{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T14:27:38Z","timestamp":1768314458231,"version":"3.49.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T00:00:00Z","timestamp":1763942400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T00:00:00Z","timestamp":1763942400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,24]]},"DOI":"10.1109\/dsa66321.2025.00062","type":"proceedings-article","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T18:20:20Z","timestamp":1768242020000},"page":"480-490","source":"Crossref","is-referenced-by-count":0,"title":["Selecting Nodes to Protect in Interdependent Networks using Shapley Value Analysis"],"prefix":"10.1109","author":[{"given":"Koki","family":"Matsui","sequence":"first","affiliation":[{"name":"The University of Osaka,Suita,Japan"}]},{"given":"Tatsuhiro","family":"Tsuchiya","sequence":"additional","affiliation":[{"name":"The University of Osaka,Suita,Japan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1515\/9781400881970-018"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2018.08.001"},{"key":"ref3","volume-title":"A Course in Game Theory, ser. A Course in Game Theory","author":"Osborne","year":"1994"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1064009.1064030"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1287\/moor.19.2.257"},{"key":"ref6","volume-title":"Network science","author":"Barab\u00e1si","year":"2016"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1111\/j.1467-9531.2007.00179.x","article-title":"Very local structure in social networks","volume":"37","author":"Faust","year":"2007","journal-title":"Sociological Methodology"},{"issue":"3","key":"ref8","first-page":"890","article-title":"Meeting strangers and friends of friends: How random are social networks?","volume-title":"The American Economic Review","volume":"97","author":"Jackson","year":"2007"},{"issue":"1","key":"ref9","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1002\/sys.20040","article-title":"Inoperability input-output modeling of disruptions to interdependent economic systems","volume":"9","author":"Santos","year":"2006","journal-title":"Systems Engineering"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780198515906.001.0001"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2009.02.002"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1038\/nature08932"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831395"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2273079"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2025.116064"},{"issue":"2","key":"ref16","doi-asserted-by":"crossref","DOI":"10.3390\/e27020109","article-title":"Physical realizations of interdependent networks: Analogy to percolation","volume":"27","author":"Gross","year":"2025","journal-title":"Entropy"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68884-4_39"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2012.6415629"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2229398"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2742527"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2017.11.004"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10898-018-0703-5"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10898-018-0703-5"},{"key":"ref24","volume-title":"Finding critical nodes in interdependent networks with sat and ilp solvers","author":"Hida","year":"2022"},{"key":"ref25","first-page":"1","article-title":"Path coalitional games","author":"Aziz","year":"2011","journal-title":"CoRR"},{"issue":"1","key":"ref26","first-page":"1123","article-title":"Path disruption games","volume-title":"Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems","volume":"1","author":"Bachrach"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s00224-016-9669-1"},{"key":"ref28","first-page":"1509","article-title":"Determining the top-k nodes in social networks using the shapley value","volume-title":"Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 3, ser. AAMAS \u201908","author":"Suri"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17572-5_1"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/DASC\/PiCom\/CBDCom\/Cy59711.2023.10361329"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC63035.2024.00036"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3588728"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2008.04.004"}],"event":{"name":"2025 12th International Conference on Dependable Systems and Their Applications (DSA)","location":"Sharjah, United Arab Emirates","start":{"date-parts":[[2025,11,24]]},"end":{"date-parts":[[2025,11,26]]}},"container-title":["2025 12th International Conference on Dependable Systems and Their Applications (DSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11320275\/11320347\/11320429.pdf?arnumber=11320429","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T08:37:20Z","timestamp":1768293440000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11320429\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,24]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/dsa66321.2025.00062","relation":{},"subject":[],"published":{"date-parts":[[2025,11,24]]}}}