{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:26:24Z","timestamp":1754155584487,"version":"3.41.2"},"reference-count":35,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2014,4,29]],"date-time":"2014-04-29T00:00:00Z","timestamp":1398729600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4,29]]},"abstract":"<jats:sec>\n               <jats:title content-type=\"abstract-heading\">Purpose<\/jats:title>\n               <jats:p> \u2013 By aiming at defending cascade failures effectively, the purpose of this paper is to present a strategy of inserting modular topologies into urban road network through reducing the burdens of critical components with too much traffic flow. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title>\n               <jats:p> \u2013 Each module is considered as a small-world random network, which is inserted into the initial Barab\u00e1si-Albert scale-free network. Based on the user-equilibrium assignment, the strategy searches for remote nodes with low betweeness and flow in the network, and sets these nodes to be connected with the modular topologies. In this sense, the inserted modules are supposed to attach to the nodes with lower intensity of shorter path, and avoid bringing more impact to the nodes with higher betweeness and traffic flow. By using efficiency as the measurement of cascading failures, the performance of the networks generated through the strategy is tested. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Findings<\/jats:title>\n               <jats:p> \u2013 The results show that the performance of the strategy is sensitive to the average degree of the inserted modular, and the modular size with a better effect on reducing the size of cascading failures or delaying the time of breakdown, while the other factors (e.g. the rewired probability) present few differences among various values. Meanwhile, it is found that the importance-based attachment mechanism has a better effect on preventing the cascading failures, especially delaying the step time of the larger reduction. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title>\n               <jats:p> \u2013 The strategy aims at alleviating the burdens in critical components to prevent the cascading failures of the network, and provides practical guidance on the decision of the urban road network evolving process. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title>\n               <jats:p> \u2013 An effective strategy for cascade defense in urban road network is proposed in this paper.<\/jats:p>\n            <\/jats:sec>","DOI":"10.1108\/k-11-2013-0250","type":"journal-article","created":{"date-parts":[[2014,5,29]],"date-time":"2014-05-29T08:45:00Z","timestamp":1401353100000},"page":"750-763","source":"Crossref","is-referenced-by-count":4,"title":["Cascade defense in urban road network by inserting modular topologies"],"prefix":"10.1108","volume":"43","author":[{"given":"Zhiyun","family":"Zou","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jinlong","family":"Wu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jianzhi","family":"Gao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xuecai","family":"Xu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"140","reference":[{"key":"key2021010123092796300_b2","doi-asserted-by":"crossref","unstructured":"Bao, Z.J.\n               , \n                  Cao, Y.J.\n                and \n                  Ding, L.J.\n                (2009), \u201cComparison of cascading failures in small-world and scale-free networks subject to vertex and edge attacks\u201d, Physica A, Vol. 388 No. 20, pp. 4491-4498.","DOI":"10.1016\/j.physa.2009.07.017"},{"key":"key2021010123092796300_b3","doi-asserted-by":"crossref","unstructured":"Barab\u00e1si, A.-L.\n                and \n                  Albert, R.\n                (1999), \u201cEmergence of scaling in random networks\u201d, Science, Vol. 286, pp. 509-512.","DOI":"10.1126\/science.286.5439.509"},{"key":"key2021010123092796300_b5","doi-asserted-by":"crossref","unstructured":"Berche, B.\n               , \n                  Von Ferber, C.\n               , \n                  Holovatch, T.\n                and \n                  Holovatch, Y.\n                (2009), \u201cResilience of public transport networks against attacks\u201d, The European Physical Journal B, Vol. 71, pp. 125-137.","DOI":"10.1140\/epjb\/e2009-00291-3"},{"key":"key2021010123092796300_b6","doi-asserted-by":"crossref","unstructured":"Crucitti, P.\n               , \n                  Latora, V.\n                and \n                  Marchiori, M.\n                (2004a), \u201cModel for cascading failures in complex networks\u201d, Phys. Rev. E, Vol. 69.","DOI":"10.1103\/PhysRevE.69.045104"},{"key":"key2021010123092796300_b7","doi-asserted-by":"crossref","unstructured":"Crucitti, P.\n               , \n                  Latora, V.\n                and \n                  Marchiori, M.\n                (2004b), \u201cA topological analysis of the Italian electric power grid\u201d, Physica A: Statistical Mechanics and its Applications, Vol. 338 Nos 1\/2, pp. 92-97.","DOI":"10.1016\/j.physa.2004.02.029"},{"key":"key2021010123092796300_b8","doi-asserted-by":"crossref","unstructured":"Guimera, R.\n               , \n                  Mossa, S.\n               , \n                  Turtschi, A.\n                and \n                  Amaral, L.a.N.\n                (2005), \u201cThe worldwide air transportation network: anomalous centrality, community structure, and cities\u2019 global roles\u201d, Proceedings of the National Academy of Sciences of the United States of America, Vol. 102, pp. 7794-7799.","DOI":"10.1073\/pnas.0407994102"},{"key":"key2021010123092796300_b10","unstructured":"Houli, D.\n               , \n                  Zhiheng, L.\n                and \n                  Yi, Z.\n                (2010), \u201cRobustness analysis model of urban transit network\u201d, Journal of South China University of Technology, Vol. 38, pp. 70-75, 81."},{"key":"key2021010123092796300_b11","unstructured":"Huang, W.\n                and \n                  Chow, T.\n                (2010), \u201cEffective strategy of adding nodes and links for maximizing the traffic capacity of scale-free network\u201d, Chaos, Vol. 20."},{"key":"key2021010123092796300_b12","doi-asserted-by":"crossref","unstructured":"Jiang, B.\n                and \n                  Claramunt, C.\n                (2004), \u201cTopological analysis of urban street networks\u201d, Environment and Planning B-Planning & Design, Vol. 31, pp. 151-162.","DOI":"10.1068\/b306"},{"key":"key2021010123092796300_b13","doi-asserted-by":"crossref","unstructured":"Kurant, M.\n                and \n                  Thiran, P.\n                (2006), \u201cExtraction and analysis of traffic and topologies of transportation networks\u201d, Physical Review E, Vol. 74, p. -.","DOI":"10.1103\/PhysRevE.74.036114"},{"key":"key2021010123092796300_b16","doi-asserted-by":"crossref","unstructured":"Molloy, M.\n                and \n                  Reed, B.\n                (1995), \u201cA critical point for random graphs with a given degree sequence\u201d, Random Struct. & Algor., Vol. 6, pp. 161-180.","DOI":"10.1002\/rsa.3240060204"},{"key":"key2021010123092796300_b17","doi-asserted-by":"crossref","unstructured":"Molloy, M.\n                and \n                  Reed, B.\n                (1998), \u201cThe size of the giant component of a random graphs with a given degree sequence\u201d, Comb. Probab. Comput., Vol. 7, pp. 295-305.","DOI":"10.1017\/S0963548398003526"},{"key":"key2021010123092796300_b19","doi-asserted-by":"crossref","unstructured":"Motter, A.E.\n                (2004), \u201cCascade Control and Defense in Complex Networks\u201d, Physical Review Letters, Vol. 93, p. -.","DOI":"10.1103\/PhysRevLett.93.098701"},{"key":"key2021010123092796300_b20","doi-asserted-by":"crossref","unstructured":"Motter, A.E.\n                and \n                  Lai, Y.-C.\n                (2002), \u201cCascade-based attacks on complex networks\u201d, Physical Review E, Vol. 66, p. -.","DOI":"10.1103\/PhysRevE.66.065102"},{"key":"key2021010123092796300_b21","doi-asserted-by":"crossref","unstructured":"Pastor-Satorras, R.\n                and \n                  Vespignani, A.\n                (2004), Evolution and Structure of the Internet: A Statistical Physics Approach, Cambirdge University Press, Cambridge.","DOI":"10.1017\/CBO9780511610905"},{"key":"key2021010123092796300_b23","doi-asserted-by":"crossref","unstructured":"Strogatz, S.H.\n                (2001), \u201cExploring complex networks\u201d, Nature, Vol. 410, pp. 268-276.","DOI":"10.1038\/35065725"},{"key":"key2021010123092796300_b24","doi-asserted-by":"crossref","unstructured":"Von Ferber, C.\n               , \n                  Holovatch, T.\n               , \n                  Holovatch, Y.\n                and \n                  Palchykov, V.\n                (2009), \u201cPublic transport networks: empirical analysis and modeling\u201d, The European Physical Journal B, Vol. 68, pp. 261-275.","DOI":"10.1140\/epjb\/e2009-00090-x"},{"key":"key2021010123092796300_b26","doi-asserted-by":"crossref","unstructured":"Wang, J.W.\n                and \n                  Rong, L.L.\n                (2009), \u201cA model for cascading failures in scale-free networks with a breakdown probability\u201d, Physica A, Vol. 388 No. 7, pp. 1289-1298.","DOI":"10.1016\/j.physa.2008.12.067"},{"key":"key2021010123092796300_b28","unstructured":"Wang, W.X.\n                and \n                  Chen, G.R.\n                (2008), \u201cUniversal robustness characteristic of weighted networks against cascading failure\u201d, Physica. Rev. E, Vol. 77."},{"key":"key2021010123092796300_b29","doi-asserted-by":"crossref","unstructured":"Watts, D.J.\n                and \n                  Strogatz, S.H.\n                (1998), \u201cCollective dynamics of small-world networks\u201d, Nature, Vol. 393, pp. 440-442.","DOI":"10.1038\/30918"},{"key":"key2021010123092796300_b30","unstructured":"Wu, J.J.\n               , \n                  Gao, Z.Y.\n                and \n                  Sun, H.J.\n                (2006), \u201cCascade and breakdown in scale-free networks with community structure\u201d, Phys. Rev. E, Vol. 74."},{"key":"key2021010123092796300_b32","doi-asserted-by":"crossref","unstructured":"Wu, J.J.\n               , \n                  Sun, H.J.\n                and \n                  Gao, Z.Y.\n                (2007b), \u201cCascading failures on weighted urban traffic equilibrium networks\u201d, Physica A, Vol. 386 No. 1, pp. 407-413.","DOI":"10.1016\/j.physa.2007.08.034"},{"key":"key2021010123092796300_b33","doi-asserted-by":"crossref","unstructured":"Wu, J.J.\n               , \n                  Sun, H.J.\n                and \n                  Gao, Z.Y.\n                (2008), \u201cDynamic urban traffic flow behavior on scale-free networks\u201d, Physica A, Vol. 387 Nos 2\/3, pp. 653-660.","DOI":"10.1016\/j.physa.2007.09.020"},{"key":"key2021010123092796300_b35","doi-asserted-by":"crossref","unstructured":"Zheng, J.F.\n               , \n                  Gao, Z.Y.\n                and \n                  Zhao, X.M.\n                (2007), \u201cModeling cascading failures in congested complex networks\u201d, Physica A, Vol. 385 No. 2, pp. 700-706.","DOI":"10.1016\/j.physa.2007.07.031"},{"key":"key2021010123092796300_b36","unstructured":"Zou, Z.Y.\n               , \n                  Lai, J.Y.\n                and \n                  Gao, J.Z.\n                (2013), \u201cReducing the vulnerability of network by inserting modular topologies\u201d, Chaos, Vol. 23."},{"key":"key2021010123092796300_frd1","doi-asserted-by":"crossref","unstructured":"Albert, R.\n               , \n                  Jeong, H.\n                and \n                  Barabasi, A.L.\n                (2000), \u201cError and attack tolerance of complex networks\u201d, Nature, Vol. 406, pp. 378-382.","DOI":"10.1038\/35019019"},{"key":"key2021010123092796300_frd2","doi-asserted-by":"crossref","unstructured":"Barab\u00e1si, A.-L.\n               , \n                  Albert, R.\n                and \n                  Jeong, H.\n                (1999), \u201cMean-field theory for scale-free random networks\u201d, Physica A: Statistical Mechanics and its Applications, Vol. 272, pp. 173-187.","DOI":"10.1016\/S0378-4371(99)00291-5"},{"key":"key2021010123092796300_frd3","unstructured":"Heide, D.\n               , \n                  Schafer, M.\n                and \n                  Greiner, M.\n                (2008), \u201cRobustness of networks against fluctuation induced cascading failures\u201d, Phys. Rev. E, Vol. 77."},{"key":"key2021010123092796300_frd4","unstructured":"Li, W.\n                and \n                  Cai, X.\n                (2004), \u201cStatistical analysis of airport network of China\u201d, Physical Review E, Vol. 69."},{"key":"key2021010123092796300_frd5","doi-asserted-by":"crossref","unstructured":"Li, Y.F.\n               , \n                  Sansavini, G.\n                and \n                  Zio, E.\n                (2013), \u201cNon-dominated sorting binary differential evolution for the multi-objective optimization of cascading failures protection in complex networks\u201d, Reliab. Eng. Syst. Safe., Vol. 111, pp. 195-205.","DOI":"10.1016\/j.ress.2012.11.002"},{"key":"key2021010123092796300_frd6","doi-asserted-by":"crossref","unstructured":"Moreno, Y.\n               , \n                  Gomez, J.B.\n                and \n                  Pacheco, A.F.\n                (2002), \u201cInstability of scale-free networks under node-breaking avalanches\u201d, Europhys Lett., Vol. 58 No. 4, pp. 630-636.","DOI":"10.1209\/epl\/i2002-00442-2"},{"key":"key2021010123092796300_frd7","unstructured":"Simonsen, I.\n               , \n                  Buzna, L.\n               , \n                  Peters, K.\n               , \n                  Bornholdt, S.\n                and \n                  Helbing, D.\n                (2008), \u201cTransient dynamics increasing network vulnerability to cascading failures\u201d, Phys. Rev. Lett., Vol. 100."},{"key":"key2021010123092796300_frd8","doi-asserted-by":"crossref","unstructured":"Wang, J.W.\n               , \n                  Rong, L.L.\n               , \n                  Zhang, L.\n                and \n                  Zhang, Z.Z.\n                (2008), \u201cAttack vulnerability of scale-free networks due to cascading failures\u201d, Physica A, Vol. 387 No. 26, pp. 6671-6678.","DOI":"10.1016\/j.physa.2008.08.037"},{"key":"key2021010123092796300_b31","doi-asserted-by":"crossref","unstructured":"Wu, J.J.\n               , \n                  Gao, Z.Y.\n                and \n                  Sun, H.J.\n                (2007a), \u201cEffects of the cascading failures on scale-free traffic networks\u201d, Physica A, Vol. 378 No. 2, pp. 505-511.","DOI":"10.1016\/j.physa.2006.12.003"},{"key":"key2021010123092796300_frd9","doi-asserted-by":"crossref","unstructured":"Xu, X.P.\n               , \n                  Hu, J.H.\n               , \n                  Liu, F.\n                and \n                  Liu, L.S.\n                (2007), \u201cScaling and correlations in three bus-transport networks of China\u201d, Physica A-Statistical Mechanics and Its Applications, Vol. 374 No. 1, pp. 441-448.","DOI":"10.1016\/j.physa.2006.06.021"}],"container-title":["Kybernetes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/K-11-2013-0250","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/K-11-2013-0250\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/K-11-2013-0250\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:50:53Z","timestamp":1753393853000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/k\/article\/43\/5\/750-763\/272661"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,29]]},"references-count":35,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2014,4,29]]}},"alternative-id":["10.1108\/K-11-2013-0250"],"URL":"https:\/\/doi.org\/10.1108\/k-11-2013-0250","relation":{},"ISSN":["0368-492X"],"issn-type":[{"type":"print","value":"0368-492X"}],"subject":[],"published":{"date-parts":[[2014,4,29]]}}}