{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,8]],"date-time":"2024-06-08T07:55:30Z","timestamp":1717833330125},"reference-count":32,"publisher":"Wiley","issue":"23","license":[{"start":{"date-parts":[[2019,9,9]],"date-time":"2019-09-09T00:00:00Z","timestamp":1567987200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100012476","name":"Fundamental Research Funds for Central Universities of the Central South University","doi-asserted-by":"publisher","award":["2016YJS055"],"id":[{"id":"10.13039\/501100012476","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Concurrency and Computation"],"published-print":{"date-parts":[[2020,12,10]]},"abstract":"Summary<\/jats:title>As the network gradually penetrates into all aspects of life, the transportation system as the most network\u2010specific field, its security management issues need to be innovative from the traditional aspects. Therefore, this paper attempts to analyze the traffic network from the perspective of vulnerability. First, starting from the conceptual framework of vulnerability, the process of the concept of vulnerability is gradually complicated. At the same time, the main points of vulnerability analysis at each level are defined. Secondly, the analysis model is constructed on two aspects of network vulnerability: station and community. The concept of station vulnerability, which is similar to the traditional vulnerability analysis, is proposed in this paper. Considering the interrelationship between the indicators, the ANP method is used to construct the evaluation model. However, in the community area, the concept of regional vulnerability is proposed, which is based on the community structure of complex networks. Finally, the actual vulnerability analysis was carried out with the Beijing Subway as an example. The result of the calculation not only can obtain important stations that need to be controlled but also divide the lines in the network structure into suitable communities. This improves the collaboration between the subway system and other functional entities in society.<\/jats:p>","DOI":"10.1002\/cpe.5508","type":"journal-article","created":{"date-parts":[[2019,9,9]],"date-time":"2019-09-09T16:49:46Z","timestamp":1568047786000},"update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A new analytical framework for network vulnerability on subway system"],"prefix":"10.1002","volume":"32","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-5857-0538","authenticated-orcid":false,"given":"Jia","family":"Xu","sequence":"first","affiliation":[{"name":"School of Economics and Management Beijing Jiaotong University Beijing China"}]},{"given":"Shouxin","family":"Song","sequence":"additional","affiliation":[{"name":"School of Economics and Management Beijing Jiaotong University Beijing China"}]},{"given":"Huaiyuan","family":"Zhai","sequence":"additional","affiliation":[{"name":"School of Economics and Management Beijing Jiaotong University Beijing China"}]},{"given":"Pengwei","family":"Yuan","sequence":"additional","affiliation":[{"name":"School of Business University of Jinan Jinan China"}]},{"given":"Mingli","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Economics and Management Beijing Jiaotong University Beijing China"}]}],"member":"311","published-online":{"date-parts":[[2019,9,9]]},"reference":[{"key":"e_1_2_7_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.gloenvcha.2008.07.013"},{"key":"e_1_2_7_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.foreco.2009.09.023"},{"key":"e_1_2_7_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scitotenv.2018.08.005"},{"key":"e_1_2_7_5_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.environ.33.022207.104943"},{"key":"e_1_2_7_6_1","doi-asserted-by":"crossref","unstructured":"MassacciF NgoCN NieJ VenturiD WilliamsJ.The seconomics (Security\u2010Economics) vulnerabilities of decentralized autonomous organizations. In: Security Protocols XXV;2017;Cambridge UK.","DOI":"10.1007\/978-3-319-71075-4_19"},{"key":"e_1_2_7_7_1","first-page":"6","volume-title":"Vulnerability of Groundwater to Contamination","author":"Margat J","year":"1968"},{"key":"e_1_2_7_8_1","first-page":"7","volume-title":"Vulnerability, Resilience and the Collapse of Society: A Review of Models and Possible Climatic Applications","author":"Timmerman P","year":"1981"},{"key":"e_1_2_7_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/0959-3780(94)90020-5"},{"key":"e_1_2_7_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/59.317643"},{"key":"e_1_2_7_11_1","doi-asserted-by":"crossref","unstructured":"PhillipsC SwilerLP.A graph\u2010based system for network\u2010vulnerability analysis. In: Proceedings of the 1998 Workshop on New Security Paradigms;1998;Charlottesville VA.","DOI":"10.1145\/310889.310919"},{"key":"e_1_2_7_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.gloenvcha.2004.12.006"},{"key":"e_1_2_7_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.gloenvcha.2006.02.004"},{"key":"e_1_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0967-070X(02)00011-2"},{"key":"e_1_2_7_15_1","unstructured":"HusdalJ.Reliability and vulnerability versus cost and benefits. In: The 2nd International Symposium on Transportation Network Reliability;2004;Queenstown and Christchurch New Zealand."},{"key":"e_1_2_7_16_1","doi-asserted-by":"crossref","unstructured":"DuW GoodrichMT.Searching for high\u2010value rare events with uncheatable grid computing. In: International Conference on Applied Cryptography and Network Security;2005;New York NY.","DOI":"10.1007\/11496137_9"},{"key":"e_1_2_7_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tra.2005.11.003"},{"key":"e_1_2_7_18_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:JOTS.0000048952.81894.f3"},{"key":"e_1_2_7_19_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1005661622966"},{"key":"e_1_2_7_20_1","first-page":"78","volume-title":"At Risk: Natural Hazards, People's Vulnerability and Disasters","author":"Wisner B","year":"2004"},{"key":"e_1_2_7_21_1","doi-asserted-by":"publisher","DOI":"10.1111\/1540-6237.8402002"},{"key":"e_1_2_7_22_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1231335100"},{"key":"e_1_2_7_23_1","unstructured":"ErathA BirdsallJ AxhausenKW HajdinR.Vulnerability assessment of the Swiss road network. In: 88th Transportation Research Board Annual Meeting;Washington DC;2009."},{"key":"e_1_2_7_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tra.2015.06.002"},{"key":"e_1_2_7_25_1","doi-asserted-by":"publisher","DOI":"10.1088\/0253-6102\/52\/6\/10"},{"key":"e_1_2_7_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2015.12.150"},{"key":"e_1_2_7_27_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature08932"},{"key":"e_1_2_7_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10708-011-9412-z"},{"key":"e_1_2_7_29_1","doi-asserted-by":"publisher","DOI":"10.1209\/0295-5075\/92\/68002"},{"key":"e_1_2_7_30_1","doi-asserted-by":"publisher","DOI":"10.1002\/qre.1905"},{"key":"e_1_2_7_31_1","doi-asserted-by":"publisher","DOI":"10.1037\/abn0000181"},{"key":"e_1_2_7_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.11.089"},{"key":"e_1_2_7_33_1","doi-asserted-by":"crossref","unstructured":"ZhangY ZhangQ QiaoJ.Analysis of Guangzhou metro network based on L\u2010space and P\u2010space using complex network. In: International Conference on Geoinformatics;2014;Kaohsiung Taiwan.","DOI":"10.1109\/GEOINFORMATICS.2014.6950806"}],"container-title":["Concurrency and Computation: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.5508","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/cpe.5508","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.5508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T11:09:47Z","timestamp":1693825787000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/cpe.5508"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,9]]},"references-count":32,"journal-issue":{"issue":"23","published-print":{"date-parts":[[2020,12,10]]}},"alternative-id":["10.1002\/cpe.5508"],"URL":"https:\/\/doi.org\/10.1002\/cpe.5508","archive":["Portico"],"relation":{},"ISSN":["1532-0626","1532-0634"],"issn-type":[{"value":"1532-0626","type":"print"},{"value":"1532-0634","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,9]]},"assertion":[{"value":"2019-04-25","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-07-31","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-09-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}