{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T08:04:22Z","timestamp":1767859462363,"version":"3.49.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T00:00:00Z","timestamp":1685232000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T00:00:00Z","timestamp":1685232000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,28]]},"DOI":"10.1109\/icc45041.2023.10279373","type":"proceedings-article","created":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T17:54:10Z","timestamp":1698083650000},"page":"4366-4372","source":"Crossref","is-referenced-by-count":1,"title":["More Effective Centrality-Based Attacks on Weighted Networks"],"prefix":"10.1109","author":[{"given":"Balume","family":"Mburano","sequence":"first","affiliation":[{"name":"School of Computer, Data and Mathematical Sciences, Western Sydney University,Sydney,Australia"}]},{"given":"Weisheng","family":"Si","sequence":"additional","affiliation":[{"name":"School of Computer, Data and Mathematical Sciences, Western Sydney University,Sydney,Australia"}]},{"given":"Qing","family":"Cao","sequence":"additional","affiliation":[{"name":"University of Tennessee,Department of EECS,Knoxville,USA"}]},{"given":"Wei Xing","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Computer, Data and Mathematical Sciences, Western Sydney University,Sydney,Australia"}]}],"member":"263","reference":[{"key":"ref13","author":"barabasi","year":"2016","journal-title":"Network Science Chapter 8 Network Robustness"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198805090.001.0001"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-019-47119-2"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2017.07.020"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.02.018"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2941940"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jjimei.2021.100013"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2021.08.126"},{"key":"ref17","first-page":"1","article-title":"Vulnerability of link-weighted complex networks in central attacks and fallback strategy","volume":"590","author":"divya","year":"2022","journal-title":"Physica A"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/1677445"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31856-9_44"},{"key":"ref18","author":"cormen","year":"2022","journal-title":"Introduction to Algorithms"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1126\/science.286.5439.509"},{"key":"ref23","first-page":"17","article-title":"On the evolution of random graphs","volume":"5","author":"erdos","year":"1960","journal-title":"Publ Math Inst Hung Acad Sci"},{"key":"ref26","year":"2022","journal-title":"NetworkX a Python package for Complex Networks"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1038\/30918","article-title":"Collective dynamics of small-world networks","volume":"393","author":"watts","year":"1998","journal-title":"Nature"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(91)90017-N"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3150289"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2004.11.009"},{"key":"ref28","author":"matke","year":"2017","journal-title":"Scigrid-an open source reference model for the european transmission network"},{"key":"ref27","year":"2015","journal-title":"Australian_Government Electricity Transmission Lines"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC52172.2021.9615768"},{"key":"ref7","author":"schneider","year":"2011","journal-title":"The robustness of complex networks"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148785"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1009440108"},{"key":"ref3","article-title":"Beyond Colonial Pipeline, Ransomware Cyberattacks Are a Growing Threat","author":"mcmillan","year":"2021","journal-title":"The Wall Street Journal"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3110195"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-016-6108-z"}],"event":{"name":"ICC 2023 - IEEE International Conference on Communications","location":"Rome, Italy","start":{"date-parts":[[2023,5,28]]},"end":{"date-parts":[[2023,6,1]]}},"container-title":["ICC 2023 - IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10278505\/10278554\/10279373.pdf?arnumber=10279373","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T19:00:48Z","timestamp":1699902048000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10279373\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,28]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icc45041.2023.10279373","relation":{},"subject":[],"published":{"date-parts":[[2023,5,28]]}}}