{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T13:19:34Z","timestamp":1719926374404},"reference-count":40,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2016,4,1]],"date-time":"2016-04-01T00:00:00Z","timestamp":1459468800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Network and Computer Applications"],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1016\/j.jnca.2015.11.025","type":"journal-article","created":{"date-parts":[[2016,2,5]],"date-time":"2016-02-05T17:32:08Z","timestamp":1454693528000},"page":"76-88","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":6,"special_numbering":"C","title":["Combined Banzhaf & Diversity Index (CBDI) for critical node detection"],"prefix":"10.1016","volume":"64","author":[{"given":"Waqar","family":"Asif","sequence":"first","affiliation":[]},{"given":"Hassaan Khaliq","family":"Qureshi","sequence":"additional","affiliation":[]},{"given":"Muttukrishnan","family":"Rajarajan","sequence":"additional","affiliation":[]},{"given":"Marios","family":"Lestas","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jnca.2015.11.025_bib1","doi-asserted-by":"crossref","unstructured":"Arulselvan A, Commander CW, Shylo O, Pardalos PM. Cardinality-constrained critical node detection problem. In: Performance models and risk management in communications systems. New York: Springer; 2011. p. 79\u201391.","DOI":"10.1007\/978-1-4419-0534-5_4"},{"key":"10.1016\/j.jnca.2015.11.025_bib2","doi-asserted-by":"crossref","unstructured":"Asif W, Qureshi HK, Rajarajan M. Variable rate adaptive modulation (VRAM) for introducing small-world model into WSNs. In: The 47th annual conference on information sciences and systems, Baltimore, Maryland. IEEE; 2013. p. 1\u20136.","DOI":"10.1109\/CISS.2013.6552329"},{"key":"10.1016\/j.jnca.2015.11.025_bib3","doi-asserted-by":"crossref","unstructured":"Asif W, Qureshi HK, Rajarajan M, Lestas M. Cbdi: combined Banzhaf & diversity index for finding critical nodes. In: Global communications conference (GLOBECOM), Austin, Texas. IEEE; 2014. p. 758\u201363.","DOI":"10.1109\/GLOCOM.2014.7036899"},{"issue":"7291","key":"10.1016\/j.jnca.2015.11.025_bib4","doi-asserted-by":"crossref","first-page":"1025","DOI":"10.1038\/nature08932","article-title":"Catastrophic cascade of failures in interdependent networks","volume":"464","author":"Buldyrev","year":"2010","journal-title":"Nature"},{"key":"10.1016\/j.jnca.2015.11.025_bib5","doi-asserted-by":"crossref","unstructured":"Chen P-Y, Hero AO. Local Fiedler vector centrality for detection of deep and overlapping communities in networks. In: IEEE International conference on acoustics, speech and signal processing (ICASSP); 2014. p. 1120\u201324.","DOI":"10.1109\/ICASSP.2014.6853771"},{"key":"10.1016\/j.jnca.2015.11.025_bib6","doi-asserted-by":"crossref","unstructured":"Cheng YY, Lee RKW, Lim EP, Zhu F. Delayflow centrality for identifying critical nodes in transportation networks. In: IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM); 2013. p. 1462\u20133.","DOI":"10.1145\/2492517.2492595"},{"issue":"1","key":"10.1016\/j.jnca.2015.11.025_bib7","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1080\/00018730601170527","article-title":"Characterization of complex networks","volume":"56","author":"Costa","year":"2007","journal-title":"Adv Phys"},{"key":"10.1016\/j.jnca.2015.11.025_bib8","doi-asserted-by":"crossref","first-page":"622","DOI":"10.1016\/S0378-4371(02)01545-5","article-title":"Efficiency of scale-free networks","volume":"320","author":"Crucitti","year":"2003","journal-title":"Physica A: Stat Mech Appl"},{"issue":"2","key":"10.1016\/j.jnca.2015.11.025_bib9","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1109\/TNET.2011.2170849","article-title":"On new approaches of assessing network vulnerability","volume":"20","author":"Dinh","year":"2012","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"2","key":"10.1016\/j.jnca.2015.11.025_bib10","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1287\/moor.4.2.99","article-title":"Mathematical properties of the Banzhaf power index","volume":"4","author":"Dubey","year":"1979","journal-title":"Math Oper Res"},{"key":"10.1016\/j.jnca.2015.11.025_bib11","doi-asserted-by":"crossref","unstructured":"Fan N, Pardalos PM. Robust optimization of graph partitioning and critical node detection in analyzing networks. In: Combinatorial optimization and applications. Berlin, Heidelberg: Springer; 2010. p. 170\u201383.","DOI":"10.1007\/978-3-642-17458-2_15"},{"issue":"2","key":"10.1016\/j.jnca.2015.11.025_bib12","doi-asserted-by":"crossref","first-page":"298","DOI":"10.21136\/CMJ.1973.101168","article-title":"Algebraic connectivity of graphs","volume":"23","author":"Fiedler","year":"1973","journal-title":"Czechoslov Math J"},{"key":"10.1016\/j.jnca.2015.11.025_bib13","doi-asserted-by":"crossref","first-page":"35","DOI":"10.2307\/3033543","article-title":"A set of measures of centrality based on betweenness","author":"Freeman","year":"1977","journal-title":"Sociometry"},{"issue":"3","key":"10.1016\/j.jnca.2015.11.025_bib14","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","article-title":"Centrality in social networks conceptual clarification","volume":"1","author":"Freeman","year":"1979","journal-title":"Soc Netw"},{"issue":"12","key":"10.1016\/j.jnca.2015.11.025_bib15","doi-asserted-by":"crossref","first-page":"2140","DOI":"10.1016\/j.comnet.2009.03.012","article-title":"On the reliability of large-scale distributed systems-a topological view","volume":"53","author":"He","year":"2009","journal-title":"Comput Netw"},{"issue":"6","key":"10.1016\/j.jnca.2015.11.025_bib16","doi-asserted-by":"crossref","first-page":"065101","DOI":"10.1103\/PhysRevE.83.065101","article-title":"Robustness of interdependent networks under targeted attack","volume":"83","author":"Huang","year":"2011","journal-title":"Phys Rev E"},{"key":"10.1016\/j.jnca.2015.11.025_bib17","doi-asserted-by":"crossref","unstructured":"Jamakovic A, Van Mieghem P. On the robustness of complex networks by using the algebraic connectivity. In: Ad hoc and sensor networks, wireless networks, next generation internet. Berlin, Heidelberg: Springer; 2008. p. 183\u201394.","DOI":"10.1007\/978-3-540-79549-0_16"},{"key":"10.1016\/j.jnca.2015.11.025_bib18","unstructured":"Krishna SS, Gummadi PK, Gribble SD. A measurement study of peer-to-peer file sharing systems. In: Multimedia computing and networking, San Jose, CA, USA; 2002."},{"issue":"4","key":"10.1016\/j.jnca.2015.11.025_bib19","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1137\/0208049","article-title":"Node-deletion np-complete problems","volume":"8","author":"Krishnamoorthy","year":"1979","journal-title":"SIAM J Comput"},{"key":"10.1016\/j.jnca.2015.11.025_bib20","unstructured":"Liu D, Ning P, Du W. Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In: The 25th IEEE international conference on distributed computing systems; 2005. p. 609\u201319."},{"issue":"7346","key":"10.1016\/j.jnca.2015.11.025_bib21","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1038\/nature10011","article-title":"Controllability of complex networks","volume":"473","author":"Liu","year":"2011","journal-title":"Nature"},{"key":"10.1016\/j.jnca.2015.11.025_bib22","first-page":"004","article-title":"Evaluating the vital network nodes based on node estranging","volume":"3","author":"Liu","year":"2011","journal-title":"Comput Eng Sci"},{"key":"10.1016\/j.jnca.2015.11.025_bib23","doi-asserted-by":"crossref","unstructured":"Liu H, Cao X, He J, Cheng P, Chen J, Sun Y. Distributed identification of the most critical node for average consensus. In: World congress, vol. 19; 2014. p. 1843\u20138.","DOI":"10.3182\/20140824-6-ZA-1003.02699"},{"issue":"1","key":"10.1016\/j.jnca.2015.11.025_bib24","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/BF02018473","article-title":"On the eigenvalues of trees","volume":"3","author":"Lov\u00e1sz","year":"1973","journal-title":"Period Math Hung"},{"key":"10.1016\/j.jnca.2015.11.025_bib25","unstructured":"MathWorks, Matlab 2013 \u3008http:\/\/www.mathworks.com\/support\/sysreq\/sv-r2013a\/\u3009"},{"key":"10.1016\/j.jnca.2015.11.025_bib26","doi-asserted-by":"crossref","unstructured":"Mbarushimana C, Shahrabi A. Comparative study of reactive and proactive routing protocols performance in mobile ad hoc networks. In: The 21st international conference on advanced information networking and applications workshops, vol. 2, Niagara Falls, Ont. IEEE; 2007. p. 679\u201384.","DOI":"10.1109\/AINAW.2007.123"},{"key":"10.1016\/j.jnca.2015.11.025_bib27","unstructured":"Mohar B, Alavi Y. The Laplacian spectrum of graphs. In: Graph theory, combinatorics, and applications, vol. 2; 1991. p. 871\u201398."},{"key":"10.1016\/j.jnca.2015.11.025_bib28","doi-asserted-by":"crossref","unstructured":"Narayanam R. A game theoretic approach to identify critical components in networked systems. In: SRII global conference, San Jose, CA. IEEE; 2012. p. 515\u201324.","DOI":"10.1109\/SRII.2012.64"},{"key":"10.1016\/j.jnca.2015.11.025_bib29","unstructured":"NSNAM, Network simulator 3 \u3008https:\/\/www.nsnam.org\/\u3009"},{"issue":"10","key":"10.1016\/j.jnca.2015.11.025_bib30","doi-asserted-by":"crossref","first-page":"3904","DOI":"10.1109\/T-WC.2008.070453","article-title":"Robust connectivity-aware energy-efficient routing for wireless sensor networks","volume":"7","author":"Pandana","year":"2008","journal-title":"IEEE Trans Wirel Commun"},{"issue":"4","key":"10.1016\/j.jnca.2015.11.025_bib31","doi-asserted-by":"crossref","first-page":"048701","DOI":"10.1103\/PhysRevLett.105.048701","article-title":"Interdependent networks","volume":"105","author":"Parshani","year":"2010","journal-title":"Phys Rev Lett"},{"key":"10.1016\/j.jnca.2015.11.025_bib32","first-page":"008","article-title":"Research on the traffic effect in the central district of urban expansion [j]","volume":"4","author":"Qu","year":"2001","journal-title":"City Plan Rev"},{"issue":"3","key":"10.1016\/j.jnca.2015.11.025_bib33","doi-asserted-by":"crossref","first-page":"963","DOI":"10.1109\/TNET.2012.2215882","article-title":"On the discovery of critical links and nodes for assessing network vulnerability","volume":"21","author":"Shen","year":"2013","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"3\u20134","key":"10.1016\/j.jnca.2015.11.025_bib34","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/s11067-006-9284-9","article-title":"Application of accessibility based methods for vulnerability analysis of strategic road networks","volume":"6","author":"Taylor","year":"2006","journal-title":"Netw Spat Econ"},{"issue":"6684","key":"10.1016\/j.jnca.2015.11.025_bib35","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1038\/30918","article-title":"Collective dynamics of \u2018small-world\u2019 networks","volume":"393","author":"Watts","year":"1998","journal-title":"Nature"},{"issue":"9","key":"10.1016\/j.jnca.2015.11.025_bib36","doi-asserted-by":"crossref","first-page":"1617","DOI":"10.1109\/49.12889","article-title":"Routing of multipoint connections","volume":"6","author":"Waxman","year":"1988","journal-title":"IEEE J Sel Areas Commun"},{"issue":"13","key":"10.1016\/j.jnca.2015.11.025_bib37","doi-asserted-by":"crossref","first-page":"2536","DOI":"10.1016\/j.comnet.2013.05.001","article-title":"Daccer","volume":"57","author":"Wehmuth","year":"2013","journal-title":"Comput Netw"},{"key":"10.1016\/j.jnca.2015.11.025_bib38","doi-asserted-by":"crossref","unstructured":"Wei P, Sun D. Weighted algebraic connectivity: an application to airport transportation network. In: The 18th IFAC world congress, Milan, Italy, August; 2011. p. 13864\u20139.","DOI":"10.3182\/20110828-6-IT-1002.00486"},{"issue":"2","key":"10.1016\/j.jnca.2015.11.025_bib39","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1016\/j.physa.2005.08.020","article-title":"A deterministic small-world network created by edge iterations","volume":"363","author":"Zhang","year":"2006","journal-title":"Physica A: Stat Mech Appl"},{"key":"10.1016\/j.jnca.2015.11.025_bib40","unstructured":"Zhang X, Wu J, Du Y. The study of critical nodes of road network based on traffic shockwave model. In: The seventh international conference on computing and convergence technology (ICCCT), Seoul. IEEE; 2012. p. 102\u20137."}],"container-title":["Journal of Network and Computer Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S108480451600062X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S108480451600062X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,9,15]],"date-time":"2020-09-15T01:12:49Z","timestamp":1600132369000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S108480451600062X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":40,"alternative-id":["S108480451600062X"],"URL":"https:\/\/doi.org\/10.1016\/j.jnca.2015.11.025","relation":{},"ISSN":["1084-8045"],"issn-type":[{"value":"1084-8045","type":"print"}],"subject":[],"published":{"date-parts":[[2016,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Combined Banzhaf & Diversity Index (CBDI) for critical node detection","name":"articletitle","label":"Article Title"},{"value":"Journal of Network and Computer Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jnca.2015.11.025","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2016 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}