{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T21:03:14Z","timestamp":1775854994440,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T00:00:00Z","timestamp":1655856000000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Sandia National Laboratories","award":["DE-NA0003525"],"award-info":[{"award-number":["DE-NA0003525"]}]},{"name":"Army Research Office","award":["W911NF-18-1-0047"],"award-info":[{"award-number":["W911NF-18-1-0047"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1908048"],"award-info":[{"award-number":["1908048"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,21]]},"DOI":"10.1145\/3447535.3462500","type":"proceedings-article","created":{"date-parts":[[2021,6,22]],"date-time":"2021-06-22T15:32:12Z","timestamp":1624375932000},"page":"93-101","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["NetProtect: Network Perturbations to Protect Nodes against Entry-Point Attack"],"prefix":"10.1145","author":[{"given":"Ricky","family":"Laishram","sequence":"first","affiliation":[{"name":"Syracuse University, USA"}]},{"given":"Pegah","family":"Hozhabrierdi","sequence":"additional","affiliation":[{"name":"Syracuse University, USA"}]},{"given":"Jeremy","family":"Wendt","sequence":"additional","affiliation":[{"name":"Sandia National Laboratories, USA"}]},{"given":"Sucheta","family":"Soundarajan","sequence":"additional","affiliation":[{"name":"Syracuse University, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,6,22]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Hide and Seek in a Social Network. Master\u2019s thesis","author":"Abrahamsson Olle","unstructured":"Olle Abrahamsson. 2017. Hide and Seek in a Social Network. Master\u2019s thesis. Link\u00f6ping University, Sweden."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3201064.3201066"},{"key":"e_1_3_2_2_3_1","volume-title":"Crawling Complex Networks: An Experimental Evaluation of Data Collection Algorithms and Network Structural Properties. The Journal of Web Science 6","author":"Areekijseree Katchaguy","year":"2019","unstructured":"Katchaguy Areekijseree and Sucheta Soundarajan. 2019. Crawling Complex Networks: An Experimental Evaluation of Data Collection Algorithms and Network Structural Properties. The Journal of Web Science 6 (2019)."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/0022250X.2001.9990249"},{"key":"e_1_3_2_2_5_1","volume-title":"Nodal vulnerability to targeted attacks in power grids. Applied network science 3, 1","author":"Cetinay Hale","year":"2018","unstructured":"Hale Cetinay, Karel Devriendt, and Piet Van\u00a0Mieghem. 2018. Nodal vulnerability to targeted attacks in power grids. Applied network science 3, 1 (2018), 34."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462078"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775191"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0758-8_17"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1218"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2017.8116502"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1413140.1413159"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13657-3_12"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772762"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413214"},{"key":"e_1_3_2_2_15_1","volume-title":"The Best Damn Windows Server 2008 Book Period","author":"Piltzecker Anthony","unstructured":"Anthony Piltzecker. 2011. The Best Damn Windows Server 2008 Book Period. Elsevier."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2215882"},{"key":"e_1_3_2_2_17_1","volume-title":"Should jump box servers be consigned to history?Network Security","author":"Steffen Chris","year":"2017","unstructured":"Chris Steffen. 2017. Should jump box servers be consigned to history?Network Security 2017, 11 (2017), 5\u20136."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41562-017-0290-3"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/APWeb.2010.10"}],"event":{"name":"WebSci '21: WebSci '21 13th ACM Web Science Conference 2021","location":"Virtual Event United Kingdom","acronym":"WebSci '21","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["13th ACM Web Science Conference 2021"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447535.3462500","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447535.3462500","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447535.3462500","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T20:21:11Z","timestamp":1775852471000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447535.3462500"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,21]]},"references-count":19,"alternative-id":["10.1145\/3447535.3462500","10.1145\/3447535"],"URL":"https:\/\/doi.org\/10.1145\/3447535.3462500","relation":{},"subject":[],"published":{"date-parts":[[2021,6,21]]},"assertion":[{"value":"2021-06-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}