{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:12:20Z","timestamp":1730193140108,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,2]]},"DOI":"10.1109\/35021bigcomp.2015.7072813","type":"proceedings-article","created":{"date-parts":[[2015,4,3]],"date-time":"2015-04-03T14:19:44Z","timestamp":1428070784000},"page":"279-286","source":"Crossref","is-referenced-by-count":0,"title":["Robust network construction against intentional attacks"],"prefix":"10.1109","author":[{"given":"Hui","family":"Wang","sequence":"first","affiliation":[]},{"given":"Wanyun","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Yanghua","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Hanghang","family":"Tong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"On the vulnerability of large graphs In ICDM'10","year":"0","author":"tong","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1137\/0603011"},{"key":"ref31","first-page":"16125","volume":"74","author":"tanizawa","year":"2006","journal-title":"Optimization of the robustness of multimodal networks Phys Rev E"},{"key":"ref30","first-page":"47101","article-title":"Optimization of network robustness to waves of targeted and random attacks. Phys. Rev. E","volume":"71","author":"tanizawa","year":"2005"},{"key":"ref36","first-page":"440","volume":"393","author":"watts","year":"1998","journal-title":"Collective dynamics of &#x2018;small-world&#x2019; networks Nature"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8667.2006.00465.x"},{"key":"ref34","first-page":"353","volume":"406","author":"tu","year":"2000","journal-title":"How robust is the internet? Nature"},{"journal-title":"The CAIDA AS Relationships Dataset","year":"2003","author":"group","key":"ref10"},{"journal-title":"Information Diffusion through Blogspace WWW2004","year":"0","author":"gruhl","key":"ref11"},{"key":"ref12","first-page":"496","volume":"10","author":"hakimi","year":"1962","journal-title":"On the realizability of a set of integers as degrees of the vertices of a simple graph J SIAM Appl Math"},{"key":"ref13","first-page":"477","volume":"80","author":"havel","year":"1955","journal-title":"A remark on the existence of finite graphs Casopis Pest Mat"},{"key":"ref14","first-page":"1027","volume":"2011","author":"herrmann","year":"2011","journal-title":"Onion-like network topology enhances robustness against malicious attacks Journal of Statistical Mechanics Theory and Experiment"},{"key":"ref15","first-page":"56109","volume":"65","author":"holme","year":"2002","journal-title":"Attack vulnerability of complex networks Phys Rev E"},{"key":"ref16","first-page":"392001","volume":"42","author":"kim","year":"2009","journal-title":"Degree-based graph construction Journal of Physics A"},{"key":"ref17","volume":"46","author":"kleinberg","year":"0","journal-title":"Authoritative sources in a hyperlinked environment"},{"journal-title":"Efficient sensor placement optimization for securing large water distribution networks Journal of Water Resources Planning and Management","year":"2008","author":"krause","key":"ref18"},{"journal-title":"Maximization of network survivability considering degree of disconnectivity In ICCSA'11","year":"0","author":"lin","key":"ref19"},{"journal-title":"Neighborhood formation and anomaly detection in bipartite graphs In ICDM'05","year":"0","author":"sun","key":"ref28"},{"key":"ref4","first-page":"159","volume":"33","author":"brualdi","year":"1980","journal-title":"Matrices of zeros and ones with fixed row and column sum vectors Linear Algebra and its Applications"},{"key":"ref27","first-page":"26102","volume":"77","author":"sol\u00e9","year":"2008","journal-title":"Robustness of the european power grids under intentional attack Phys Rev E"},{"journal-title":"Epidemic profiles and defense of scale-free networks In WORM'03","year":"0","author":"briesemeister","key":"ref3"},{"key":"ref6","first-page":"3682","volume":"86","author":"cohen","year":"2001","journal-title":"Breakdown of the internet under intentional attack Phys Rev Lett"},{"key":"ref29","first-page":"2443","volume":"31","author":"sun","year":"2003","journal-title":"Topological structure analysis of the protein-protein interaction network in budding yeast Nucleic Acids Research"},{"key":"ref5","volume":"10","author":"chakrabarti","year":"0","journal-title":"Epidemic thresholds in real networks ACM Trans Inf Syst Secur"},{"key":"ref8","first-page":"35","author":"freeman","year":"1977","journal-title":"A Set of Measures of Centrality Based on Betweenness Sociometry"},{"key":"ref7","first-page":"264","volume":"11","author":"erd\u00f3s","year":"1960","journal-title":"Graphs with prescribed degrees of vertices (hungarian) Mat Lapok"},{"key":"ref2","first-page":"593","volume":"357","author":"beygelzimer","year":"2005","journal-title":"Improving network robustness by edge modifi-cation Physica A"},{"journal-title":"The effect of network topology on the spread of epidemics In INFOCOM'05","year":"0","author":"ganesh","key":"ref9"},{"key":"ref1","first-page":"378","volume":"406","author":"albert","year":"2000","journal-title":"Error and Attack Tolerance of Complex Networks"},{"key":"ref20","first-page":"103","volume":"68","author":"moody","year":"2003","journal-title":"Structural Cohesion and Embeddedness A Hierarchical Concept of Social Groups American Sociological Review"},{"key":"ref22","first-page":"167","volume":"45","author":"newman","year":"2003","journal-title":"The structure and function of complex networksSIAM Review"},{"key":"ref21","first-page":"18701","volume":"102","author":"moreira","year":"2009","journal-title":"How to make a fragile network robust and vice versa Phys Rev Lett"},{"key":"ref24","first-page":"1999","author":"page","year":"1999","journal-title":"The PageRank Citation Ranking Bringing Order to the Web Technical Report"},{"key":"ref23","first-page":"39","volume":"27","author":"newman","year":"2005","journal-title":"A measure of betweenness centrality based on random walks Social Networks"},{"journal-title":"On the security of wireless sensor networks In ICCSA'05","year":"0","author":"roman","key":"ref26"},{"key":"ref25","first-page":"187","volume":"38","author":"paul","year":"2004","journal-title":"Optimization of robustness of complex networks Eur Phys J B"}],"event":{"name":"2015 International Conference on Big Data and Smart Computing (BigComp)","start":{"date-parts":[[2015,2,9]]},"location":"Jeju, South Korea","end":{"date-parts":[[2015,2,11]]}},"container-title":["2015 International Conference on Big Data and Smart Computing (BIGCOMP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7062153\/7072806\/07072813.pdf?arnumber=7072813","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T23:05:41Z","timestamp":1490310341000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7072813\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/35021bigcomp.2015.7072813","relation":{},"subject":[],"published":{"date-parts":[[2015,2]]}}}