{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T14:35:30Z","timestamp":1725633330467},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/icumt.2009.5345578","type":"proceedings-article","created":{"date-parts":[[2009,12,10]],"date-time":"2009-12-10T10:43:49Z","timestamp":1260441829000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["A framework for vulnerability management in complex networks"],"prefix":"10.1109","author":[{"given":"Cinara Guellner","family":"Ghedini","sequence":"first","affiliation":[]},{"given":"Carlos H. Costa","family":"Ribeiro","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.gloenvcha.2006.05.002"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1186778.1186782"},{"key":"18","article-title":"Ad-hoc network system","author":"matsui","year":"2003","journal-title":"Online"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2003-00095-5"},{"key":"16","first-page":"378","article-title":"Error and attack tolerance of complex networks","author":"reka","year":"0","journal-title":"Nature"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.192407699"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1231335100"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804052"},{"journal-title":"The structure and function of complex networks","year":"2003","author":"newman","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-4371(02)01545-5"},{"year":"0","key":"20"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1509315.1509376"},{"year":"0","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1063\/1.2801687"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127409023068"},{"year":"0","key":"26"},{"article-title":"Vulnerability to climate change: A quantitative approach","year":"2001","author":"moss","key":"27"},{"year":"0","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.gloenvcha.2006.02.004"},{"journal-title":"Small worlds The dynamics of networks between order and randomness (princeton studies in complexity)","year":"2003","author":"watts","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gkg162"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.74.47"},{"journal-title":"Power laws in biological networks","year":"2004","author":"almaas","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.gloenvcha.2006.02.006"},{"key":"7","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1145\/316194.316229","article-title":"On power-law relationships of the internet topology","author":"faloutsos","year":"1999","journal-title":"SIGCOMM"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00083-9"},{"year":"0","key":"32"},{"journal-title":"An assessment of preferential attachment as a mechanism for human sexual network formation","year":"2003","author":"jones","key":"5"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.es.04.110173.000245"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1126\/science.1081058"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1216895.1216896"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2005.1610546"}],"event":{"name":"Workshops (ICUMT)","start":{"date-parts":[[2009,10,12]]},"location":"St. Petersburg, Russia","end":{"date-parts":[[2009,10,14]]}},"container-title":["2009 International Conference on Ultra Modern Telecommunications &amp; Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5340227\/5345316\/05345578.pdf?arnumber=5345578","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T22:40:42Z","timestamp":1497825642000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5345578\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icumt.2009.5345578","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}