{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:33:38Z","timestamp":1762508018029,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/icsrs48664.2019.8987628","type":"proceedings-article","created":{"date-parts":[[2020,2,11]],"date-time":"2020-02-11T02:46:05Z","timestamp":1581389165000},"page":"66-76","source":"Crossref","is-referenced-by-count":9,"title":["Quantifying the Robustness of Network Controllability"],"prefix":"10.1109","author":[{"given":"Peng","family":"Sun","sequence":"first","affiliation":[]},{"given":"Robert E.","family":"Kooij","sequence":"additional","affiliation":[]},{"given":"Zhidong","family":"He","sequence":"additional","affiliation":[]},{"given":"Piet","family":"Van Mieghem","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"Rethinking the role concept","author":"white","year":"2017","journal-title":"Research Methods in Social Network Analysis"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1088\/1748-9326\/6\/1\/015001"},{"key":"ref31","article-title":"Introduction to mathematical sociology","author":"coleman","year":"1964","journal-title":"Introduction to Mathematical Sociology"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2004.02.029"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1038\/nphys3422"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s41109-018-0089-9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2009-00291-3"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2014-50276-0"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.04.016"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2017.01.072"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.94.042315"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1093\/comnet\/cnt004"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2014.01.056"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2012.04.019"},{"key":"ref28","first-page":"4292","article-title":"The network data repository with interactive graph analytics and visualization","volume":"15","author":"rossi","year":"2015","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms3447"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1137\/0202019"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/nature10011"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1038\/nphys2327"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1287\/opre.1040.0197"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms3002"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0038398"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1109\/TAC.1974.1100557","article-title":"Structural controllability","volume":"19","author":"lin","year":"1974","journal-title":"IEEE Transactions on Automatic Control"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.85.4626"},{"key":"ref9","first-page":"1373","volume":"343","author":"ruths","year":"2014","journal-title":"Control profiles of complex networks"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1137\/S003614450342480"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0089066"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0162289"},{"key":"ref21","first-page":"525","article-title":"Robustness of network controllability to degree-based edge attacks","author":"thomas","year":"2016","journal-title":"Third International Workshop on Complex Networks and their Applications"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.75.056110"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1038\/srep18145"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ChiCC.2016.7553261"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1137\/0301010"}],"event":{"name":"2019 4th International Conference on System Reliability and Safety (ICSRS)","start":{"date-parts":[[2019,11,20]]},"location":"Rome, Italy","end":{"date-parts":[[2019,11,22]]}},"container-title":["2019 4th International Conference on System Reliability and Safety (ICSRS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8967508\/8987581\/08987628.pdf?arnumber=8987628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T15:29:25Z","timestamp":1658158165000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8987628\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/icsrs48664.2019.8987628","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}