{"id":"https://openalex.org/W4300997055","doi":"https://doi.org/10.3233/978-1-58603-898-4-198","title":"Evolving networks","display_name":"Evolving networks","publication_year":2008,"publication_date":"2008-01-01","ids":{"openalex":"https://openalex.org/W4300997055","doi":"https://doi.org/10.3233/978-1-58603-898-4-198"},"language":"en","primary_location":{"id":"doi:10.3233/978-1-58603-898-4-198","is_oa":false,"landing_page_url":"https://doi.org/10.3233/978-1-58603-898-4-198","pdf_url":null,"source":{"id":"https://openalex.org/S4210202636","display_name":"NATO science for peace and security series. D, Information and communication security","issn_l":"1874-6268","issn":["1874-6268","1879-8292"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"NATO Science for Peace and Security Series - D: Information and Communication Security","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042411664","display_name":"Pierre Borgnat","orcid":"https://orcid.org/0000-0003-4536-8354"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Borgnat Pierre","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101647300","display_name":"\u00c9ric Fleury","orcid":"https://orcid.org/0000-0003-2725-2606"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fleury Eric","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046943453","display_name":"Jean\u2010Loup Guillaume","orcid":"https://orcid.org/0000-0002-4615-1563"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Guillaume Jean-Loup","raw_affiliation_strings":["ComplexNetworks (France)"],"affiliations":[{"raw_affiliation_string":"ComplexNetworks (France)","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032061401","display_name":"Cl\u00e9mence Magnien","orcid":"https://orcid.org/0000-0003-0320-4378"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Magnien Cl&eacute;mence","raw_affiliation_strings":["ComplexNetworks (France)"],"affiliations":[{"raw_affiliation_string":"ComplexNetworks (France)","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048794271","display_name":"C\u00e9line Robardet","orcid":"https://orcid.org/0000-0002-8583-9408"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Robardet C&eacute;line","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5109836544","display_name":"Antoine Scherrer","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Scherrer Antoine","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5042411664"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.53330468,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.5486000180244446,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.5486000180244446,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.258899986743927,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11980","display_name":"Human Mobility and Location-Based Analysis","score":0.030899999663233757,"subfield":{"id":"https://openalex.org/subfields/3313","display_name":"Transportation"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.41858574748039246}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.41858574748039246}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3233/978-1-58603-898-4-198","is_oa":false,"landing_page_url":"https://doi.org/10.3233/978-1-58603-898-4-198","pdf_url":null,"source":{"id":"https://openalex.org/S4210202636","display_name":"NATO science for peace and security series. D, Information and communication security","issn_l":"1874-6268","issn":["1874-6268","1879-8292"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"NATO Science for Peace and Security Series - D: Information and Communication Security","raw_type":"book-chapter"},{"id":"pmh:oai:HAL:hal-01301647v1","is_oa":false,"landing_page_url":"https://hal.science/hal-01301647","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Mining Massive Data Sets for Security, 19, IOS Press, pp.198-203, 2008, 978-1-58603-898-4. &#x27E8;10.3233/978-1-58603-898-4-198&#x27E9;","raw_type":"Book sections"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Most":[0],"real":[1],"networks":[2,53,122],"often":[3],"evolve":[4],"through":[5,123,155],"time:":[6],"changes":[7],"of":[8,25,51,91,104,117,120,128,133,148,153],"topology":[9,35],"can":[10,29,67],"occur":[11,69],"if":[12,33,70],"some":[13,111,129],"nodes":[14,26,55],"and/or":[15,18],"edges":[16,28],"appear":[17],"disappear,":[19],"and":[20,27,63,84,100,141],"the":[21,34,61,89,98,102,105,115,118,134,138,146],"types":[22],"or":[23,56,151],"weights":[24],"also":[30],"change":[31],"even":[32],"stays":[36],"static.":[37],"Mobile":[38],"devices":[39],"with":[40],"wireless":[41],"capabilities":[42],"(mobile":[43],"phones,":[44],"laptops,":[45],"etc.)":[46],"are":[47,58,72],"a":[48],"typical":[49],"example":[50],"evolving":[52],"where":[54],"users":[57,66,82,152],"spread":[59,90],"in":[60,145],"environment":[62],"connections":[64],"between":[65],"only":[68],"they":[71],"near":[73],"each":[74],"other.":[75],"This":[76,108],"who-is-near-whom":[77],"network":[78],"evolves":[79],"every":[80],"time":[81],"move":[83],"communication":[85],"services":[86],"(such":[87],"as":[88],"any":[92],"information)":[93],"will":[94],"deeply":[95],"rely":[96],"on":[97,101,131],"mobility":[99],"characteristics":[103],"underlying":[106],"network.":[107],"paper":[109],"presents":[110],"recent":[112],"results":[113],"concerning":[114],"characterization":[116],"dynamics":[119],"complex":[121],"three":[124],"different":[125],"angles:":[126],"evolution":[127,139],"parameters":[130,136],"snapshots":[132],"network,":[135],"describing":[137],"itself,":[140],"intermediate":[142],"approaches":[143],"consisting":[144],"study":[147],"specific":[149],"phenomena":[150],"interest":[154],"time.":[156]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2022-10-04T00:00:00"}
