{"id":"https://openalex.org/W2149187525","doi":"https://doi.org/10.1109/milcom.2012.6415860","title":"An efficient spectral bound for link vulnerability assessment in large-scale networks","display_name":"An efficient spectral bound for link vulnerability assessment in large-scale networks","publication_year":2012,"publication_date":"2012-10-01","ids":{"openalex":"https://openalex.org/W2149187525","doi":"https://doi.org/10.1109/milcom.2012.6415860","mag":"2149187525"},"language":"en","primary_location":{"id":"doi:10.1109/milcom.2012.6415860","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2012.6415860","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010321059","display_name":"Thang N. Dinh","orcid":"https://orcid.org/0000-0003-4847-8356"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Thang N. Dinh","raw_affiliation_strings":["Dept. of Comp. & Info. Sci. & Eng., University of Florida, Gainesville, FL, US"],"affiliations":[{"raw_affiliation_string":"Dept. of Comp. & Info. Sci. & Eng., University of Florida, Gainesville, FL, US","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058974318","display_name":"Yilin Shen","orcid":"https://orcid.org/0000-0002-1955-1529"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yilin Shen","raw_affiliation_strings":["Dept. of Comp. & Info. Sci. & Eng., University of Florida, Gainesville, FL, US"],"affiliations":[{"raw_affiliation_string":"Dept. of Comp. & Info. Sci. & Eng., University of Florida, Gainesville, FL, US","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005663679","display_name":"My T. Thai","orcid":"https://orcid.org/0000-0003-0503-2012"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"My T. Thai","raw_affiliation_strings":["Dept. of Comp. & Info. Sci. & Eng., University of Florida, Gainesville, FL, US"],"affiliations":[{"raw_affiliation_string":"Dept. of Comp. & Info. Sci. & Eng., University of Florida, Gainesville, FL, US","institution_ids":["https://openalex.org/I33213144"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5010321059"],"corresponding_institution_ids":["https://openalex.org/I33213144"],"apc_list":null,"apc_paid":null,"fwci":0.2425,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.57932127,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11476","display_name":"Graph theory and applications","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/2608","display_name":"Geometry and Topology"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7310073971748352},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6851050853729248},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.6620707511901855},{"id":"https://openalex.org/keywords/laplacian-matrix","display_name":"Laplacian matrix","score":0.6451356410980225},{"id":"https://openalex.org/keywords/pairwise-comparison","display_name":"Pairwise comparison","score":0.5974159240722656},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5091719031333923},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.46743884682655334},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.4557774066925049},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.435815691947937},{"id":"https://openalex.org/keywords/eigenvalues-and-eigenvectors","display_name":"Eigenvalues and eigenvectors","score":0.4294029772281647},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4134625792503357},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3581158518791199},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27396464347839355},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.258533775806427},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2116963267326355},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13698720932006836}],"concepts":[{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7310073971748352},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6851050853729248},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.6620707511901855},{"id":"https://openalex.org/C115178988","wikidata":"https://www.wikidata.org/wiki/Q772067","display_name":"Laplacian matrix","level":3,"score":0.6451356410980225},{"id":"https://openalex.org/C184898388","wikidata":"https://www.wikidata.org/wiki/Q1435712","display_name":"Pairwise comparison","level":2,"score":0.5974159240722656},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5091719031333923},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.46743884682655334},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.4557774066925049},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.435815691947937},{"id":"https://openalex.org/C158693339","wikidata":"https://www.wikidata.org/wiki/Q190524","display_name":"Eigenvalues and eigenvectors","level":2,"score":0.4294029772281647},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4134625792503357},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3581158518791199},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27396464347839355},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.258533775806427},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2116963267326355},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13698720932006836},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom.2012.6415860","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2012.6415860","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6399999856948853,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1207633162","https://openalex.org/W1993771871","https://openalex.org/W2010769455","https://openalex.org/W2023743599","https://openalex.org/W2033852356","https://openalex.org/W2072919599","https://openalex.org/W2083660497","https://openalex.org/W2111708605","https://openalex.org/W2112090702","https://openalex.org/W2117495845","https://openalex.org/W2121035174","https://openalex.org/W2123785786","https://openalex.org/W2162621299","https://openalex.org/W2572321817","https://openalex.org/W3143219376","https://openalex.org/W4231150350","https://openalex.org/W4241669766","https://openalex.org/W4250589301","https://openalex.org/W4251670979","https://openalex.org/W6793127252"],"related_works":["https://openalex.org/W4394650907","https://openalex.org/W154364797","https://openalex.org/W4254119641","https://openalex.org/W3196207352","https://openalex.org/W2951724202","https://openalex.org/W3084261076","https://openalex.org/W2487162673","https://openalex.org/W2793211469","https://openalex.org/W2576399385","https://openalex.org/W2949152769"],"abstract_inverted_index":{"Simultaneous":[0],"attacks":[1,119],"can":[2],"cause":[3],"devastating":[4],"damage,":[5],"breaking":[6],"down":[7],"communication":[8,115],"networks":[9,116],"into":[10],"small":[11],"fragments.":[12],"To":[13],"mitigate":[14],"the":[15,26,31,43,63,68,72,77,84,87,106,109],"risk":[16],"and":[17],"develop":[18],"proactive":[19],"responses,":[20],"it":[21],"is":[22],"essential":[23],"to":[24,48,80],"assess":[25],"robustness":[27,85],"of":[28,45,53,57,74,76,86,112],"network":[29,69,88],"in":[30,55,67,98],"worst-case":[32],"scenarios.":[33],"In":[34],"this":[35],"paper,":[36],"we":[37],"propose":[38],"a":[39,50],"spectral":[40],"lower-bound":[41,61],"on":[42,83],"number":[44],"removed":[46],"links":[47],"incur":[49],"certain":[51],"level":[52],"disruption":[54],"terms":[56],"pairwise":[58],"connectivity.":[59],"Our":[60],"explores":[62],"latent":[64],"structural":[65],"information":[66],"Laplacian":[70,78],"spectrum,":[71],"set":[73],"eigenvalues":[75],"matrix,":[79],"provide":[81],"guarantees":[82,93],"against":[89,117],"intentional":[90],"attacks.":[91],"Such":[92],"often":[94],"cannot":[95],"be":[96],"found":[97],"heuristic":[99],"methods":[100],"for":[101],"identifying":[102],"critical":[103],"infrastructures.":[104],"For":[105],"first":[107],"time,":[108],"attack-resistant":[110],"proofs":[111],"large":[113],"scale":[114],"link":[118],"are":[120],"presented.":[121]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
