{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,12,31]],"date-time":"2022-12-31T10:49:02Z","timestamp":1672483742690},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,7,19]],"date-time":"2013-07-19T00:00:00Z","timestamp":1374192000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2013,7,19]],"date-time":"2013-07-19T00:00:00Z","timestamp":1374192000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Technol Manag"],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1007\/s10799-013-0163-z","type":"journal-article","created":{"date-parts":[[2013,7,18]],"date-time":"2013-07-18T08:40:27Z","timestamp":1374136827000},"page":"257-268","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Effective immunization of online networks: a self-similar selection approach"],"prefix":"10.1007","volume":"14","author":[{"given":"Byung Cho","family":"Kim","sequence":"first","affiliation":[]},{"given":"Sunghwan","family":"Jung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,7,19]]},"reference":[{"issue":"2","key":"163_CR1","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/s10618-009-0140-7","volume":"19","author":"L Akoglu","year":"2009","unstructured":"Akoglu L, Faloutsos C (2009) RTG: a recursive realistic graph generator using random typing. Data Min Knowl Disc 19(2):194\u2013209","journal-title":"Data Min Knowl Disc"},{"key":"163_CR2","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1038\/43601","volume":"401","author":"R Albert","year":"1999","unstructured":"Albert R, Jeong H, Barabasi AL (1999) Diameter of the world-wide web. Nature 401:130\u2013131","journal-title":"Nature"},{"key":"163_CR3","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1038\/35019019","volume":"406","author":"R Albert","year":"2000","unstructured":"Albert R, Jeong H, Barabasi AL (2000) Attack and error tolerance of complex networks. Nature 406:378\u2013382","journal-title":"Nature"},{"issue":"1","key":"163_CR4","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.dss.2010.11.014","volume":"51","author":"X Bai","year":"2011","unstructured":"Bai X, Airoldi EM, Malin B (2011) An entropy approach to disclosure risk assessment: lessons from real applications and simulated domains. Decis Support Syst 51(1):10\u201320","journal-title":"Decis Support Syst"},{"key":"163_CR5","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1126\/science.1095845","volume":"304","author":"J Balthrop","year":"2004","unstructured":"Balthrop J, Forrest S, Newman ME, Willamson M (2004) Technological networks and the spread of computer viruses. Science 304:527\u2013529","journal-title":"Science"},{"issue":"5439","key":"163_CR6","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"AL Barabasi","year":"1999","unstructured":"Barabasi AL, Albert R (1999) Emergence of scaling in random networks. Science 286(5439):509\u2013512","journal-title":"Science"},{"key":"163_CR7","doi-asserted-by":"publisher","first-page":"5468","DOI":"10.1103\/PhysRevLett.85.5468","volume":"85","author":"DS Callaway","year":"2000","unstructured":"Callaway DS, Newman ME, Strogatz SH, Watts DJ (2000) Network robustness and fragility: percolation on random graphs. Physical Review Letter 85:5468\u20135471","journal-title":"Physical Review Letter"},{"issue":"4","key":"163_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1284680.1284681","volume":"10","author":"D Chakrabarti","year":"2008","unstructured":"Chakrabarti D, Wang Y, Wang C, Leskovec J, Faloutsos C (2008) Epidemic thresholds in real networks. ACM Transactions on Information and System Security 10(4):1\u201326","journal-title":"ACM Transactions on Information and System Security"},{"key":"163_CR9","doi-asserted-by":"publisher","first-page":"4629","DOI":"10.1103\/PhysRevLett.85.4629","volume":"85","author":"R Cohen","year":"2000","unstructured":"Cohen R, Erez K, ben-Avraham D D, Havlin S (2000) Resilience of the Internet to random breakdowns. Physical Review Letter 85:4629\u20134632","journal-title":"Physical Review Letter"},{"issue":"24","key":"163_CR10","doi-asserted-by":"publisher","first-page":"247901","DOI":"10.1103\/PhysRevLett.91.247901","volume":"91","author":"R Cohen","year":"2003","unstructured":"Cohen R, Havlin S, ben-Avraham D (2003) Efficient immunization strategies for computer networks and populations. Phys Rev Lett 91(24):247901","journal-title":"Phys Rev Lett"},{"key":"163_CR11","first-page":"17","volume":"5","author":"P Erdos","year":"1960","unstructured":"Erdos P, Renyi A (1960) On the evolution of random graphs. Publication of the Mathematical Institute of Hungarian Academy of Sciences 5:17\u201361","journal-title":"Publication of the Mathematical Institute of Hungarian Academy of Sciences"},{"key":"163_CR12","first-page":"1455","volume":"2005","author":"A Ganesh","year":"2005","unstructured":"Ganesh A, Massouli\u00e9 L, Towsle D (2005) The effect of network topology on the spread of epidemics. Procedings of IEEE INFOCOM 2005:1455\u20131466","journal-title":"Procedings of IEEE INFOCOM"},{"key":"163_CR13","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/0167-4048(89)90037-0","volume":"8","author":"W Gleissner","year":"1989","unstructured":"Gleissner W (1989) A mathematical theory for the spread of computer viruses. Computer and Security 8:35\u201341","journal-title":"Computer and Security"},{"key":"163_CR14","doi-asserted-by":"publisher","first-page":"056101","DOI":"10.1103\/PhysRevE.65.056101","volume":"65","author":"S Jung","year":"2002","unstructured":"Jung S, Kim S, Kahng B (2002) Geometric fractal growth model for scale-free networks. Phys Rev E 65:056101","journal-title":"Phys Rev E"},{"issue":"4","key":"163_CR15","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1111\/j.1937-5956.2010.01189.x","volume":"20","author":"BC Kim","year":"2011","unstructured":"Kim BC, Chen P, Mukhopadhyay T (2011) The effect of liability and patch release on software security: the monopoly case. Production and Operations Management 20(4):603\u2013617","journal-title":"Production and Operations Management"},{"issue":"2","key":"163_CR16","doi-asserted-by":"publisher","first-page":"7","DOI":"10.2753\/JEC1086-4415140201","volume":"14","author":"BC Kim","year":"2010","unstructured":"Kim BC, Chen P, Mukhopadhyay T (2010) An economic analysis of the software market with a risk-sharing mechanism. International Journal of Electronic Commerce 14(2):7\u201339","journal-title":"International Journal of Electronic Commerce"},{"key":"163_CR17","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1088\/1367-2630\/9\/6\/177","volume":"9","author":"JS Kim","year":"2007","unstructured":"Kim JS, Goh KI, Kahng B, Kim D (2007) Fractality and self-similarity in scale-free networks. New J Phys 9:177","journal-title":"New J Phys"},{"key":"163_CR18","doi-asserted-by":"crossref","unstructured":"Leskovec J, Faloutsos C (2007) Scalable modeling of real graphs using Kronecker multiplication. Proceedings of the 24th international conference on machine learning 497\u2013504","DOI":"10.1145\/1273496.1273559"},{"key":"163_CR19","volume-title":"The fractal geometry of nature","author":"BB Mandelbrot","year":"1983","unstructured":"Mandelbrot BB (1983) The fractal geometry of nature. Freeman Publisher, WH"},{"key":"163_CR20","unstructured":"Markoff J (2009) Worm infects millions of computers worldwide. New York Times Jan 22, 2009, available online at \n http:\/\/www.nytimes.com\/2009\/01\/23\/technology\/internet\/23worm.html"},{"key":"163_CR21","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/0167-4048(88)90327-6","volume":"7","author":"W Murray","year":"1988","unstructured":"Murray W (1988) The application of epidemiology to computer viruses. Computers and Security 7:35\u201341","journal-title":"Computers and Security"},{"issue":"3","key":"163_CR22","doi-asserted-by":"publisher","first-page":"035101","DOI":"10.1103\/PhysRevB.66.035101","volume":"66","author":"ME Newman","year":"2002","unstructured":"Newman ME, Forrest S, Balthrop J (2002) Email networks and the spread of computer viruses. Phys Rev 66(3):035101","journal-title":"Phys Rev"},{"issue":"7","key":"163_CR23","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1287\/mnsc.1060.0623","volume":"53","author":"W Oh","year":"2007","unstructured":"Oh W, Jeon S (2007) Membership herding and network stability in the open source community. Manage Sci 53(7):1086\u20131101","journal-title":"Manage Sci"},{"issue":"3","key":"163_CR24","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1016\/j.dss.2006.12.014","volume":"43","author":"I Park","year":"2007","unstructured":"Park I, Sharman R, Rao HR, Upadhyaya S (2007) Short term and total life impact analysis of email worms in computer systems. Decis Support Syst 43(3):827\u2013841","journal-title":"Decis Support Syst"},{"key":"163_CR25","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1038\/nature03248","volume":"433","author":"C Song","year":"2005","unstructured":"Song C, Havlin S, Makse HA (2005) Self-similarity of complex networks. Nature 433:392\u2013395","journal-title":"Nature"},{"key":"163_CR26","doi-asserted-by":"crossref","unstructured":"Rozenfeld HD, Gallos LK, Song C, Makse HA (2008) Fractal and transfractal scale-tree networks. arXiv:0808.2206v1","DOI":"10.1007\/978-0-387-30440-3_231"},{"key":"163_CR27","doi-asserted-by":"publisher","first-page":"025701","DOI":"10.1103\/PhysRevLett.104.025701","volume":"104","author":"HD Rozenfeld","year":"2010","unstructured":"Rozenfeld HD, Song C, Makse HA (2010) Small-world to fractal transition in complex networks: a renormalization group approach. Phys Rev Lett 104:025701","journal-title":"Phys Rev Lett"},{"key":"163_CR28","doi-asserted-by":"crossref","unstructured":"Tong H, Prakash BA, Tsourakakis C, Eliassi-Rad R, Faloutsos C, Chau DH (2010) On the vulnerability of large graphs. Proceedings of IEEE international conference on data mining 1091\u20131096","DOI":"10.1109\/ICDM.2010.54"},{"key":"163_CR29","unstructured":"Wang C, Knight J, Elder M (2000) On computer viral infection and the effect of immunization, In proceedings of the 16th annual computer security applications conference 246\u2013256"},{"key":"163_CR30","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.dss.2009.05.014","volume":"48","author":"H Yuan","year":"2009","unstructured":"Yuan H, Chen G, Wu J, Xiong H (2009) Towards controlling virus propagation in information systems with point-to-group information sharing. Decis Support Syst 48:57\u201368","journal-title":"Decis Support Syst"}],"container-title":["Information Technology and Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-013-0163-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10799-013-0163-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-013-0163-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-013-0163-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,18]],"date-time":"2020-05-18T14:46:22Z","timestamp":1589813182000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10799-013-0163-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,19]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,9]]}},"alternative-id":["163"],"URL":"https:\/\/doi.org\/10.1007\/s10799-013-0163-z","relation":{},"ISSN":["1385-951X","1573-7667"],"issn-type":[{"value":"1385-951X","type":"print"},{"value":"1573-7667","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,19]]},"assertion":[{"value":"19 July 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}