in social networks. IEEE Trans Knowl Data Eng 29(10):2168\u20132181.","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"122_CR48","volume-title":"Learning from Delayed Rewards","author":"CJCH Watkins","year":"1989","unstructured":"Watkins, CJCH (1989) Learning from Delayed Rewards. Cambridge University, Cambridge."},{"key":"122_CR49","doi-asserted-by":"publisher","unstructured":"Wijayanto, AW, Murata T (2017) Flow-aware vertex protection strategy on large social networks In: Proceedings of the 2017 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining 2017. ASONAM \u201917, 58\u201363.. ACM, New York. https:\/\/doi.org\/10.1145\/3110025.3110033 .","DOI":"10.1145\/3110025.3110033"},{"key":"122_CR50","doi-asserted-by":"publisher","unstructured":"Wijayanto, AW, Murata T (2018) Learning adaptive graph protection strategy on dynamic networks via reinforcement learning In: 2018 IEEE\/WIC\/ACM International Conference on Web Intelligence (WI). WI 2018, 534\u2013539.. IEEE, New York. https:\/\/doi.org\/10.1109\/WI.2018.00-41 .","DOI":"10.1109\/WI.2018.00-41"},{"key":"122_CR51","doi-asserted-by":"publisher","unstructured":"Wijayanto, AW, Murata T (2018) Pre-emptive spectral graph protection strategies on multiplex social networks. Appl Netw Sci 3(1):5. https:\/\/doi.org\/10.1007\/s41109-018-0061-8 .","DOI":"10.1007\/s41109-018-0061-8"},{"key":"122_CR52","doi-asserted-by":"publisher","unstructured":"Zhan, J, Rafalski T, Stashkevich G, Verenich E (2017) Vaccination allocation in large dynamic networks. J Big Data 4(1):2. https:\/\/doi.org\/10.1186\/s40537-016-0061-4 .","DOI":"10.1186\/s40537-016-0061-4"},{"key":"122_CR53","doi-asserted-by":"publisher","unstructured":"Zhang, Y, Prakash BA (2014) Dava: Distributing vaccines over networks under prior information In: Proceedings of the 2014 SIAM International Conference on Data Mining, 46\u201354.. SIAM, Philadelphia. https:\/\/doi.org\/10.1137\/1.9781611973440.6 . https:\/\/epubs.siam.org\/doi\/abs\/10.1137\/1.9781611973440.6 .","DOI":"10.1137\/1.9781611973440.6"},{"issue":"2","key":"122_CR54","first-page":"20","volume":"10","author":"Y Zhang","year":"2015","unstructured":"Zhang, Y, Prakash BA (2015) Data-aware vaccine allocation over large networks. ACM Trans Knowl Discov Data 10(2):20\u201312032.","journal-title":"ACM Trans Knowl Discov Data"},{"key":"122_CR55","doi-asserted-by":"publisher","unstructured":"Zhang, Y, Ramanathan A, Vullikanti A, Pullum L, Prakash BA (2017) Data-driven immunization In: 2017 IEEE International Conference on Data Mining (ICDM), 615\u2013624.. IEEE, New York. https:\/\/doi.org\/10.1109\/ICDM.2017.71 .","DOI":"10.1109\/ICDM.2017.71"},{"issue":"11","key":"122_CR56","doi-asserted-by":"publisher","first-page":"e112018","DOI":"10.1371\/journal.pone.0112018","volume":"9","author":"Dawei Zhao","year":"2014","unstructured":"Zhao, D, Wang L, Li S, Wang Z, Wang L, Gao B (2014) Immunization of epidemics in multiplex networks. PLoS ONE 9(11):1\u20135. https:\/\/doi.org\/10.1371\/journal.pone.0112018 .","journal-title":"PLoS ONE"},{"key":"122_CR57","doi-asserted-by":"publisher","unstructured":"Zhuang, H, Sun Y, Tang J, Zhang J, Sun X (2013) Influence maximization in dynamic social networks In: 2013 IEEE 13th International Conference on Data Mining, 1313\u20131318.. IEEE, New York. https:\/\/doi.org\/10.1109\/ICDM.2013.145 .","DOI":"10.1109\/ICDM.2013.145"}],"container-title":["Applied Network Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-019-0122-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41109-019-0122-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-019-0122-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T21:21:51Z","timestamp":1694812911000},"score":1,"resource":{"primary":{"URL":"https:\/\/appliednetsci.springeropen.com\/articles\/10.1007\/s41109-019-0122-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,18]]},"references-count":57,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["122"],"URL":"https:\/\/doi.org\/10.1007\/s41109-019-0122-7","relation":{},"ISSN":["2364-8228"],"issn-type":[{"type":"electronic","value":"2364-8228"}],"subject":[],"published":{"date-parts":[[2019,4,18]]},"assertion":[{"value":"27 October 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 April 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Not applicable.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"18"}}