{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T16:16:06Z","timestamp":1726157766208},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030963071"},{"type":"electronic","value":"9783030963088"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-96308-8_103","type":"book-chapter","created":{"date-parts":[[2022,3,26]],"date-time":"2022-03-26T09:15:41Z","timestamp":1648286141000},"page":"1110-1117","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Evolutionary Approach for\u00a0Critical Node Detection in\u00a0Hypergraphs. A\u00a0Case Study of\u00a0an\u00a0Inflation Economic Network"],"prefix":"10.1007","author":[{"given":"No\u00e9mi","family":"Gask\u00f3","sequence":"first","affiliation":[]},{"given":"Mihai","family":"Suciu","sequence":"additional","affiliation":[]},{"given":"Rodica Ioana","family":"Lung","sequence":"additional","affiliation":[]},{"given":"Tam\u00e1s","family":"K\u00e9pes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,27]]},"reference":[{"key":"103_CR1","unstructured":"Arulselvan, A., Commander, C.W., Pardalos, P.M., Shylo, O.: Managing network risk via critical node identification. Risk Manag. Telecommun. Netw. (2007)"},{"key":"103_CR2","volume-title":"Hypergraphs: Combinatorics of Finite Sets","author":"C Berge","year":"1984","unstructured":"Berge, C.: Hypergraphs: Combinatorics of Finite Sets, vol. 45. Elsevier, Amsterdam (1984)"},{"issue":"1","key":"103_CR3","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s10588-006-7084-x","volume":"12","author":"SP Borgatti","year":"2006","unstructured":"Borgatti, S.P.: Identifying sets of key players in a social network. Comput. Math. Organ. Theory 12(1), 21\u201334 (2006)","journal-title":"Comput. Math. Organ. Theory"},{"key":"103_CR4","doi-asserted-by":"crossref","unstructured":"Feng, Y., You, H., Zhang, Z., Ji, R., Gao, Y.: Hypergraph neural networks. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 33, pp. 3558\u20133565 (2019)","DOI":"10.1609\/aaai.v33i01.33013558"},{"issue":"10","key":"103_CR5","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pcbi.1007384","volume":"15","author":"N Franzese","year":"2019","unstructured":"Franzese, N., Groce, A., Murali, T., Ritz, A.: Hypergraph-based connectivity measures for signaling pathway topologies. PLoS Comput. Biol. 15(10), e1007384 (2019)","journal-title":"PLoS Comput. Biol."},{"key":"103_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/978-3-642-25510-6_18","volume-title":"Internet and Network Economics","author":"J He","year":"2011","unstructured":"He, J., Liang, H., Yuan, H.: Controlling infection by blocking nodes and links simultaneously. In: Chen, N., Elkind, E., Koutsoupias, E. (eds.) WINE 2011. LNCS, vol. 7090, pp. 206\u2013217. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-25510-6_18"},{"issue":"4","key":"103_CR7","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0059613","volume":"8","author":"S Iyer","year":"2013","unstructured":"Iyer, S., Killingback, T., Sundaram, B., Wang, Z.: Attack robustness and centrality of complex networks. PLoS ONE 8(4), e59613 (2013)","journal-title":"PLoS ONE"},{"key":"103_CR8","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.cosrev.2018.02.002","volume":"28","author":"M Lalou","year":"2018","unstructured":"Lalou, M., Tahraoui, M.A., Kheddouci, H.: The critical node detection problem in networks: a survey. Comput. Sci. Rev. 28, 92\u2013117 (2018)","journal-title":"Comput. Sci. Rev."},{"issue":"2","key":"103_CR9","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/0022-0000(80)90060-4","volume":"20","author":"JM Lewis","year":"1980","unstructured":"Lewis, J.M., Yannakakis, M.: The node-deletion problem for hereditary properties is NP-complete. J. Comput. Syst. Sci. 20(2), 219\u2013230 (1980)","journal-title":"J. Comput. Syst. Sci."},{"key":"103_CR10","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.ins.2016.10.014","volume":"377","author":"M Lozano","year":"2017","unstructured":"Lozano, M., Garc\u00eda-Mart\u00ednez, C., Rodriguez, F.J., Trujillo, H.M.: Optimizing network attacks by artificial bee colony. Inf. Sci. 377, 30\u201350 (2017)","journal-title":"Inf. Sci."},{"issue":"7","key":"103_CR11","doi-asserted-by":"publisher","first-page":"3262","DOI":"10.1109\/TIP.2012.2190083","volume":"21","author":"J Yu","year":"2012","unstructured":"Yu, J., Tao, D., Wang, M.: Adaptive hypergraph learning and its application in image classification. IEEE Trans. Image Process. 21(7), 3262\u20133272 (2012)","journal-title":"IEEE Trans. Image Process."}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Systems Design and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-96308-8_103","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,26]],"date-time":"2022-03-26T09:28:05Z","timestamp":1648286885000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-96308-8_103"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030963071","9783030963088"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-96308-8_103","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"27 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Systems Design and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isda2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/isda21\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}