{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T21:35:13Z","timestamp":1776893713828,"version":"3.51.2"},"reference-count":48,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Communications in Nonlinear Science and Numerical Simulation"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.cnsns.2026.109821","type":"journal-article","created":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T08:05:51Z","timestamp":1770797151000},"page":"109821","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Detection of pinning attack in dynamical networks with optimal control cost"],"prefix":"10.1016","volume":"158","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1015-0101","authenticated-orcid":false,"given":"Saber","family":"Jafarizadeh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2455-0723","authenticated-orcid":false,"given":"Hamideh","family":"Bour","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cnsns.2026.109821_bib0001","doi-asserted-by":"crossref","DOI":"10.1103\/RevModPhys.88.035006","article-title":"Control principles of complex systems","volume":"88","author":"Liu","year":"2016","journal-title":"Rev Mod Phys"},{"issue":"1","key":"10.1016\/j.cnsns.2026.109821_bib0002","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1109\/TSMC.2020.3042823","article-title":"A survey on intelligent control for multiagent systems","volume":"51","author":"Shi","year":"2020","journal-title":"IEEE Trans Syst, Man, Cybernet: Syst"},{"issue":"11","key":"10.1016\/j.cnsns.2026.109821_bib0003","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3567591","article-title":"Constructing neural network based models for simulating dynamical systems","volume":"55","author":"Legaard","year":"2023","journal-title":"ACM Comput Surv"},{"issue":"6","key":"10.1016\/j.cnsns.2026.109821_bib0004","doi-asserted-by":"crossref","first-page":"5498","DOI":"10.1109\/TCYB.2020.3035260","article-title":"Cooperative tracking control of heterogeneous mixed-order multiagent systems with higher-order nonlinear dynamics","volume":"52","author":"Li","year":"2022","journal-title":"IEEE Trans Cybern"},{"issue":"3","key":"10.1016\/j.cnsns.2026.109821_bib0005","doi-asserted-by":"crossref","first-page":"464","DOI":"10.1109\/TEVC.2017.2737600","article-title":"Evolutionary computation for community detection in networks: a review","volume":"22","author":"Pizzuti","year":"2018","journal-title":"IEEE Trans Evol Comput"},{"issue":"5","key":"10.1016\/j.cnsns.2026.109821_bib0006","doi-asserted-by":"crossref","first-page":"714","DOI":"10.1049\/iet-cta.2016.1150","article-title":"Flocking motion of multi-agent system by dynamic pinning control","volume":"11","author":"Gao","year":"2017","journal-title":"IET Control Theory Appl"},{"issue":"4","key":"10.1016\/j.cnsns.2026.109821_bib0007","doi-asserted-by":"crossref","first-page":"2948","DOI":"10.1109\/COMST.2016.2558818","article-title":"Congestion control design for multipath transport protocols: a survey","volume":"18","author":"Xu","year":"2016","journal-title":"IEEE Commun Surveys Tutor"},{"issue":"5","key":"10.1016\/j.cnsns.2026.109821_bib0008","doi-asserted-by":"crossref","first-page":"2483","DOI":"10.1109\/TII.2019.2905295","article-title":"A survey on model-based distributed control and filtering for industrial cyber-physical systems","volume":"15","author":"Ding","year":"2019","journal-title":"IEEE Trans Ind Informat"},{"key":"10.1016\/j.cnsns.2026.109821_bib0009","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2022.108042","article-title":"A multi-layered intrusion detection system for software defined networking","volume":"101","author":"Bour","year":"2022","journal-title":"Comput Electr Eng"},{"issue":"2","key":"10.1016\/j.cnsns.2026.109821_bib0010","doi-asserted-by":"crossref","first-page":"616","DOI":"10.1002\/oca.2562","article-title":"Gossip algorithm with nonuniform clock distribution: optimization over classical and quantum networks","volume":"41","author":"Jafarizadeh","year":"2020","journal-title":"Optimal Control Appl Methods"},{"key":"10.1016\/j.cnsns.2026.109821_bib0011","doi-asserted-by":"crossref","DOI":"10.1016\/j.cnsns.2024.108186","article-title":"The dynamic analysis of the rumor spreading and behavior diffusion model with higher-order interactions","volume":"138","author":"Xia","year":"2024","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"10.1016\/j.cnsns.2026.109821_bib0012","doi-asserted-by":"crossref","DOI":"10.1016\/j.automatica.2019.108576","article-title":"Secure analysis of dynamic networks under pinning attacks against synchronization","volume":"111","author":"Li","year":"2020","journal-title":"Automatica"},{"key":"10.1016\/j.cnsns.2026.109821_bib0013","doi-asserted-by":"crossref","first-page":"1684","DOI":"10.1016\/j.neucom.2017.10.008","article-title":"A survey on recent advances in distributed sampled-data cooperative control of multi-agent systems","volume":"275","author":"Ge","year":"2018","journal-title":"Neurocomputing"},{"issue":"1","key":"10.1016\/j.cnsns.2026.109821_bib0014","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/81.974874","article-title":"Synchronization in scale-free dynamical networks: robustness and fragility","volume":"49","author":"Wang","year":"2002","journal-title":"IEEE Trans Circuits Syst I Fundam Theory Appl"},{"issue":"473","key":"10.1016\/j.cnsns.2026.109821_bib0015","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1038\/nature10011","article-title":"Controllability of complex networks","author":"Liu","year":"2011","journal-title":"Nature"},{"issue":"4","key":"10.1016\/j.cnsns.2026.109821_bib0016","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1561\/2600000019","article-title":"On the control of multi-agent systems: a survey","volume":"6","author":"Chen","year":"2019","journal-title":"Found Trends Syst Control"},{"issue":"4","key":"10.1016\/j.cnsns.2026.109821_bib0017","doi-asserted-by":"crossref","first-page":"828","DOI":"10.1109\/TII.2012.2187911","article-title":"Evolutionary pinning control and its application in UAV coordination","volume":"8","author":"Tang","year":"2012","journal-title":"IEEE Trans Ind Inf"},{"key":"10.1016\/j.cnsns.2026.109821_bib0018","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.neunet.2016.09.002","article-title":"Pinning-controlled synchronization of delayed neural networks with distributed-delay coupling via impulsive control","volume":"85","author":"He","year":"2017","journal-title":"Neural Networks"},{"key":"10.1016\/j.cnsns.2026.109821_bib0019","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1016\/j.ins.2020.01.022","article-title":"Event-triggered distributed control for synchronization of multiple memristive neural networks under cyber-physical attacks","volume":"518","author":"Wang","year":"2020","journal-title":"Inf Sci (Ny)"},{"issue":"24252","key":"10.1016\/j.cnsns.2026.109821_bib0020","article-title":"Optimizing dynamical network structure for pinning control","volume":"6","author":"Orouskhani","year":"2016","journal-title":"Sci Rep"},{"key":"10.1016\/j.cnsns.2026.109821_bib0021","doi-asserted-by":"crossref","DOI":"10.1016\/j.automatica.2023.110851","article-title":"Optimal curing resource allocation for epidemic spreading processes","volume":"150","author":"Jafarizadeh","year":"2023","journal-title":"Automatica"},{"key":"10.1016\/j.cnsns.2026.109821_bib0022","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1016\/j.ins.2020.05.085","article-title":"Group consensus via pinning control for a class of heterogeneous multi-agent systems with input constraints","volume":"542","author":"Li","year":"2021","journal-title":"Inf Sci (Ny)"},{"key":"10.1016\/j.cnsns.2026.109821_bib0023","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1016\/j.ins.2023.01.045","article-title":"Cooperative driving of heterogeneous uncertain nonlinear connected and autonomous vehicles via distributed switching robust PID-like control","volume":"625","author":"Coppola","year":"2023","journal-title":"Inf Sci (Ny)"},{"issue":"3","key":"10.1016\/j.cnsns.2026.109821_bib0024","doi-asserted-by":"crossref","DOI":"10.1063\/1.2743098","article-title":"Effects of the network structural properties on its controllability","volume":"17","author":"Sorrentino","year":"2007","journal-title":"Chaos: An Interdiscipl J Nonlinear Sci"},{"issue":"2","key":"10.1016\/j.cnsns.2026.109821_bib0025","first-page":"767","article-title":"Trajectory tracking on complex networks via inverse optimal pinning control","volume":"64","author":"Vega","year":"2019","journal-title":"IEEE Trans Automat Contr"},{"issue":"1","key":"10.1016\/j.cnsns.2026.109821_bib0026","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1109\/TNNLS.2014.2311838","article-title":"Synchronization of nonlinear coupled networks via aperiodically intermittent pinning control","volume":"26","author":"Liu","year":"2015","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"8","key":"10.1016\/j.cnsns.2026.109821_bib0027","doi-asserted-by":"crossref","first-page":"7377","DOI":"10.1109\/TCYB.2020.3021982","article-title":"H\u221e pinning control of complex dynamical networks under dynamic quantization effects: a coupled backward riccati equation approach","volume":"52","author":"Liu","year":"2022","journal-title":"IEEE Trans Cybern"},{"issue":"12","key":"10.1016\/j.cnsns.2026.109821_bib0028","doi-asserted-by":"crossref","first-page":"4262","DOI":"10.1109\/TCYB.2018.2861822","article-title":"Pinning synchronization of multiplex delayed networks with stochastic perturbations","volume":"49","author":"Zhao","year":"2019","journal-title":"IEEE Trans Cybern"},{"key":"10.1016\/j.cnsns.2026.109821_bib0029","first-page":"1","article-title":"Coordination and control of complex network systems with switching topologies: a survey","author":"Wen","year":"2020","journal-title":"IEEE Tran on Systems, Man, and Cybernetics: Systems"},{"key":"10.1016\/j.cnsns.2026.109821_bib0030","series-title":"2020\u202fIEEE 45Th conference on local computer networks (LCN)","first-page":"33","article-title":"Pinning control of dynamical networks with optimal cost","author":"Jafarizadeh","year":"2020"},{"issue":"11","key":"10.1016\/j.cnsns.2026.109821_bib0031","doi-asserted-by":"crossref","first-page":"7160","DOI":"10.1109\/TSMC.2022.3151222","article-title":"Pinning control of dynamical networks with optimal convergence rate","volume":"52","author":"Jafarizadeh","year":"2022","journal-title":"IEEE Trans Syst, Man, Cybernet: Syst"},{"key":"10.1016\/j.cnsns.2026.109821_bib0032","doi-asserted-by":"crossref","DOI":"10.1016\/j.automatica.2019.108636","article-title":"Adaptive synchronization of multi-agent systems with resilience to communication link faults","volume":"111","author":"Chen","year":"2020","journal-title":"Automatica"},{"key":"10.1016\/j.cnsns.2026.109821_bib0033","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1016\/j.ins.2023.01.077","article-title":"Secure synchronization against link attacks in complex networks with event-triggered coupling","volume":"628","author":"Liu","year":"2023","journal-title":"Inf Sci (Ny)"},{"key":"10.1016\/j.cnsns.2026.109821_bib0034","doi-asserted-by":"crossref","DOI":"10.1016\/j.cnsns.2024.108303","article-title":"Secure pinning synchronization on aperiodic intermittent event-triggered control in discrete-time complex networks against multi-pattern link attacks","volume":"139","author":"Yuan","year":"2024","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"10.1016\/j.cnsns.2026.109821_bib0035","doi-asserted-by":"crossref","DOI":"10.1016\/j.automatica.2020.109128","article-title":"A dynamic event-triggered approach to observer-based PID security control subject to deception attacks","volume":"120","author":"Zhao","year":"2020","journal-title":"Automatica"},{"key":"10.1016\/j.cnsns.2026.109821_bib0036","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1016\/j.ins.2020.08.085","article-title":"Secure synchronization of stochastic complex networks subject to deception attack with nonidentical nodes and internal disturbance","volume":"547","author":"Feng","year":"2021","journal-title":"Inf Sci (Ny)"},{"key":"10.1016\/j.cnsns.2026.109821_bib0037","doi-asserted-by":"crossref","DOI":"10.1016\/j.cnsns.2024.108421","article-title":"Secure multi-synchronization of heterogeneous dynamical networks with deception attacks via event-triggered impulsive control","volume":"140","author":"Guo","year":"2025","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"10.1016\/j.cnsns.2026.109821_bib0038","doi-asserted-by":"crossref","DOI":"10.1016\/j.cnsns.2024.108091","article-title":"Event-triggered synchronization control for fractional-order IT2 fuzzy multi-weighted complex dynamical networks with deception attacks","volume":"136","author":"Sakthivel","year":"2024","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"10.1016\/j.cnsns.2026.109821_bib0039","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2024.120399","article-title":"Adaptive memory event-triggered observer-based pinning synchronization control for complex dynamical networks under asynchronous attacks","volume":"665","author":"Shu","year":"2024","journal-title":"Inf Sci (Ny)"},{"key":"10.1016\/j.cnsns.2026.109821_bib0040","doi-asserted-by":"crossref","DOI":"10.1016\/j.cnsns.2024.108356","article-title":"Privacy-preserving secure control for nonlinear multi-agent systems under hybrid attacks","volume":"140","author":"Duan","year":"2025","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"10.1016\/j.cnsns.2026.109821_bib0041","doi-asserted-by":"crossref","first-page":"753","DOI":"10.1016\/j.ins.2020.08.018","article-title":"Observer-based synchronization control for complex networks against asynchronous attacks","volume":"546","author":"Liu","year":"2021","journal-title":"Inf Sci (Ny)"},{"key":"10.1016\/j.cnsns.2026.109821_bib0042","first-page":"1","article-title":"Resilient design of leader-follower consensus against cyber-attacks","author":"Sadabadi","year":"2023","journal-title":"IEEE Trans Control Network Syst"},{"key":"10.1016\/j.cnsns.2026.109821_bib0043","doi-asserted-by":"crossref","first-page":"2109","DOI":"10.1103\/PhysRevLett.80.2109","article-title":"Master stability functions for synchronized coupled systems","volume":"80","author":"Pecora","year":"1998","journal-title":"Phys Rev Lett"},{"key":"10.1016\/j.cnsns.2026.109821_bib0044","doi-asserted-by":"crossref","DOI":"10.1016\/j.automatica.2019.108711","article-title":"Optimizing synchronizability in networks of coupled systems","volume":"112","author":"Jafarizadeh","year":"2020","journal-title":"Automatica"},{"issue":"2","key":"10.1016\/j.cnsns.2026.109821_bib0045","doi-asserted-by":"crossref","first-page":"1517","DOI":"10.1109\/TNSE.2021.3063240","article-title":"Optimal synchronizability in networks of coupled systems: topological view","volume":"8","author":"Jafarizadeh","year":"2021","journal-title":"IEEE Trans Network Sci Eng"},{"key":"10.1016\/j.cnsns.2026.109821_bib0046","series-title":"Nonnegative matrices in the mathematical sciences","author":"Berman","year":"1994"},{"issue":"4","key":"10.1016\/j.cnsns.2026.109821_bib0047","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/j.physrep.2005.10.009","article-title":"Complex networks: structure and dynamics","volume":"424","author":"Boccaletti","year":"2006","journal-title":"Phys Rep"},{"issue":"3","key":"10.1016\/j.cnsns.2026.109821_bib0048","doi-asserted-by":"crossref","first-page":"2339","DOI":"10.1103\/PhysRevE.50.2339","article-title":"Nonlinear feedback for controlling the lorenz equation","volume":"50","author":"Alvarez-Ram\u00edrez","year":"1994","journal-title":"Phys Rev E"}],"container-title":["Communications in Nonlinear Science and Numerical Simulation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1007570426001826?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1007570426001826?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T20:35:36Z","timestamp":1776890136000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1007570426001826"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":48,"alternative-id":["S1007570426001826"],"URL":"https:\/\/doi.org\/10.1016\/j.cnsns.2026.109821","relation":{},"ISSN":["1007-5704"],"issn-type":[{"value":"1007-5704","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Detection of pinning attack in dynamical networks with optimal control cost","name":"articletitle","label":"Article Title"},{"value":"Communications in Nonlinear Science and Numerical Simulation","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cnsns.2026.109821","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"109821"}}