{"id":"https://openalex.org/W2098573686","doi":"https://doi.org/10.1109/mcom.2008.4427244","title":"Tolerance of intentional attacks in complex communication networks","display_name":"Tolerance of intentional attacks in complex communication networks","publication_year":2008,"publication_date":"2008-01-01","ids":{"openalex":"https://openalex.org/W2098573686","doi":"https://doi.org/10.1109/mcom.2008.4427244","mag":"2098573686"},"language":"en","primary_location":{"id":"doi:10.1109/mcom.2008.4427244","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mcom.2008.4427244","pdf_url":null,"source":{"id":"https://openalex.org/S158797327","display_name":"IEEE Communications Magazine","issn_l":"0163-6804","issn":["0163-6804","1558-1896"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Magazine","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102124811","display_name":"Shi Xiao","orcid":null},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Shi Xiao","raw_affiliation_strings":["Nanyang Technological University, Singapore","Nanyang Technol Univ, Singapore#TAB#"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"Nanyang Technol Univ, Singapore#TAB#","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005659262","display_name":"Gaoxi Xiao","orcid":"https://orcid.org/0000-0002-4171-6799"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Gaoxi Xiao","raw_affiliation_strings":["Nanyang Technological University, Singapore","Nanyang Technol Univ, Singapore#TAB#"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"Nanyang Technol Univ, Singapore#TAB#","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111907478","display_name":"Tee Hiang Cheng","orcid":null},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Tee Hiang Cheng","raw_affiliation_strings":["Nanyang Technological University, Singapore","Nanyang Technol Univ, Singapore#TAB#"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"Nanyang Technol Univ, Singapore#TAB#","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102124811"],"corresponding_institution_ids":["https://openalex.org/I172675005"],"apc_list":null,"apc_paid":null,"fwci":4.4927,"has_fulltext":false,"cited_by_count":45,"citation_normalized_percentile":{"value":0.94854181,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"46","issue":"1","first_page":"146","last_page":"152"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12592","display_name":"Opinion Dynamics and Social Influence","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9704999923706055,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8465373516082764},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.6789879202842712},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.621173620223999},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5729946494102478},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5467270612716675},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5214166641235352},{"id":"https://openalex.org/keywords/crash","display_name":"Crash","score":0.506669819355011},{"id":"https://openalex.org/keywords/telecommunications-network","display_name":"Telecommunications network","score":0.4810921847820282},{"id":"https://openalex.org/keywords/global-network","display_name":"Global network","score":0.43467220664024353},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.38144052028656006},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.11776775121688843}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8465373516082764},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.6789879202842712},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.621173620223999},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5729946494102478},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5467270612716675},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5214166641235352},{"id":"https://openalex.org/C183469790","wikidata":"https://www.wikidata.org/wiki/Q333501","display_name":"Crash","level":2,"score":0.506669819355011},{"id":"https://openalex.org/C192126672","wikidata":"https://www.wikidata.org/wiki/Q1068715","display_name":"Telecommunications network","level":2,"score":0.4810921847820282},{"id":"https://openalex.org/C123138037","wikidata":"https://www.wikidata.org/wiki/Q5570871","display_name":"Global network","level":2,"score":0.43467220664024353},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.38144052028656006},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11776775121688843},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mcom.2008.4427244","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mcom.2008.4427244","pdf_url":null,"source":{"id":"https://openalex.org/S158797327","display_name":"IEEE Communications Magazine","issn_l":"0163-6804","issn":["0163-6804","1558-1896"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Magazine","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7599999904632568,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1592356192","https://openalex.org/W1976969221","https://openalex.org/W2025550035","https://openalex.org/W2045239101","https://openalex.org/W2049786063","https://openalex.org/W2064497247","https://openalex.org/W2065769502","https://openalex.org/W2077192047","https://openalex.org/W2095252478","https://openalex.org/W2120511087","https://openalex.org/W2950172483","https://openalex.org/W3103071483","https://openalex.org/W4285719527","https://openalex.org/W4295805915"],"related_works":["https://openalex.org/W2026516036","https://openalex.org/W626940945","https://openalex.org/W2040826996","https://openalex.org/W375763875","https://openalex.org/W2111579573","https://openalex.org/W120748129","https://openalex.org/W2061344455","https://openalex.org/W2744235150","https://openalex.org/W796478898","https://openalex.org/W2029117867"],"abstract_inverted_index":{"Motivated":[0],"by":[1,26],"recent":[2],"developments":[3],"in":[4,52,83,111],"the":[5,12,24,60,129],"theory":[6],"of":[7,14,38,71,132],"complex":[8],"networks,":[9,57],"we":[10,42],"examine":[11],"tolerance":[13],"communication":[15,56,84],"networks":[16,85],"for":[17,65,128],"intentional":[18,77,109],"attacks":[19,78,82,110,117],"that":[20,47,100],"aim":[21],"to":[22,33,67,90],"crash":[23],"network":[25,29,137],"taking":[27],"down":[28],"hubs.":[30],"In":[31],"addition":[32],"providing":[34],"a":[35,105],"brief":[36],"survey":[37],"key":[39],"existing":[40],"results,":[41],"investigate":[43],"two":[44],"different":[45,106,112],"effects":[46],"largely":[48],"have":[49,68],"been":[50],"ignored":[51],"past":[53],"studies.":[54],"Many":[55],"such":[58],"as":[59],"Internet,":[61],"are":[62],"too":[63],"large":[64],"anyone":[66],"global":[69,102],"information":[70,96,103],"their":[72],"topologies,":[73],"which":[74],"makes":[75],"accurate,":[76],"virtually":[79],"impossible;":[80],"most":[81],"must":[86],"propagate":[87],"from":[88],"nodes":[89],"adjacent":[91],"nodes,":[92],"utilizing":[93],"local-network":[94],"topology":[95],"only.":[97],"We":[98],"show":[99],"incomplete":[101],"has":[104],"impact":[107],"on":[108],"circumstances,":[113],"and":[114],"local":[115],"information-based":[116],"can":[118],"actually":[119],"be":[120,126],"highly":[121],"efficient.":[122],"Such":[123],"insights":[124],"will":[125],"helpful":[127],"future":[130],"development":[131],"efficient":[133],"protection":[134],"schemes":[135],"against":[136],"attacks.":[138]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
