{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T04:10:54Z","timestamp":1730175054340,"version":"3.28.0"},"reference-count":17,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2024,5,1]]},"DOI":"10.1587\/transfun.2023map0003","type":"journal-article","created":{"date-parts":[[2023,9,19]],"date-time":"2023-09-19T22:43:24Z","timestamp":1695163404000},"page":"786-792","source":"Crossref","is-referenced-by-count":0,"title":["Two-Phase Approach to Finding the Most Critical Entities in Interdependent Systems"],"prefix":"10.1587","volume":"E107.A","author":[{"given":"Daichi","family":"MINAMIDE","sequence":"first","affiliation":[{"name":"Graduate School of Information Science and Technology, Osaka University"}]},{"given":"Tatsuhiro","family":"TSUCHIYA","sequence":"additional","affiliation":[{"name":"Graduate School of Information Science and Technology, Osaka University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] V. Rosato, L. Issacharoff, F. Tiriticco, S. Meloni, S. Porcellinis, and R. Setola, \u201cModelling interdependent infrastructures using interacting dynamical models,\u201d International Journal of Critical Infrastructures, vol.4, no.1-2, 2008. 10.1504\/ijcis.2008.016092","DOI":"10.1504\/IJCIS.2008.016092"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] S.V. Buldyrev, R. Parshani, H. Gerald Paul, E. Stanley, and S. Havlin, \u201cCatastrophic cascade of failures in interdependent networks,\u201d Nature, vol.464, no.7291, pp.1025-1028, April 2010. 10.1038\/nature08932","DOI":"10.1038\/nature08932"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] O. Yagan, D. Qian, J. Zhang, and D. Cochran, \u201cOptimal allocation of interconnecting links in cyber-physical systems: Interdependence, cascading failures, and robustness,\u201d IEEE Trans. Parallel Distrib. Syst., vol.23, no.9, pp.1708-1720, Sept. 2012. 10.1109\/tpds.2012.62","DOI":"10.1109\/TPDS.2012.62"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] A. Sen, A. Mazumder, J. Banerjee, A. Das, and R. Compton, \u201cIdentification of K most vulnerable nodes in multi-layered network using a new model of interdependency,\u201d Proc. IEEE Conference on Computer Communications Workshops, pp.831-836, April 2014. 10.1109\/infcomw.2014.6849338","DOI":"10.1109\/INFCOMW.2014.6849338"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] A. Das, J. Banerjee, and A. Sen, \u201cRoot cause analysis of failures in interdependent power-communication networks,\u201d 2014 IEEE Military Communications Conference, pp.910-915, 2014. 10.1109\/milcom.2014.156","DOI":"10.1109\/MILCOM.2014.156"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] A. Das, C. Zhou, J. Banerjee, A. Sen, and L. Greenwald, \u201cOn the smallest pseudo target set identification problem for targeted attack on interdependent power-communication networks,\u201d MILCOM 2015-2015 IEEE Military Communications Conference, pp.1015-1020, 2015. 10.1109\/milcom.2015.7357578","DOI":"10.1109\/MILCOM.2015.7357578"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] J. Banerjee, K. Basu, and A. Sen, \u201cOn hardening problems in critical infrastructure systems,\u201d International Journal of Critical Infrastructure Protection, vol.23, pp.49-67, 2018. 10.1016\/j.ijcip.2018.08.001","DOI":"10.1016\/j.ijcip.2018.08.001"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] A. Sturaro, S. Silvestri, M. Conti, and S.K. Das, \u201cA realistic model for failure propagation in interdependent cyber-physical systems,\u201d IEEE Trans. Netw. Sci. Eng., vol.7, no.2, pp.817-831, 2020. 10.1109\/tnse.2018.2872034","DOI":"10.1109\/TNSE.2018.2872034"},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] Z. Huang, C. Wang, M. Stojmenovic, and A. Nayak, \u201cCharacterization of cascading failures in interdependent cyber-physical systems,\u201d IEEE Trans. Comput., vol.64, no.8, pp.2158-2168, Aug. 2015. 10.1109\/tc.2014.2360537","DOI":"10.1109\/TC.2014.2360537"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] D.T. Nguyen, Y. Shen, and M.T. Thai, \u201cDetecting critical nodes in interdependent power networks for vulnerability assessment,\u201d IEEE Trans. Smart Grid, vol.4, no.1, pp.151-159, March 2013. 10.1109\/tsg.2012.2229398","DOI":"10.1109\/TSG.2012.2229398"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] Y. Shen and M.T. Thai, \u201cNetwork vulnerability assessment under cascading failures,\u201d 2013 IEEE Global Communications Conference (GLOBECOM), pp.1526-1531, 2013. 10.1109\/glocom.2013.6831290","DOI":"10.1109\/GLOCOM.2013.6831290"},{"key":"12","doi-asserted-by":"publisher","unstructured":"[12] A. Veremyev, K. Pavlikov, E. Pasiliao, M. Thai, and V. Boginski, \u201cCritical nodes in interdependent networks with deterministic and probabilistic cascading failures,\u201d J. Glob. Optim., vol.74, pp.803-838, Sept. 2019. 10.1007\/s10898-018-0703-5","DOI":"10.1007\/s10898-018-0703-5"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] K. Hanada, T. Tsuchiya, and Y. Fujisaki, \u201cSatisfiability-based analysis of cascading failures in systems of interdependent networks,\u201d 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC), pp.105-1058, 2019. 10.1109\/prdc47002.2019.00036","DOI":"10.1109\/PRDC47002.2019.00036"},{"key":"14","unstructured":"[14] K. Hida and T. Tsuchiya, \u201cFinding critical nodes in interdependent networks with SAT and ILP solvers,\u201d CoRR, vol.abs\/2211.05659, 2022."},{"key":"15","unstructured":"[15] A. Biere, A. Biere, M. Heule, H. van Maaren, and T. Walsh, Handbook of Satisfiability: Volume 185 Frontiers in Artificial Intelligence and Applications, IOS Press, 2009."},{"key":"16","doi-asserted-by":"publisher","unstructured":"[16] L.M. de Moura and N.S. Bj\u00f8rner, \u201cZ3: An efficient SMT solver,\u201d Proc. 14th International Conference Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2008), C.R. Ramakrishnan and J. Rehof, eds., Lecture Notes in Computer Science, vol.4963, pp.337-340, Springer, 2008. 10.1007\/978-3-540-78800-3_24","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"17","unstructured":"[17] G. Gamrath, D. Anderson, K. Bestuzheva, W.K. Chen, L. Eifler, M. Gasse, P. Gemander, A. Gleixner, L. Gottwald, K. Halbig, G. Hendel, C. Hojny, T. Koch, P. Le Bodic, S.J. Maher, F. Matter, M. Miltenberger, E. M\u00fchmer, B. M\u00fcller, M.E. Pfetsch, F. Schl\u00f6sser, F. Serrano, Y. Shinano, C. Tawfik, S. Vigerske, F. Wegscheider, D. Weninger, and J. Witzig, \u201cThe SCIP Optimization Suite 7.0,\u201d ZIB-Report 20-10, Zuse Institute Berlin, March 2020."}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E107.A\/5\/E107.A_2023MAP0003\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T11:44:23Z","timestamp":1730115863000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E107.A\/5\/E107.A_2023MAP0003\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,1]]},"references-count":17,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.2023map0003","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"type":"print","value":"0916-8508"},{"type":"electronic","value":"1745-1337"}],"subject":[],"published":{"date-parts":[[2024,5,1]]},"article-number":"2023MAP0003"}}