{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T23:13:58Z","timestamp":1777590838457,"version":"3.51.4"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Vietnam National University in Ho Chi Minh city","award":["B2018-42-01"],"award-info":[{"award-number":["B2018-42-01"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Netw Sci"],"published-print":{"date-parts":[[2021,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In this paper we investigate how the modularity of model and real-world social networks affect their robustness and the efficacy of node attack (removal) strategies based on node degree (ID) and node betweenness (IB). We build Barabasi\u2013Albert model networks with different modularity by a new ad hoc algorithm that rewire links forming networks with community structure. We traced the network robustness using the largest connected component (<jats:italic>LCC<\/jats:italic>). We find that when model networks present absent or low modular structure ID strategy is more effective than IB to decrease the <jats:italic>LCC<\/jats:italic>. Conversely, in the case the model network present higher modularity, the IB strategy becomes the most effective to fragment the <jats:italic>LCC<\/jats:italic>. In addition, networks with higher modularity present a signature of a 1st order percolation transition and a decrease of the <jats:italic>LCC<\/jats:italic> with one or several abrupt changes when nodes are removed, for both strategies; differently, networks with non-modular structure or low modularity show a 2nd order percolation transition networks when nodes are removed. Last, we investigated how the modularity of the network structure evaluated by the modularity indicator (<jats:italic>Q<\/jats:italic>) affect the network robustness and the efficacy of the attack strategies in 12 real-world social networks. We found that the modularity <jats:italic>Q<\/jats:italic> is negatively correlated with the robustness of the real-world social networks for both the node attack strategies, especially for the IB strategy (<jats:italic>p<\/jats:italic>-value\u2009&lt;\u20090.001). This result indicates how real-world networks with higher modularity (i.e. with higher community structure) may be more fragile to node attack. The results presented in this paper unveil the role of modularity and community structure for the robustness of networks and may be useful to select the best node attack strategies in network.<\/jats:p>","DOI":"10.1007\/s41109-021-00426-y","type":"journal-article","created":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T04:29:44Z","timestamp":1635827384000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Modularity affects the robustness of scale-free model and real-world social networks under betweenness and degree-based node attack"],"prefix":"10.1007","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1188-3385","authenticated-orcid":false,"given":"Quang","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Tuan V.","family":"Vu","sequence":"additional","affiliation":[]},{"given":"Hanh-Duyen","family":"Dinh","sequence":"additional","affiliation":[]},{"given":"Davide","family":"Cassi","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Scotognella","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Alfieri","sequence":"additional","affiliation":[]},{"given":"Michele","family":"Bellingeri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,2]]},"reference":[{"issue":"5920","key":"426_CR1","doi-asserted-by":"publisher","first-page":"1453","DOI":"10.1126\/science.1167782","volume":"323","author":"D Achlioptas","year":"2009","unstructured":"Achlioptas D, D\u2019souza RM, Spencer J (2009) Explosive percolation in random networks. Science 323(5920):1453\u20131455","journal-title":"Science"},{"key":"426_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-018-30310-2","volume":"8","author":"S Ahajjam","year":"2018","unstructured":"Ahajjam S, Badir H (2018) Identification of influential spreaders in complex networks using HybridRank algorithm. Sci Rep 8:1\u201310. https:\/\/doi.org\/10.1038\/s41598-018-30310-2","journal-title":"Sci Rep"},{"key":"426_CR70","doi-asserted-by":"crossref","unstructured":"Albert R, Barab\u00e1si AL (2002) Statistical mechanics of complex networks. Rev Modern Phys 74:47","DOI":"10.1103\/RevModPhys.74.47"},{"key":"426_CR3","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1038\/43601","volume":"401","author":"R Albert","year":"1999","unstructured":"Albert R, Jeong H, Barabasi A-L (1999) Diameter of the world-wide web. Nature 401:130","journal-title":"Nature"},{"key":"426_CR4","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1038\/35019019","volume":"406","author":"R Albert","year":"2000","unstructured":"Albert R, Jeong H, Barabasi A-L (2000) Error and attack tolerance of complex networks. Nature 406:378","journal-title":"Nature"},{"key":"426_CR5","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"A-L Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si A-L, Albert R (1999) Emergence of scaling in random networks. Science 286:509\u2013512","journal-title":"Science"},{"key":"426_CR6","doi-asserted-by":"publisher","first-page":"5903","DOI":"10.1016\/j.physa.2010.09.004","volume":"389","author":"A Barra","year":"2010","unstructured":"Barra A, Agliari E (2010) Stochastic dynamics for idiotypic immune networks. Physica A 389:5903\u20135911","journal-title":"Physica A"},{"issue":"2","key":"426_CR7","first-page":"143","volume":"6","author":"M Bellingeri","year":"2013","unstructured":"Bellingeri M, Bodini A (2013) Threshold extinction in food webs. Thyroid Res 6(2):143\u2013152","journal-title":"Thyroid Res"},{"key":"426_CR8","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.physa.2017.07.020","volume":"489","author":"M Bellingeri","year":"2018","unstructured":"Bellingeri M, Cassi D (2018) Robustness of weighted networks. Physica A 489:47\u201355","journal-title":"Physica A"},{"key":"426_CR9","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.jtbi.2013.04.033","volume":"333","author":"M Bellingeri","year":"2013","unstructured":"Bellingeri M, Vincenzi S (2013) Robustness of empirical food webs with varying consumer\u2019s sensitivities to loss of resource. J Theor Biol 333:18\u201326","journal-title":"J Theor Biol"},{"key":"426_CR10","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.physa.2014.06.079","volume":"414","author":"M Bellingeri","year":"2014","unstructured":"Bellingeri M, Cassi D, Vincenzi S (2014) Efficiency of attack strategies on complex model and real-world networks. Physica A 414:174\u2013180","journal-title":"Physica A"},{"key":"426_CR11","doi-asserted-by":"publisher","first-page":"1550180","DOI":"10.1142\/S0217984915501808","volume":"29","author":"M Bellingeri","year":"2015","unstructured":"Bellingeri M, Agliari E, Cassi D (2015) Optimization strategies with resource scarcity: from immunization of networks to the traveling salesman problem. Mod Phys Lett B 29:1550180","journal-title":"Mod Phys Lett B"},{"key":"426_CR12","doi-asserted-by":"publisher","first-page":"10692","DOI":"10.1038\/s41598-019-47119-2","volume":"9","author":"M Bellingeri","year":"2019","unstructured":"Bellingeri M, Bevacqua D, Scotognella F, Cassi D (2019) The heterogeneity in link weights may decrease the robustness of real-world complex weighted networks. Sci Rep 9:10692","journal-title":"Sci Rep"},{"key":"426_CR13","doi-asserted-by":"publisher","first-page":"228","DOI":"10.3389\/fphy.2020.00228","volume":"8","author":"M Bellingeri","year":"2020","unstructured":"Bellingeri M, Bevacqua D, Scotognella F, Alfieri R, Nguyen Q, Montepietra D, Cassi D (2020a) Link and node removal in real social networks: a review. Front Phys 8:228. https:\/\/doi.org\/10.3389\/fphy.2020.00228","journal-title":"Front Phys"},{"issue":"1","key":"426_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-020-60298-7","volume":"10","author":"M Bellingeri","year":"2020","unstructured":"Bellingeri M, Bevacqua D, Scotognella F, Alfieri R, Cassi D (2020b) A comparative analysis of link removal strategies in real complex weighted networks. Sci Rep 10(1):1\u201315","journal-title":"Sci Rep"},{"key":"426_CR15","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.physrep.2005.10.009","volume":"424","author":"S Boccaletti","year":"2006","unstructured":"Boccaletti S, Latora V, Moreno Y, Chavez M, Hwang D (2006) Complex networks, structure and dynamics. Phys Rep 424:175\u2013308","journal-title":"Phys Rep"},{"key":"426_CR17","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511814068","volume-title":"Random graphs","author":"B Bollobas","year":"2001","unstructured":"Bollobas B (2001) Random graphs, 2nd edn. Cambridge University Press, Cambridge","edition":"2"},{"key":"426_CR18","doi-asserted-by":"publisher","first-page":"892","DOI":"10.1126\/science.1165821","volume":"323","author":"SP Borgatti","year":"2009","unstructured":"Borgatti SP et al (2009) Network analysis in the social sciences. Science 323:892","journal-title":"Science"},{"key":"426_CR74","doi-asserted-by":"crossref","unstructured":"Brandes U (2001) A faster algorithm for betweenness centrality. J Math Sociol 25:163\u2013177","DOI":"10.1080\/0022250X.2001.9990249"},{"key":"426_CR21","doi-asserted-by":"publisher","first-page":"5468","DOI":"10.1103\/PhysRevLett.85.5468","volume":"85","author":"DS Callaway","year":"2000","unstructured":"Callaway DS, Newmann MEJ, Strogatz SH, Watts DJ (2000) Network robustness and fragility: percolation on random graphs. Phys Rev Lett 85:5468","journal-title":"Phys Rev Lett"},{"key":"426_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-42345-6_6","volume-title":"Computational social networks. CSoNet 2016. Lecture Notes in Computer Science","author":"D Chakraborty","year":"2016","unstructured":"Chakraborty D, Singh A, Cherifi H (2016) Immunization strategies based on the overlapping nodes in networks with community structure. In: Nguyen H, Snasel V (eds) Computational social networks. CSoNet 2016. Lecture Notes in Computer Science, vol 9795. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-42345-6_6"},{"issue":"1","key":"426_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s41109-019-0238-9","volume":"4","author":"H Cherifi","year":"2019","unstructured":"Cherifi H, Palla G, Szymanski BK, Lu X (2019) On community structure in complex networks: challenges and opportunities. Appl Netw Sci 4(1):1\u201335","journal-title":"Appl Netw Sci"},{"issue":"6124","key":"426_CR24","doi-asserted-by":"publisher","first-page":"1185","DOI":"10.1126\/science.1230813","volume":"339","author":"YS Cho","year":"2013","unstructured":"Cho YS, Hwang S, Herrmann HJ, Kahng B (2013) Avoiding a spanning cluster in percolation models. Science 339(6124):1185\u20131187","journal-title":"Science"},{"key":"426_CR25","doi-asserted-by":"crossref","unstructured":"Clauset A, Newman MEJ, Moore C (2004) Finding community structure in very large networks. http:\/\/www.arxiv.org\/abs\/cond-mat\/0408187","DOI":"10.1103\/PhysRevE.70.066111"},{"key":"426_CR26","doi-asserted-by":"publisher","first-page":"4626","DOI":"10.1103\/PhysRevLett.85.4626","volume":"85","author":"R Cohen","year":"2000","unstructured":"Cohen R, Erez K, ben Avraham D, Havlin S (2000) Resilience of the internet to random breakdowns. Phys Rev Lett 85:4626","journal-title":"Phys Rev Lett"},{"key":"426_CR27","doi-asserted-by":"publisher","first-page":"3682","DOI":"10.1103\/PhysRevLett.86.3682","volume":"86","author":"R Cohen","year":"2001","unstructured":"Cohen R, Erez K, ben Avraham D, Havlin S (2001) Breakdown of the internet under intentional attack. Phys Rev Lett 86:3682","journal-title":"Phys Rev Lett"},{"key":"426_CR71","doi-asserted-by":"crossref","unstructured":"Dall\u2019Asta L, Barrat A, Barth\u00e9lemy M, Vespignani A (2006) Vulnerability of weighted networks. J Stat Mech Theor Exper P04006","DOI":"10.1088\/1742-5468\/2006\/04\/P04006"},{"issue":"27","key":"426_CR28","doi-asserted-by":"publisher","first-page":"6911","DOI":"10.1073\/pnas.1801588115","volume":"115","author":"G Dong","year":"2018","unstructured":"Dong G, Fan J, Shekhtman LM, Shai S, Du R, Tian L, Chen X, Stanley HE, Havlin S (2018) Resilience of networks with community structure behaves as if under an external field. PNAS 115(27):6911\u20136915","journal-title":"PNAS"},{"key":"426_CR29","first-page":"17","volume":"5","author":"P Erdos","year":"1960","unstructured":"Erdos P, Renyi A (1960) On the evolution of random graphs. Publ Math Inst Hung Acad Sci 5:17","journal-title":"Publ Math Inst Hung Acad Sci"},{"key":"426_CR30","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1145\/316194.316229","volume":"29","author":"M Faloutsos","year":"1999","unstructured":"Faloutsos M, Faloutsos P, Faloutsos C (1999) On power-law relationships of the internet topology. Comput Commun Rev 29:251","journal-title":"Comput Commun Rev"},{"issue":"1","key":"426_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1140\/epjds\/s13688-019-0195-7","volume":"8","author":"Z Ghalmane","year":"2019","unstructured":"Ghalmane Z, El Hassouni M, Cherifi C, Cherifi H (2019a) Centrality in modular networks. EPJ Data Sci 8(1):1\u201327","journal-title":"EPJ Data Sci"},{"issue":"1","key":"426_CR34","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/s13278-019-0591-9","volume":"9","author":"Z Ghalmane","year":"2019","unstructured":"Ghalmane Z, El Hassouni M, Cherifi H (2019b) Immunization of networks with non-overlapping community structure. Soc Netw Anal Min 9(1):45","journal-title":"Soc Netw Anal Min"},{"key":"426_CR36","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.physa.2016.01.066","volume":"452","author":"N Gupta","year":"2016","unstructured":"Gupta N, Singh A, Cherifi H (2016) Centrality measures for networks with community structure. Phys a: Stat Mech Appl 452:46\u201359","journal-title":"Phys a: Stat Mech Appl"},{"key":"426_CR37","doi-asserted-by":"crossref","unstructured":"Hao Yin JL, Benson AR, Gleich DF (2017) Local higher-order graph clustering. In: Proceedings of the 23rd ACM SIGKDD international conference on knowledge discovery and data mining, ACM","DOI":"10.1145\/3097983.3098069"},{"key":"426_CR38","doi-asserted-by":"publisher","first-page":"908","DOI":"10.1209\/epl\/i2004-10286-2","volume":"68","author":"P Holme","year":"2004","unstructured":"Holme P (2004) Efficient local strategies for vaccination and network attack. Europhys Lett 68:908\u2013914. https:\/\/doi.org\/10.1209\/epl\/i2004-10286-2","journal-title":"Europhys Lett"},{"issue":"4","key":"426_CR39","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0059613","volume":"8","author":"S Iyer","year":"2013","unstructured":"Iyer S, Killingback T, Sundaram B, Wang Z (2013) Attack robustness and centrality of complex networks. PLoS ONE 8(4):e59613. https:\/\/doi.org\/10.1371\/journal.pone.0059613","journal-title":"PLoS ONE"},{"key":"426_CR40","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1038\/35036627","volume":"407","author":"H Jeong","year":"2000","unstructured":"Jeong H, Tombor B, Albert R, Oltvai ZN, Barabasi A-L (2000) The large-scale organization of metabolic networks. Nature 407:651","journal-title":"Nature"},{"key":"426_CR43","doi-asserted-by":"publisher","unstructured":"Kumar M, Singh A, Cherifi H (2018) An efficient immunization strategy using overlapping nodes and its neighborhoods. In: Companion proceedings of the web conference 2018 (WWW \u201818). International World Wide Web Conferences. https:\/\/doi.org\/10.1145\/3184558.3191566","DOI":"10.1145\/3184558.3191566"},{"key":"426_CR44","doi-asserted-by":"publisher","first-page":"124347","DOI":"10.1016\/j.physa.2020.124347","volume":"549","author":"DS Lekha","year":"2020","unstructured":"Lekha DS, Balakrishnan K (2020) Central attacks in complex networks: a revisit with new fallback strategy. Physica A 549:124347","journal-title":"Physica A"},{"issue":"1","key":"426_CR45","doi-asserted-by":"publisher","first-page":"2-es","DOI":"10.1145\/1217299.1217301","volume":"1","author":"JKJ Leskovec","year":"2007","unstructured":"Leskovec JKJ, Faloutsos C (2007) Graph evolution: densification and shrinking diameters. ACM Trans Knowl Discov Data (ACM TKDD), ACM 1(1):2-es","journal-title":"ACM Trans Knowl Discov Data (ACM TKDD), ACM"},{"key":"426_CR76","doi-asserted-by":"crossref","unstructured":"Magelinski T, Bartulovic M, Carley KM (2021) Measuring node contribution to community structure with modularity vitality. IEEE Trans Netw Sci Eng 8(1):707\u2013723","DOI":"10.1109\/TNSE.2020.3049068"},{"issue":"2","key":"426_CR46","doi-asserted-by":"publisher","first-page":"25","DOI":"10.5923\/j.ajcmp.20130302.02","volume":"3","author":"Y Mnyukh","year":"2013","unstructured":"Mnyukh Y (2013) Second-order phase transitions, L. Landau and his successors. Am J Condens Matter Phys 3(2):25\u201330. https:\/\/doi.org\/10.5923\/j.ajcmp.20130302.02","journal-title":"Am J Condens Matter Phys"},{"issue":"6","key":"426_CR47","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1093\/comnet\/cnz009","volume":"7","author":"M Mozafari","year":"2019","unstructured":"Mozafari M, Khansari M (2019) Improving the robustness of scale-free networks by maintaining community structure. J Complex Netw 7(6):838\u2013864","journal-title":"J Complex Netw"},{"key":"426_CR48","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1137\/S003614450342480","volume":"45","author":"MEJ Newman","year":"2003","unstructured":"Newman MEJ (2003) The structure and function of complex networks. SIAM Rev 45:167\u2013256","journal-title":"SIAM Rev"},{"key":"426_CR49","volume-title":"Networks: an introduction","author":"M Newman","year":"2013","unstructured":"Newman M (2013) Networks: an introduction. Oxford University Press, Oxford"},{"key":"426_CR50","doi-asserted-by":"publisher","first-page":"026113","DOI":"10.1103\/PhysRevE.69.026113","volume":"69","author":"MEJ Newman","year":"2004","unstructured":"Newman MEJ, Girvan M (2004) Finding and evaluating community structure in networks. Phys Rev E 69:026113","journal-title":"Phys Rev E"},{"issue":"1","key":"426_CR51","doi-asserted-by":"publisher","first-page":"2566","DOI":"10.1073\/pnas.012582999","volume":"99","author":"ME Newman","year":"2002","unstructured":"Newman ME, Watts DJ, Strogatz SH (2002) Random graph models of social networks. Proc Natl Acad Sci 99(1):2566\u20132572","journal-title":"Proc Natl Acad Sci"},{"key":"426_CR72","doi-asserted-by":"crossref","unstructured":"Nguyen K, Nguyen Q (2018) Resilience of stock cross-correlation network to random breakdown and intentional attack. In: Studies in computational intelligence, pp 553\u201361","DOI":"10.1007\/978-3-319-73150-6_44"},{"key":"426_CR52","doi-asserted-by":"publisher","first-page":"121561","DOI":"10.1016\/j.physa.2019.121561","volume":"530","author":"Q Nguyen","year":"2019","unstructured":"Nguyen Q, Pham HD, Cassi D, Bellingeri M (2019) Conditional attack strategy for real-world complex networks. Physica A 530:121561","journal-title":"Physica A"},{"key":"426_CR53","unstructured":"Nguyen Q, Trang Le T (2019) Structure and robustness of Facebook's pages networks. In: Proceeding of the 2019 the 10th conference on network modeling and analysis (Marami 2019), Dijon, France"},{"issue":"6040","key":"426_CR56","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1126\/science.1206241","volume":"333","author":"O Riordan","year":"2011","unstructured":"Riordan O, Warnke L (2011) Explosive percolation is continuous. Science 333(6040):322\u2013324","journal-title":"Science"},{"key":"426_CR75","doi-asserted-by":"crossref","unstructured":"Rozemberczki B, Davies R, Sarkar R, Sutton C (2018) GEMSEC: graph embedding with self clustering","DOI":"10.1145\/3341161.3342890"},{"issue":"4","key":"426_CR57","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pcbi.1000736","volume":"6","author":"M Salathe","year":"2010","unstructured":"Salathe M, Jones JH (2010) Dynamics and control of diseases in networks with community structure. PLoS Comput Biol 6(4):e1000736. https:\/\/doi.org\/10.1371\/journal.pcbi.1000736","journal-title":"PLoS Comput Biol"},{"key":"426_CR58","doi-asserted-by":"publisher","first-page":"062805","DOI":"10.1103\/PhysRevE.92.062805","volume":"92","author":"S Shai","year":"2015","unstructured":"Shai S et al (2015) Critical tipping point distinguishing two types of transitions in modular network structures. Phys Rev E 92:062805","journal-title":"Phys Rev E"},{"issue":"2","key":"426_CR60","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1016\/j.cja.2017.01.010","volume":"30","author":"X Sun","year":"2017","unstructured":"Sun X, Gollnick V, Wandelt S (2017) Robustness analysis metrics for worldwide airport network: a comprehensive. Chin J Aeronaut 30(2):500\u2013512","journal-title":"Chin J Aeronaut"},{"key":"426_CR73","doi-asserted-by":"crossref","unstructured":"Wandelt S, Sun X, Feng D, Zanin M, Havlin S (2018) A comparative analysis of approaches to network-dismantling. Sci Rep 8:13513","DOI":"10.1038\/s41598-018-31902-8"},{"key":"426_CR61","doi-asserted-by":"publisher","first-page":"111954","DOI":"10.1109\/ACCESS.2020.3002807","volume":"8","author":"S Wandelt","year":"2020","unstructured":"Wandelt S, Shi X, Sun X, Zanin M (2020) Community detection boosts network dismantling on real-world networks. IEEE Access 8:111954\u2013111965","journal-title":"IEEE Access"},{"key":"426_CR62","doi-asserted-by":"publisher","first-page":"48002","DOI":"10.1209\/0295-5075\/112\/48002","volume":"112","author":"Z Wang","year":"2015","unstructured":"Wang Z, Zhao DW, Wang L, Sun GQ, Jin Z (2015) Immunity of multiplex networks via acquaintance vaccination. EPL 112:48002. https:\/\/doi.org\/10.1209\/0295-5075\/112\/48002","journal-title":"EPL"},{"key":"426_CR63","doi-asserted-by":"publisher","first-page":"6684","DOI":"10.1038\/30918","volume":"393","author":"DJ Watts","year":"1998","unstructured":"Watts DJ, Strogatz SH (1998) Collective dynamics of \u201csmall-world\u201d networks. Nature 393:6684","journal-title":"Nature"},{"key":"426_CR64","first-page":"1","volume":"10","author":"Y Yang","year":"2015","unstructured":"Yang Y, Li Z, Chen Y, Zhang X, Wang S (2015) Improving the robustness of complex networks with preserving community structure. PLoS ONE 10:1\u201314","journal-title":"PLoS ONE"}],"container-title":["Applied Network Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-021-00426-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41109-021-00426-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-021-00426-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T05:40:31Z","timestamp":1635831631000},"score":1,"resource":{"primary":{"URL":"https:\/\/appliednetsci.springeropen.com\/articles\/10.1007\/s41109-021-00426-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,2]]},"references-count":60,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["426"],"URL":"https:\/\/doi.org\/10.1007\/s41109-021-00426-y","relation":{},"ISSN":["2364-8228"],"issn-type":[{"value":"2364-8228","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,2]]},"assertion":[{"value":"19 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 October 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 November 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"82"}}