{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T10:11:56Z","timestamp":1726135916652},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030878689"},{"type":"electronic","value":"9783030878696"}],"license":[{"start":{"date-parts":[[2021,9,23]],"date-time":"2021-09-23T00:00:00Z","timestamp":1632355200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,23]],"date-time":"2021-09-23T00:00:00Z","timestamp":1632355200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-87869-6_48","type":"book-chapter","created":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T07:10:31Z","timestamp":1632294631000},"page":"502-511","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Critical Node Detection for Maximization of Connected Components: An Extremal Optimization Approach"],"prefix":"10.1007","author":[{"given":"No\u00e9mi","family":"Gask\u00f3","sequence":"first","affiliation":[]},{"given":"Tam\u00e1s","family":"K\u00e9pes","sequence":"additional","affiliation":[]},{"given":"Mihai","family":"Suciu","sequence":"additional","affiliation":[]},{"given":"Rodica Ioana","family":"Lung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,23]]},"reference":[{"key":"48_CR1","unstructured":"www.individual.utoronto.ca\/mventresca\/cnd.html"},{"key":"48_CR2","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.engappai.2016.06.010","volume":"55","author":"R Aringhieri","year":"2016","unstructured":"Aringhieri, R., Grosso, A., Hosteins, P., Scatamacchia, R.: A general evolutionary framework for different classes of critical node problems. Eng. Appl. Artif. Intell 55, 128\u2013145 (2016)","journal-title":"Eng. Appl. Artif. Intell"},{"key":"48_CR3","unstructured":"Arulselvan, A., Commander, C.W., Pardalos, P.M., Shylo, O.: Managing network risk via critical node identification. In: Risk Management in Telecommunication Networks. Springer, Heidelberg (2007)"},{"issue":"5439","key":"48_CR4","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"AL Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si, A.L., Albert, R.: Emergence of scaling in random networks. Science 286(5439), 509\u2013512 (1999)","journal-title":"Science"},{"key":"48_CR5","doi-asserted-by":"publisher","first-page":"5211","DOI":"10.1103\/PhysRevLett.86.5211","volume":"86","author":"S Boettcher","year":"2001","unstructured":"Boettcher, S., Percus, A.G.: Optimization with extremal dynamics. Phys. Rev. Lett. 86, 5211\u20135214 (2001)","journal-title":"Phys. Rev. Lett."},{"issue":"2","key":"48_CR6","doi-asserted-by":"publisher","first-page":"026114","DOI":"10.1103\/PhysRevE.64.026114","volume":"64","author":"S Boettcher","year":"2001","unstructured":"Boettcher, S., Percus, A.G.: Extremal optimization for graph partitioning. Phys. Rev. E 64(2), 026114 (2001)","journal-title":"Phys. Rev. E"},{"key":"48_CR7","doi-asserted-by":"crossref","unstructured":"Boettcher, S., Percus, A.G.: Extremal optimization: an evolutionary local-search algorithm. In: Computational Modeling and Problem Solving in the Networked World, pp. 61\u201377. Springer, Heidelberg (2003)","DOI":"10.1007\/978-1-4615-1043-7_3"},{"issue":"1","key":"48_CR8","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s10588-006-7084-x","volume":"12","author":"SP Borgatti","year":"2006","unstructured":"Borgatti, S.P.: Identifying sets of key players in a social network. Comput. Math. Organ. Theory 12(1), 21\u201334 (2006)","journal-title":"Comput. Math. Organ. Theory"},{"key":"48_CR9","doi-asserted-by":"crossref","unstructured":"Chen, W., Wang, Y., Yang, S.: Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 199\u2013208 (2009)","DOI":"10.1145\/1557019.1557047"},{"issue":"4","key":"48_CR10","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1016\/j.jempfin.2010.04.008","volume":"17","author":"KT Chi","year":"2010","unstructured":"Chi, K.T., Liu, J., Lau, F.C.: A network perspective of the stock market. J. Empir. Finan 17(4), 659\u2013667 (2010)","journal-title":"J. Empir. Finan"},{"key":"48_CR11","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1016\/j.asoc.2015.01.048","volume":"30","author":"I De Falco","year":"2015","unstructured":"De Falco, I., Laskowski, E., Olejnik, R., Scafuri, U., Tarantino, E., Tudruj, M.: Extremal optimization applied to load balancing in execution of distributed programs. Appl. Soft Comput. 30, 501\u2013513 (2015)","journal-title":"Appl. Soft Comput."},{"key":"48_CR12","doi-asserted-by":"publisher","first-page":"37","DOI":"10.3389\/fams.2018.00037","volume":"4","author":"F Emmert-Streib","year":"2018","unstructured":"Emmert-Streib, F., Tripathi, S., Yli-Harja, O., Dehmer, M.: Understanding the world economy in terms of networks: a survey of data-based network science approaches on economic networks. Front. Appl. Math. Stat. 4, 37 (2018)","journal-title":"Front. Appl. Math. Stat."},{"issue":"3\u20135","key":"48_CR13","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.physrep.2009.11.002","volume":"486","author":"S Fortunato","year":"2010","unstructured":"Fortunato, S.: Community detection in graphs. Phys. Rep. 486(3\u20135), 75\u2013174 (2010)","journal-title":"Phys. Rep."},{"issue":"3","key":"48_CR14","doi-asserted-by":"publisher","first-page":"P03017","DOI":"10.1088\/1742-5468\/2015\/03\/P03017","volume":"2015","author":"YC Gao","year":"2015","unstructured":"Gao, Y.C., Zeng, Y., Cai, S.M.: Influence network in the Chinese stock market. J. Stat. Mech. Theory Exp. 2015(3), P03017 (2015)","journal-title":"J. Stat. Mech. Theory Exp."},{"issue":"21","key":"48_CR15","doi-asserted-by":"publisher","first-page":"8685","DOI":"10.1073\/pnas.0701361104","volume":"104","author":"KI Goh","year":"2007","unstructured":"Goh, K.I., Cusick, M.E., Valle, D., Childs, B., Vidal, M., Barab\u00e1si, A.L.: The human disease network. Proc. Natl. Acad. Sci. 104(21), 8685\u20138690 (2007)","journal-title":"Proc. Natl. Acad. Sci."},{"key":"48_CR16","doi-asserted-by":"publisher","unstructured":"He, J., Liang, H., Yuan, H.: Controlling infection by blocking nodes and links simultaneously. In: International Workshop on Internet and Network Economics, pp. 206\u2013217. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-25510-6_18","DOI":"10.1007\/978-3-642-25510-6_18"},{"issue":"4","key":"48_CR17","doi-asserted-by":"publisher","first-page":"e59613","DOI":"10.1371\/journal.pone.0059613","volume":"8","author":"S Iyer","year":"2013","unstructured":"Iyer, S., Killingback, T., Sundaram, B., Wang, Z.: Attack robustness and centrality of complex networks. PloS one 8(4), e59613 (2013)","journal-title":"PloS one"},{"key":"48_CR18","doi-asserted-by":"publisher","DOI":"10.1017\/9781316216002","volume-title":"Complex Networks: Principles, Methods and Applications","author":"V Latora","year":"2017","unstructured":"Latora, V., Nicosia, V., Russo, G.: Complex Networks: Principles, Methods and Applications. Cambridge University Press, Cambridge (2017)"},{"issue":"2","key":"48_CR19","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/0022-0000(80)90060-4","volume":"20","author":"JM Lewis","year":"1980","unstructured":"Lewis, J.M., Yannakakis, M.: The node-deletion problem for hereditary properties is np-complete. J. Comput. Syst. Sci. 20(2), 219\u2013230 (1980)","journal-title":"J. Comput. Syst. Sci."},{"issue":"7","key":"48_CR20","doi-asserted-by":"publisher","first-page":"1019","DOI":"10.1002\/asi.20591","volume":"58","author":"D Liben-Nowell","year":"2007","unstructured":"Liben-Nowell, D., Kleinberg, J.: The link-prediction problem for social networks. J. Am. Soc. Inf. Sci. Technol. 58(7), 1019\u20131031 (2007)","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"key":"48_CR21","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.ins.2016.10.014","volume":"377","author":"M Lozano","year":"2017","unstructured":"Lozano, M., Garc\u00eda-Mart\u00ednez, C., Rodriguez, F.J., Trujillo, H.M.: Optimizing network attacks by artificial bee colony. Inf. Sci. 377, 30\u201350 (2017)","journal-title":"Inf. Sci."},{"issue":"5","key":"48_CR22","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.1007\/s00500-015-1858-3","volume":"21","author":"RI Lung","year":"2015","unstructured":"Lung, R.I., Suciu, M., Gask\u00f3, N.: Noisy extremal optimization. Soft Comput. 21(5), 1253\u20131270 (2015). https:\/\/doi.org\/10.1007\/s00500-015-1858-3","journal-title":"Soft Comput."},{"issue":"5663","key":"48_CR23","doi-asserted-by":"publisher","first-page":"1538","DOI":"10.1126\/science.1089167","volume":"303","author":"R Milo","year":"2004","unstructured":"Milo, R., et al.: Superfamilies of evolved and designed networks. Science 303(5663), 1538\u20131542 (2004)","journal-title":"Science"},{"key":"48_CR24","unstructured":"Opsahl, T.: Why anchorage is not (that) important: binary ties and sample selection (2011)"},{"key":"48_CR25","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1093\/nar\/gkn230","volume":"36","author":"J Reimand","year":"2008","unstructured":"Reimand, J., Tooming, L., Peterson, H., Adler, P., Vilo, J.: Graphweb: mining heterogeneous biological networks for gene modules with functional significance. Nucleic Acids Res. 36, 452\u2013459 (2008)","journal-title":"Nucleic Acids Res."},{"key":"48_CR26","doi-asserted-by":"crossref","unstructured":"Rossi, R.A., Ahmed, N.K.: The network data repository with interactive graph analytics and visualization. In: AAAI (2015)","DOI":"10.1609\/aaai.v29i1.9277"},{"issue":"2","key":"48_CR27","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1002\/net.20464","volume":"60","author":"S Shen","year":"2012","unstructured":"Shen, S., Smith, J.C.: Polynomial-time algorithms for solving a class of critical node problems on trees and series-parallel graphs. Networks 60(2), 103\u2013119 (2012)","journal-title":"Networks"},{"issue":"3","key":"48_CR28","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.disopt.2012.07.001","volume":"9","author":"S Shen","year":"2012","unstructured":"Shen, S., Smith, J.C., Goli, R.: Exact interdiction models and algorithms for disconnecting networks via node deletions. Discrete Optimization 9(3), 172\u2013188 (2012)","journal-title":"Discrete Optimization"},{"issue":"11","key":"48_CR29","doi-asserted-by":"publisher","first-page":"2763","DOI":"10.1016\/j.cor.2012.02.008","volume":"39","author":"M Ventresca","year":"2012","unstructured":"Ventresca, M.: Global search algorithms using a combinatorial unranking-based problem representation for the critical node detection problem. Computers & Operations Research 39(11), 2763\u20132775 (2012)","journal-title":"Computers & Operations Research"},{"issue":"1","key":"48_CR30","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s10878-014-9730-4","volume":"28","author":"A Veremyev","year":"2014","unstructured":"Veremyev, A., Prokopyev, O.A., Pasiliao, E.L.: An integer programming framework for critical elements detection in graphs. Journal of Combinatorial Optimization 28(1), 233\u2013273 (2014). https:\/\/doi.org\/10.1007\/s10878-014-9730-4","journal-title":"Journal of Combinatorial Optimization"},{"key":"48_CR31","doi-asserted-by":"crossref","unstructured":"Yang, R., Huang, L., Lai, Y.C.: Selectivity-based spreading dynamics on complex networks. Physical review e 78(2), 026111 (2008)","DOI":"10.1103\/PhysRevE.78.026111"}],"container-title":["Advances in Intelligent Systems and Computing","16th International Conference on Soft Computing Models in Industrial and Environmental Applications (SOCO 2021)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-87869-6_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T22:25:48Z","timestamp":1673303148000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-87869-6_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,23]]},"ISBN":["9783030878689","9783030878696"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-87869-6_48","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2021,9,23]]},"assertion":[{"value":"23 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SOCO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Soft Computing Models in Industrial and Environmental Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bilbao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"socomoin2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.sococonference.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}