{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:51:45Z","timestamp":1725490305564},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642352355"},{"type":"electronic","value":"9783642352362"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35236-2_49","type":"book-chapter","created":{"date-parts":[[2012,11,20]],"date-time":"2012-11-20T01:36:35Z","timestamp":1353375395000},"page":"493-501","source":"Crossref","is-referenced-by-count":2,"title":["Critical Infrastructure Management for Telecommunication Networks"],"prefix":"10.1007","author":[{"given":"Haibo","family":"Wang","sequence":"first","affiliation":[]},{"given":"Bahram","family":"Alidaee","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"49_CR1","unstructured":"Government Accountability Office, Defense Critical Infrastructure: GAO-08-373R, in GAO Reports: U.S. Government Accountability Office, p. 1 (2008)"},{"key":"49_CR2","unstructured":"Eagleman, D.: Four ways the Internet could go down (July 10, 2012), \n \n http:\/\/www.cnn.com\/2012\/07\/10\/tech\/web\/internet-down-eagleman"},{"key":"49_CR3","first-page":"5","volume":"42","author":"S.L. Golicic","year":"2003","unstructured":"Golicic, S.L., McCarthy, T.M., Mentzer, J.T.: Conducting a Market Opportunity Analysis for Air Cargo Operations. Transportation Journal\u00a042, 5\u201315 (2003)","journal-title":"Transportation Journal"},{"key":"49_CR4","doi-asserted-by":"crossref","unstructured":"Schoenwald, D.A., Barton, D.C., Ehlen, M.A.: An agent-based simulation laboratory for economics and infrastructure interdependency. In: Proceedings of the 2004 American Control Conference (2004)","DOI":"10.23919\/ACC.2004.1386752"},{"key":"49_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-540-72986-0_27","volume-title":"Inter-Domain Management","author":"N.K. Svendsen","year":"2007","unstructured":"Svendsen, N.K., Wolthusen, S.D.: Graph Models of Critical Infrastructure Interdependencies. In: Bandara, A.K., Burgess, M. (eds.) AIMS 2007. LNCS, vol.\u00a04543, pp. 208\u2013211. Springer, Heidelberg (2007)"},{"key":"49_CR6","unstructured":"G. A. Office, Homeland Security: Key Elements of a Risk Management Approach (2001)"},{"key":"49_CR7","unstructured":"Pederson, P., Dudenhoeffer, D., Hartley, S., Permann, M.: Critical Infrastructure Interdependency Modeling: A Survey for U.S. and International Research. I.N. Laboratory (2006)"},{"key":"49_CR8","doi-asserted-by":"publisher","first-page":"1360","DOI":"10.1086\/225469","volume":"78","author":"M. Granovetter","year":"1973","unstructured":"Granovetter, M.: The strength of weak ties. American Journal of Sociology\u00a078, 1360\u20131380 (1973)","journal-title":"American Journal of Sociology"},{"key":"49_CR9","doi-asserted-by":"publisher","first-page":"247901","DOI":"10.1103\/PhysRevLett.91.247901","volume":"91","author":"R. Cohen","year":"2003","unstructured":"Cohen, R., Havlin, S., Ben-Avraham, D.: Efficient Immunization Strategies for Computer Networks and Populations. Physical Review Letters\u00a091, 247901 (2003)","journal-title":"Physical Review Letters"},{"key":"49_CR10","doi-asserted-by":"crossref","unstructured":"Nicolaides, C., Cueto-Felgueroso, L., Gonz\u00e1lez, M.C., Juanes, R.: A Metric of Influential Spreading during Contagion Dynamics through the Air Transportation Network. PLoS One\u00a07, e40961 (2012)","DOI":"10.1371\/journal.pone.0040961"},{"key":"49_CR11","doi-asserted-by":"crossref","unstructured":"Chassin, D.P., Malard, J.M., Posse, C., Gangopadhyaya, A., Lu, N.: Modeling power systems as complex adaptive systems. Pacific Northwest National Laboratory, Richland, Wash. (2004)","DOI":"10.2172\/877087"},{"key":"49_CR12","doi-asserted-by":"crossref","unstructured":"Naamati, G., Friedman, Y., Balaga, O., Linial, M.: Susceptibility of the Human Pathways Graphs to Fragmentation by Small Sets of microRNAs. Bioinformatics (February 10, 2012)","DOI":"10.1093\/bioinformatics\/bts077"},{"key":"49_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1471-2105-8-199","volume":"8","author":"M. Singhal","year":"2007","unstructured":"Singhal, M., Resat, H.: A domain-based approach to predict protein-protein interactions. BMC Bioinformatics\u00a08, 1\u201319 (2007)","journal-title":"BMC Bioinformatics"},{"key":"49_CR14","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.physrep.2005.10.009","volume":"424","author":"S. Boccaletti","year":"2006","unstructured":"Boccaletti, S., Latora, V., Moreno, Y., Chavez, M., Hwang, D.U.: Complex networks: Structure and dynamics. Physics Reports\u00a0424, 175\u2013308 (2006)","journal-title":"Physics Reports"},{"key":"49_CR15","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","volume":"1","author":"L. Freeman","year":"1979","unstructured":"Freeman, L.: Centrality in social networks: Conceptual clarification. Social Networks\u00a01, 215\u2013239 (1979)","journal-title":"Social Networks"},{"key":"49_CR16","doi-asserted-by":"publisher","first-page":"56109","DOI":"10.1103\/PhysRevE.65.056109","volume":"65","author":"P. Holme","year":"2002","unstructured":"Holme, P., Kim, B.J., Yoon, C.N., Han, S.K.: Attack vulnerability of complex networks. Physical Review E\u00a065, 056109 (2002)","journal-title":"Physical Review E"},{"key":"49_CR17","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1006\/jagm.1996.0047","volume":"21","author":"H. Narayanan","year":"1996","unstructured":"Narayanan, H., Roy, S., Patkar, S.: Approximation Algorithms for Min-k-Overlap Problems Using the Principal Lattice of Partitions Approach. Journal of Algorithms\u00a021, 306\u2013330 (1996)","journal-title":"Journal of Algorithms"},{"key":"49_CR18","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s10696-006-9011-3","volume":"18","author":"H. Wang","year":"2006","unstructured":"Wang, H., Alidaee, B., Glover, F., Kochenberger, G.: Solving Group Technology Problems via Clique Partitioning. International Journal of Flexible Manufacturing Systems\u00a018, 77\u201397 (2006)","journal-title":"International Journal of Flexible Manufacturing Systems"},{"key":"49_CR19","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1016\/0377-2217(94)90125-2","volume":"78","author":"A. Billionet","year":"1994","unstructured":"Billionet, A., Sutter, A.: Minimization of a Quadratic Pseudo-Boolean Function. European Journal of Operational Research\u00a078, 106\u2013115 (1994)","journal-title":"European Journal of Operational Research"},{"key":"49_CR20","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1016\/S0377-2217(97)00130-6","volume":"108","author":"T.M. Alkhamis","year":"1998","unstructured":"Alkhamis, T.M., Hasan, M., Ahmed, M.A.: Simulated annealing for the unconstrained quadratic pseudo-Boolean function. European Journal of Operational Research\u00a0108, 641\u2013652 (1998)","journal-title":"European Journal of Operational Research"},{"key":"49_CR21","unstructured":"Amini, M., Alidaee, B., Kochenberger, G.: A Scatter Search Approach to Unconstrained Quadratic Binary Programs. In: Corne, D., Glover (eds.) New Methods in Optimization, pp. 317\u2013330. McGraw-Hill (1999)"},{"key":"49_CR22","unstructured":"Beasley, E.: Heuristic Algorithms for the Unconstrained Binary Quadratic Programming Problem. Working Paper (1998)"},{"issue":"1-3","key":"49_CR23","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/S0166-218X(01)00341-9","volume":"123","author":"E. Boros","year":"2002","unstructured":"Boros, E., Hammer, P.: Pseudo-Boolean Optimization. Discrete Applied Mathematics\u00a0123(1-3), 155\u2013225 (2002)","journal-title":"Discrete Applied Mathematics"},{"key":"49_CR24","doi-asserted-by":"crossref","unstructured":"Boros, E., Hammer, P., Sun, X.: The DDT Method for Quadratic 0-1 Minimization. Rutcor Research Center RRR, 39\u201389 (1989)","DOI":"10.1016\/0167-6377(90)90044-6"},{"key":"49_CR25","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1016\/S0377-2217(01)00209-0","volume":"137","author":"F. Glover","year":"2002","unstructured":"Glover, F., Alidaee, B., Rego, C., Kochenberger, G.: One-pass heuristics for large-scale unconstrained binary quadratic problems. European Journal of Operational Research\u00a0137, 272\u2013287 (2002)","journal-title":"European Journal of Operational Research"},{"key":"49_CR26","doi-asserted-by":"crossref","unstructured":"Glover, F., Kochenberger, G., Alidaee, B., Amini, M.: Tabu Search with Critical Event Memory: An Enhanced Application for Binary Quadratic Programs. In: Voss, S.M.S., Osman, I., Roucairol, C. (eds.) Meta-Heuristics, Advances and Trends in Local Search Paradigms for Optimization, pp. 93\u2013109. Kluwer (1999)","DOI":"10.1007\/978-1-4615-5775-3_7"},{"key":"49_CR27","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1287\/mnsc.44.3.336","volume":"44","author":"F. Glover","year":"1998","unstructured":"Glover, F., Kochenberger, G.A., Alidaee, B.: Adaptive memory tabu search for binary quadratic programs. Management Science\u00a044, 336 (1998)","journal-title":"Management Science"},{"key":"49_CR28","unstructured":"Katayama, K., Tani, M., Narihisa, H.: Solving Large Binary Quadratic Programming Problems by an Effective Genetic Local Search Algorithm. In: Proceedings of the Genetic and Evolutionary Computation Conference, GECCO 2000 (2000)"},{"key":"49_CR29","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1016\/S0377-2217(98)00359-2","volume":"119","author":"A. Lodi","year":"1999","unstructured":"Lodi, A., Allemand, K., Liebling, T.: An evolutionary heuristic for quadratic 0-1 programming. European Journal of Operational Research\u00a0119, 662\u2013670 (1999)","journal-title":"European Journal of Operational Research"},{"key":"49_CR30","unstructured":"Merz, P., Freisleben, B.: Genetic Algorithms for Binary Quadratic Programming. In: Proceedings of the 1999 International Genetic and Evolutionary Computation Conference (GECCO 1999), pp. 417\u2013424 (1999)"},{"key":"49_CR31","doi-asserted-by":"crossref","unstructured":"Palubeckis, G.: A Heuristic-Branch and Bound Algorithm for the Unconstrained Quadratic Zero-One Programming Problem. Computing, 284\u2013301 (1995)","DOI":"10.1007\/BF02238228"},{"key":"49_CR32","unstructured":"Krebs, V.: Uncloaking Terrorist Networks. First Monday\u00a07 (2002), \n \n http:\/\/firstmonday.org\/htbin\/cgiwrap\/bin\/ojs\/index.php\/fm\/article\/viewArticle\/941\/863"},{"key":"49_CR33","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1080\/09700160408450119","volume":"28","author":"S. Saxena","year":"2004","unstructured":"Saxena, S., Santhanam, K., Basu, A.: Application of Social Network Analysis (SNA) to terrorist networks in Jammu & Kashmir. Strategic Analysis\u00a028, 84\u2013101 (2004)","journal-title":"Strategic Analysis"},{"key":"49_CR34","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1080\/01972240590925348","volume":"21","author":"J.R. Tyler","year":"2005","unstructured":"Tyler, J.R., Wilkinson, D.M., Huberman, B.A.: E-Mail as Spectroscopy: Automated Discovery of Community Structure within Organizations. The Information Society\u00a021, 143\u2013153 (2005)","journal-title":"The Information Society"},{"key":"49_CR35","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s10588-006-7084-x","volume":"12","author":"S. Borgatti","year":"2006","unstructured":"Borgatti, S.: Identifying sets of key players in a social network. Computational & Mathematical Organization Theory\u00a012, 21\u201334 (2006)","journal-title":"Computational & Mathematical Organization Theory"},{"key":"49_CR36","first-page":"371","volume-title":"Information Dynamics in the Networked World Complex Networks","author":"B. Huberman","year":"2004","unstructured":"Huberman, B., Adamic, L., Ben-Naim, E., Frauenfelder, H., Toroczkai, Z.: Information Dynamics in the Networked World Complex Networks, vol.\u00a0650, pp. 371\u2013398. Springer, Heidelberg (2004)"},{"key":"49_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/978-3-540-25952-7_28","volume-title":"Intelligence and Security Informatics","author":"J. Baumes","year":"2004","unstructured":"Baumes, J., Goldberg, M., Magdon-Ismail, M., Al Wallace, W.: Discovering Hidden Groups in Communication Networks. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) ISI 2004. LNCS, vol.\u00a03073, pp. 378\u2013389. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Active Media Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35236-2_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,8]],"date-time":"2019-05-08T20:27:31Z","timestamp":1557347251000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35236-2_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642352355","9783642352362"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35236-2_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}