{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T16:35:59Z","timestamp":1773678959477,"version":"3.50.1"},"reference-count":10,"publisher":"IEEE","license":[{"start":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T00:00:00Z","timestamp":1396310400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T00:00:00Z","timestamp":1396310400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1109\/infcomw.2014.6849338","type":"proceedings-article","created":{"date-parts":[[2014,7,29]],"date-time":"2014-07-29T15:47:23Z","timestamp":1406648843000},"page":"831-836","source":"Crossref","is-referenced-by-count":41,"title":["Identification of K most vulnerable nodes in multi-layered network using a new model of interdependency"],"prefix":"10.1109","author":[{"given":"Arunabha","family":"Sen","sequence":"first","affiliation":[{"name":"Computer Science and Engineering Program, School of Computing, Informatics and Decision System Engineering, Arizona State University, Tempe, Arizona 85287"}]},{"given":"Anisha","family":"Mazumder","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering Program, School of Computing, Informatics and Decision System Engineering, Arizona State University, Tempe, Arizona 85287"}]},{"given":"Joydeep","family":"Banerjee","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering Program, School of Computing, Informatics and Decision System Engineering, Arizona State University, Tempe, Arizona 85287"}]},{"given":"Arun","family":"Das","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering Program, School of Computing, Informatics and Decision System Engineering, Arizona State University, Tempe, Arizona 85287"}]},{"given":"Randy","family":"Compton","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering Program, School of Computing, Informatics and Decision System Engineering, Arizona State University, Tempe, Arizona 85287"}]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.83.036116"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1038\/nphys2180"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1038\/nature08932"},{"key":"10","author":"fudenberg","year":"2010","journal-title":"Game Theory"},{"key":"7","author":"nguyen","year":"2013","journal-title":"Detecting Critical Nodes in Interdependent Power Networks for Vulnerability Assessment"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831395"},{"key":"5","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/s11067-005-2627-0","article-title":"Dynamic game theoretic model of multi-layer infrastructure networks","volume":"5","author":"zhang","year":"2005","journal-title":"Networks and Spatial Economics"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1504\/IJCIS.2008.016092"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0060402"},{"key":"8","author":"bernstein","year":"2012","journal-title":"Power Grid Vulnerability to Geographically Correlated Failures-analysis and Control Implications"}],"event":{"name":"IEEE INFOCOM 2014 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","location":"Toronto, ON, Canada","start":{"date-parts":[[2014,4,27]]},"end":{"date-parts":[[2014,5,2]]}},"container-title":["2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6841218\/6849127\/06849338.pdf?arnumber=6849338","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T20:07:34Z","timestamp":1740082054000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6849338\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/infcomw.2014.6849338","relation":{},"subject":[],"published":{"date-parts":[[2014,4]]}}}