{"id":"https://openalex.org/W4393950368","doi":"https://doi.org/10.3390/e26040315","title":"Research on a Critical Link Discovery Method for Network Security Situational Awareness","display_name":"Research on a Critical Link Discovery Method for Network Security Situational Awareness","publication_year":2024,"publication_date":"2024-04-04","ids":{"openalex":"https://openalex.org/W4393950368","doi":"https://doi.org/10.3390/e26040315","pmid":"https://pubmed.ncbi.nlm.nih.gov/38667869"},"language":"en","primary_location":{"id":"doi:10.3390/e26040315","is_oa":true,"landing_page_url":"https://doi.org/10.3390/e26040315","pdf_url":"https://www.mdpi.com/1099-4300/26/4/315/pdf?version=1712235055","source":{"id":"https://openalex.org/S195231649","display_name":"Entropy","issn_l":"1099-4300","issn":["1099-4300"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Entropy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj","pubmed"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1099-4300/26/4/315/pdf?version=1712235055","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055940452","display_name":"Guozheng Yang","orcid":"https://orcid.org/0000-0001-7025-926X"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]},{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guozheng Yang","raw_affiliation_strings":["Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Hefei 230037, China","College of Electronic Engineering, National University of Defense Technology, Hefei 230037, China"],"affiliations":[{"raw_affiliation_string":"Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Hefei 230037, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"College of Electronic Engineering, National University of Defense Technology, Hefei 230037, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027130848","display_name":"Yongheng Zhang","orcid":"https://orcid.org/0000-0002-8787-4995"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]},{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongheng Zhang","raw_affiliation_strings":["Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Hefei 230037, China","College of Electronic Engineering, National University of Defense Technology, Hefei 230037, China"],"affiliations":[{"raw_affiliation_string":"Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Hefei 230037, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"College of Electronic Engineering, National University of Defense Technology, Hefei 230037, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089358541","display_name":"Yuliang Lu","orcid":"https://orcid.org/0000-0002-8502-9907"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]},{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuliang Lu","raw_affiliation_strings":["Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Hefei 230037, China","College of Electronic Engineering, National University of Defense Technology, Hefei 230037, China"],"affiliations":[{"raw_affiliation_string":"Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Hefei 230037, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"College of Electronic Engineering, National University of Defense Technology, Hefei 230037, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100850817","display_name":"Yi Xie","orcid":"https://orcid.org/0009-0003-3485-6843"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]},{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Xie","raw_affiliation_strings":["Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Hefei 230037, China","College of Electronic Engineering, National University of Defense Technology, Hefei 230037, China"],"affiliations":[{"raw_affiliation_string":"Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Hefei 230037, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"College of Electronic Engineering, National University of Defense Technology, Hefei 230037, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101872220","display_name":"Jiayi Yu","orcid":"https://orcid.org/0000-0002-4204-172X"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]},{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiayi Yu","raw_affiliation_strings":["Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Hefei 230037, China","College of Electronic Engineering, National University of Defense Technology, Hefei 230037, China"],"affiliations":[{"raw_affiliation_string":"Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Hefei 230037, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"College of Electronic Engineering, National University of Defense Technology, Hefei 230037, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5055940452"],"corresponding_institution_ids":["https://openalex.org/I143868143","https://openalex.org/I170215575"],"apc_list":{"value":2000,"currency":"CHF","value_usd":2165},"apc_paid":{"value":2000,"currency":"CHF","value_usd":2165},"fwci":0.5903,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.6217341,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"26","issue":"4","first_page":"315","last_page":"315"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9804999828338623,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9674000144004822,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7514540553092957},{"id":"https://openalex.org/keywords/link-layer","display_name":"Link layer","score":0.6193815469741821},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5976429581642151},{"id":"https://openalex.org/keywords/data-link-layer","display_name":"Data link layer","score":0.5268094539642334},{"id":"https://openalex.org/keywords/centrality","display_name":"Centrality","score":0.5255595445632935},{"id":"https://openalex.org/keywords/betweenness-centrality","display_name":"Betweenness centrality","score":0.5224196910858154},{"id":"https://openalex.org/keywords/situation-awareness","display_name":"Situation awareness","score":0.4760605990886688},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.4588206112384796},{"id":"https://openalex.org/keywords/network-simulation","display_name":"Network simulation","score":0.4418124854564667},{"id":"https://openalex.org/keywords/complex-network","display_name":"Complex network","score":0.427223801612854},{"id":"https://openalex.org/keywords/network-formation","display_name":"Network formation","score":0.41658106446266174},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4070049226284027},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.39195606112480164},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3722798824310303},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.2132115662097931},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10149234533309937},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.0847080647945404}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7514540553092957},{"id":"https://openalex.org/C12570599","wikidata":"https://www.wikidata.org/wiki/Q2891044","display_name":"Link layer","level":3,"score":0.6193815469741821},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5976429581642151},{"id":"https://openalex.org/C192835768","wikidata":"https://www.wikidata.org/wiki/Q194134","display_name":"Data link layer","level":4,"score":0.5268094539642334},{"id":"https://openalex.org/C53811970","wikidata":"https://www.wikidata.org/wiki/Q5062194","display_name":"Centrality","level":2,"score":0.5255595445632935},{"id":"https://openalex.org/C117045392","wikidata":"https://www.wikidata.org/wiki/Q4899215","display_name":"Betweenness centrality","level":3,"score":0.5224196910858154},{"id":"https://openalex.org/C145804949","wikidata":"https://www.wikidata.org/wiki/Q478123","display_name":"Situation awareness","level":2,"score":0.4760605990886688},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.4588206112384796},{"id":"https://openalex.org/C139940560","wikidata":"https://www.wikidata.org/wiki/Q290036","display_name":"Network simulation","level":2,"score":0.4418124854564667},{"id":"https://openalex.org/C34947359","wikidata":"https://www.wikidata.org/wiki/Q665189","display_name":"Complex network","level":2,"score":0.427223801612854},{"id":"https://openalex.org/C68416499","wikidata":"https://www.wikidata.org/wiki/Q7001033","display_name":"Network formation","level":2,"score":0.41658106446266174},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4070049226284027},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.39195606112480164},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3722798824310303},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.2132115662097931},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10149234533309937},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0847080647945404},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.3390/e26040315","is_oa":true,"landing_page_url":"https://doi.org/10.3390/e26040315","pdf_url":"https://www.mdpi.com/1099-4300/26/4/315/pdf?version=1712235055","source":{"id":"https://openalex.org/S195231649","display_name":"Entropy","issn_l":"1099-4300","issn":["1099-4300"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Entropy","raw_type":"journal-article"},{"id":"pmid:38667869","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/38667869","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Entropy (Basel, Switzerland)","raw_type":null},{"id":"pmh:oai:pubmedcentral.nih.gov:11049312","is_oa":true,"landing_page_url":"https://www.ncbi.nlm.nih.gov/pmc/articles/11049312","pdf_url":null,"source":{"id":"https://openalex.org/S2764455111","display_name":"PubMed Central","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Entropy (Basel)","raw_type":"Text"},{"id":"pmh:oai:doaj.org/article:0d5f135cb6aa4a0589a6d01434401ada","is_oa":true,"landing_page_url":"https://doaj.org/article/0d5f135cb6aa4a0589a6d01434401ada","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Entropy, Vol 26, Iss 4, p 315 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/e26040315","is_oa":true,"landing_page_url":"https://doi.org/10.3390/e26040315","pdf_url":"https://www.mdpi.com/1099-4300/26/4/315/pdf?version=1712235055","source":{"id":"https://openalex.org/S195231649","display_name":"Entropy","issn_l":"1099-4300","issn":["1099-4300"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Entropy","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4393950368.pdf"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W950821216","https://openalex.org/W1967570846","https://openalex.org/W1968164782","https://openalex.org/W1971421925","https://openalex.org/W1987594730","https://openalex.org/W2030701825","https://openalex.org/W2040763707","https://openalex.org/W2056944867","https://openalex.org/W2141113219","https://openalex.org/W2254509396","https://openalex.org/W2351830081","https://openalex.org/W2357802327","https://openalex.org/W2527791531","https://openalex.org/W2561364081","https://openalex.org/W2599320555","https://openalex.org/W2808460186","https://openalex.org/W2888477466","https://openalex.org/W3001565831","https://openalex.org/W3037819556","https://openalex.org/W3037826211","https://openalex.org/W3109703084","https://openalex.org/W3156407744","https://openalex.org/W3159825762","https://openalex.org/W3200698442","https://openalex.org/W3211888892","https://openalex.org/W4234989302","https://openalex.org/W4283816390","https://openalex.org/W4292247981","https://openalex.org/W4304123820","https://openalex.org/W4309374740","https://openalex.org/W4366994646","https://openalex.org/W4367050030","https://openalex.org/W4376651525","https://openalex.org/W6706527166","https://openalex.org/W6845644172"],"related_works":["https://openalex.org/W2406352538","https://openalex.org/W2126320577","https://openalex.org/W4249987491","https://openalex.org/W41342988","https://openalex.org/W2491062776","https://openalex.org/W2288289463","https://openalex.org/W2374193949","https://openalex.org/W2259042830","https://openalex.org/W2372799376","https://openalex.org/W2353267727"],"abstract_inverted_index":{"Network":[0],"security":[1,11,21,56,70],"situational":[2,71],"awareness":[3],"(NSSA)":[4],"aims":[5],"to":[6,19,149,184,192],"capture,":[7],"understand,":[8],"and":[9,37,90,136,175],"display":[10],"elements":[12],"in":[13,17,23,156,180],"large-scale":[14],"network":[15,26,45,55,66,69,79,96,107,158,201],"environments":[16],"order":[18],"predict":[20],"trends":[22],"the":[24,29,42,52,77,112,118,121,125,132,140,146,152,165,193],"relevant":[25],"environment.":[27],"With":[28],"internet's":[30],"increasingly":[31,34],"large":[32],"scale,":[33],"complex":[35],"structure,":[36],"gradual":[38],"diversification":[39],"of":[40,54,81,128,198],"components,":[41],"traditional":[43],"single-layer":[44],"topology":[46],"model":[47,67],"can":[48],"no":[49],"longer":[50],"meet":[51],"needs":[53],"analysis.":[57],"Therefore,":[58],"we":[59,103],"conduct":[60],"research":[61],"based":[62],"on":[63,145],"a":[64,82,86,91,105,176,199],"multi-layer":[65,106,200],"for":[68],"awareness,":[72],"which":[73],"is":[74],"characterized":[75],"by":[76,130],"three-layer":[78],"structure":[80],"physical":[83],"device":[84],"network,":[85,89],"business":[87],"application":[88],"user":[92],"role":[93],"network.":[94],"Its":[95],"characteristics":[97],"require":[98],"new":[99],"assessment":[100,110],"methods,":[101],"so":[102],"propose":[104],"link":[108,114,153,173,186,195],"importance":[109,127,154,187],"metric:":[111],"multi-layer-dependent":[113],"entropy":[115],"(MDLE).":[116],"On":[117,139],"one":[119],"hand,":[120,142],"MDLE":[122,166],"comprehensively":[123],"evaluates":[124],"connectivity":[126],"links":[129],"fitting":[131],"link-local":[133],"betweenness":[134],"centrality":[135],"mapping":[137],"entropy.":[138],"other":[141],"it":[143],"relies":[144],"link-dependent":[147],"mechanism":[148],"better":[150,168,190],"aggregate":[151],"contributions":[155],"each":[157],"layer.":[159],"The":[160],"experimental":[161],"results":[162],"show":[163],"that":[164],"has":[167],"ordering":[169],"monotonicity":[170],"during":[171],"critical":[172,194],"discovery":[174,196],"higher":[177],"destruction":[178,181],"efficacy":[179],"simulations":[182],"compared":[183],"classical":[185],"metrics,":[188],"thus":[189],"adapting":[191],"requirements":[197],"topology.":[202]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
