{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T13:48:21Z","timestamp":1767016101706,"version":"3.41.2"},"reference-count":38,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T00:00:00Z","timestamp":1634256000000},"content-version":"vor","delay-in-days":287,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100010712","name":"Viet Nam National University Ho Chi Minh City","doi-asserted-by":"publisher","award":["B2017-42-01"],"award-info":[{"award-number":["B2017-42-01"]}],"id":[{"id":"10.13039\/501100010712","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007225","name":"Ministry of Science and Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007225","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>In this work, we introduce a new node attack strategy removing nodes with the highest conditional weighted betweenness centrality (CondWBet), which combines the weighted structure of the network and the node\u2019s conditional betweenness. We compare its efficacy with well\u2010known attack strategies from literature over five real\u2010world complex weighted networks. We use the network weighted efficiency (WEFF) like a measure encompassing the weighted structure of the network, in addition to the commonly used binary\u2010topological measure, i.e., the largest connected cluster (LCC). We find that if the measure is WEFF, the CondWBet strategy is the best to decrease WEFF in 3 out of 5 cases. Further, CondWBet is the most effective strategy to reduce WEFF at the beginning of the removal process, whereas the Strength that removes nodes with the highest sum of the link weights first shows the highest efficacy in the final phase of the removal process when the network is broken into many small clusters. These last outcomes would suggest that a better attacking in weighted networks strategy could be a combination of the CondWBet and Strength strategies.<\/jats:p>","DOI":"10.1155\/2021\/1677445","type":"journal-article","created":{"date-parts":[[2021,10,16]],"date-time":"2021-10-16T03:24:05Z","timestamp":1634354645000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["New Betweenness Centrality Node Attack Strategies for Real\u2010World Complex Weighted Networks"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1188-3385","authenticated-orcid":false,"given":"Quang","family":"Nguyen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3542-0518","authenticated-orcid":false,"given":"Ngoc-Kim-Khanh","family":"Nguyen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6072-5255","authenticated-orcid":false,"given":"Davide","family":"Cassi","sequence":"additional","affiliation":[]},{"given":"Michele","family":"Bellingeri","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,10,15]]},"reference":[{"key":"e_1_2_14_1_2","doi-asserted-by":"publisher","DOI":"10.1080\/00018732.2011.572452"},{"key":"e_1_2_14_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13538-020-00772-9"},{"key":"e_1_2_14_3_2","doi-asserted-by":"publisher","DOI":"10.1103\/revmodphys.74.47"},{"key":"e_1_2_14_4_2","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.85.4626"},{"key":"e_1_2_14_5_2","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.85.5468"},{"key":"e_1_2_14_6_2","doi-asserted-by":"publisher","DOI":"10.1142\/s0217984915501808"},{"key":"e_1_2_14_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2014.06.079"},{"key":"e_1_2_14_8_2","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2006\/04\/p04006"},{"key":"e_1_2_14_9_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0059613"},{"key":"e_1_2_14_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-73150-6_44"},{"key":"e_1_2_14_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcsii.2020.2973668"},{"key":"e_1_2_14_12_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-018-31902-8"},{"key":"e_1_2_14_13_2","doi-asserted-by":"publisher","DOI":"10.1038\/35019019"},{"key":"e_1_2_14_14_2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.65.056109"},{"key":"e_1_2_14_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2017.10.001"},{"key":"e_1_2_14_16_2","doi-asserted-by":"publisher","DOI":"10.1038\/nature14604"},{"key":"e_1_2_14_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2018.04.028"},{"key":"e_1_2_14_18_2","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.93.098701"},{"key":"e_1_2_14_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/s0378-4371(02)01545-5"},{"key":"e_1_2_14_20_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pcbi.1000494"},{"key":"e_1_2_14_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2005.08.025"},{"key":"e_1_2_14_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2019.121561"},{"key":"e_1_2_14_23_2","doi-asserted-by":"crossref","unstructured":"YinH. BensonA. R. LeskovecJ. andGleichD. F. Local higher-order graph clustering Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining KDD \u201917 August 2017 Halifax Canada 555\u2013564 https:\/\/doi.org\/10.1145\/3097983.3098069 2-s2.0-85029124098.","DOI":"10.1145\/3097983.3098069"},{"key":"e_1_2_14_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217301"},{"key":"e_1_2_14_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/4236.978369"},{"key":"e_1_2_14_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2004.08.047"},{"key":"e_1_2_14_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2017.07.020"},{"key":"e_1_2_14_28_2","doi-asserted-by":"publisher","DOI":"10.1080\/0022250x.2001.9990249"},{"key":"e_1_2_14_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2004.02.004"},{"key":"e_1_2_14_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2004.02.004"},{"key":"e_1_2_14_31_2","doi-asserted-by":"crossref","unstructured":"KumarS. BryanH. MakhijaD. KumarM. FaloutsosC. andSubrahmanianV. S. REV2: fraudulent user prediction in rating platforms srijan Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining\u2013WSDM \u201918 2018 Los Angeles CA USA.","DOI":"10.1145\/3159652.3159729"},{"key":"e_1_2_14_32_2","doi-asserted-by":"crossref","unstructured":"KumarS. SpezzanoF. SubrahmanianV. S. andFaloutsosC. Edge weight prediction in weighted signed networks Proceedings of the IEEE International Conference on Data Mining ICDM December 2017 Barcelona Spain https:\/\/doi.org\/10.1109\/ICDM.2016.0033.","DOI":"10.1109\/ICDM.2016.0033"},{"key":"e_1_2_14_33_2","doi-asserted-by":"publisher","DOI":"10.1038\/nphys560"},{"key":"e_1_2_14_34_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physrep.2005.10.009"},{"key":"e_1_2_14_35_2","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.87.198701"},{"key":"e_1_2_14_36_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-020-60298-7"},{"key":"e_1_2_14_37_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-019-47119-2"},{"key":"e_1_2_14_38_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-019-47119-2"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/1677445.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/1677445.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/1677445","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T22:32:48Z","timestamp":1723242768000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/1677445"}},"subtitle":[],"editor":[{"given":"Giacomo","family":"Fiumara","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/1677445"],"URL":"https:\/\/doi.org\/10.1155\/2021\/1677445","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"type":"print","value":"1076-2787"},{"type":"electronic","value":"1099-0526"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-06-19","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-09-16","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-10-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"1677445"}}