{"id":"https://openalex.org/W2097549652","doi":"https://doi.org/10.1109/cisda.2009.5356527","title":"Dynamical networks as a tool for system analysis and exploration","display_name":"Dynamical networks as a tool for system analysis and exploration","publication_year":2009,"publication_date":"2009-07-01","ids":{"openalex":"https://openalex.org/W2097549652","doi":"https://doi.org/10.1109/cisda.2009.5356527","mag":"2097549652"},"language":"en","primary_location":{"id":"doi:10.1109/cisda.2009.5356527","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisda.2009.5356527","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111883702","display_name":"Ir\u00e8ne Pestov","orcid":null},"institutions":[{"id":"https://openalex.org/I1297460800","display_name":"Defence Research and Development Canada","ror":"https://ror.org/00hgy8d33","country_code":"CA","type":"funder","lineage":["https://openalex.org/I1297460800","https://openalex.org/I1336338359","https://openalex.org/I2802286613"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Irene Pestov","raw_affiliation_strings":["Centre for Operational Research and Analysis, Defence Research and Development Canada, Ottawa, Canada","Defence R&D Canada Centre for Operational Research and Analysis, Ottawa, Canada"],"affiliations":[{"raw_affiliation_string":"Centre for Operational Research and Analysis, Defence Research and Development Canada, Ottawa, Canada","institution_ids":["https://openalex.org/I1297460800"]},{"raw_affiliation_string":"Defence R&D Canada Centre for Operational Research and Analysis, Ottawa, Canada","institution_ids":["https://openalex.org/I1297460800"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069419751","display_name":"Simona Verga","orcid":null},"institutions":[{"id":"https://openalex.org/I1297460800","display_name":"Defence Research and Development Canada","ror":"https://ror.org/00hgy8d33","country_code":"CA","type":"funder","lineage":["https://openalex.org/I1297460800","https://openalex.org/I1336338359","https://openalex.org/I2802286613"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Simona Verga","raw_affiliation_strings":["Centre for Operational Research and Analysis, Defence Research and Development Canada, Ottawa, Canada","Defence R&D Canada Centre for Operational Research and Analysis, Ottawa, Canada"],"affiliations":[{"raw_affiliation_string":"Centre for Operational Research and Analysis, Defence Research and Development Canada, Ottawa, Canada","institution_ids":["https://openalex.org/I1297460800"]},{"raw_affiliation_string":"Defence R&D Canada Centre for Operational Research and Analysis, Ottawa, Canada","institution_ids":["https://openalex.org/I1297460800"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5111883702"],"corresponding_institution_ids":["https://openalex.org/I1297460800"],"apc_list":null,"apc_paid":null,"fwci":1.8667,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.86850185,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9799000024795532,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11810","display_name":"Complex Systems and Decision Making","score":0.9714999794960022,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7762335538864136},{"id":"https://openalex.org/keywords/interdependence","display_name":"Interdependence","score":0.6462036371231079},{"id":"https://openalex.org/keywords/complex-system","display_name":"Complex system","score":0.5445948839187622},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.509956955909729},{"id":"https://openalex.org/keywords/dynamical-systems-theory","display_name":"Dynamical systems theory","score":0.49565255641937256},{"id":"https://openalex.org/keywords/computational-intelligence","display_name":"Computational intelligence","score":0.45039573311805725},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4244026839733124},{"id":"https://openalex.org/keywords/interdependent-networks","display_name":"Interdependent networks","score":0.41860640048980713},{"id":"https://openalex.org/keywords/complex-network","display_name":"Complex network","score":0.4160976707935333},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3555111289024353},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3457610309123993},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3359218239784241}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7762335538864136},{"id":"https://openalex.org/C185874996","wikidata":"https://www.wikidata.org/wiki/Q269699","display_name":"Interdependence","level":2,"score":0.6462036371231079},{"id":"https://openalex.org/C47822265","wikidata":"https://www.wikidata.org/wiki/Q854457","display_name":"Complex system","level":2,"score":0.5445948839187622},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.509956955909729},{"id":"https://openalex.org/C79379906","wikidata":"https://www.wikidata.org/wiki/Q3174497","display_name":"Dynamical systems theory","level":2,"score":0.49565255641937256},{"id":"https://openalex.org/C139502532","wikidata":"https://www.wikidata.org/wiki/Q1122090","display_name":"Computational intelligence","level":2,"score":0.45039573311805725},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4244026839733124},{"id":"https://openalex.org/C101142422","wikidata":"https://www.wikidata.org/wiki/Q17101727","display_name":"Interdependent networks","level":3,"score":0.41860640048980713},{"id":"https://openalex.org/C34947359","wikidata":"https://www.wikidata.org/wiki/Q665189","display_name":"Complex network","level":2,"score":0.4160976707935333},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3555111289024353},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3457610309123993},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3359218239784241},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cisda.2009.5356527","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisda.2009.5356527","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W60915298","https://openalex.org/W120264976","https://openalex.org/W216468746","https://openalex.org/W270566990","https://openalex.org/W356952516","https://openalex.org/W1540810403","https://openalex.org/W1564370218","https://openalex.org/W1594282464","https://openalex.org/W1762046889","https://openalex.org/W1959081527","https://openalex.org/W2004308928","https://openalex.org/W2013783032","https://openalex.org/W2016743875","https://openalex.org/W2100317815","https://openalex.org/W2108020239","https://openalex.org/W2147824439","https://openalex.org/W2168035565","https://openalex.org/W2171071863","https://openalex.org/W2246159493","https://openalex.org/W2903359823","https://openalex.org/W2917465056","https://openalex.org/W4237496336","https://openalex.org/W4250243666","https://openalex.org/W4388252848","https://openalex.org/W6602430089","https://openalex.org/W6606729572","https://openalex.org/W6608738932","https://openalex.org/W6609939960","https://openalex.org/W6674959430","https://openalex.org/W6756856778","https://openalex.org/W6832528277","https://openalex.org/W7025498453","https://openalex.org/W7061333489"],"related_works":["https://openalex.org/W1966811395","https://openalex.org/W3105388512","https://openalex.org/W3162545461","https://openalex.org/W203309093","https://openalex.org/W4236757589","https://openalex.org/W3015073397","https://openalex.org/W3081015121","https://openalex.org/W2463781450","https://openalex.org/W1993285489","https://openalex.org/W2011948643"],"abstract_inverted_index":{"This":[0],"paper":[1,29],"attempts":[2],"to":[3,17,49,59,67,89,94,102],"bring":[4],"together":[5],"methods":[6],"and":[7,25,76,101],"tools":[8,54,85],"across":[9],"three":[10],"selected":[11],"areas":[12],"of":[13,34,52],"computational":[14,35],"intelligence":[15],"pertaining":[16],"complex":[18,91],"systems:":[19],"dynamical":[20,68],"networks,":[21],"statistical":[22],"machine":[23],"learning,":[24],"multi-agent":[26],"technologies.":[27],"The":[28,63],"begins":[30],"with":[31],"a":[32],"discussion":[33,47],"challenges":[36],"arising":[37],"from":[38],"growing":[39],"complexity":[40],"in":[41,106],"modern":[42],"operating":[43],"environments.":[44],"Then":[45],"the":[46,71,83],"proceeds":[48],"an":[50],"overview":[51],"intelligent":[53],"that":[55],"can":[56,86],"be":[57,87],"used":[58,88],"address":[60],"these":[61],"challenges.":[62],"emphasis":[64],"is":[65],"given":[66],"networks":[69],"as":[70],"means":[72],"for":[73],"consolidating":[74],"ideas":[75],"approaches.":[77],"An":[78],"illustrative":[79],"example":[80],"shows":[81],"how":[82],"network-based":[84],"model":[90],"socio-technical":[92],"systems,":[93],"identify":[95],"hidden":[96],"interdependencies":[97],"among":[98],"their":[99,104],"components,":[100],"explore":[103],"vulnerabilities":[105],"simulations.":[107]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
