{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:33:59Z","timestamp":1730248439068,"version":"3.28.0"},"reference-count":6,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/icitcs.2014.7021789","type":"proceedings-article","created":{"date-parts":[[2015,1,27]],"date-time":"2015-01-27T10:31:52Z","timestamp":1422354712000},"page":"1-3","source":"Crossref","is-referenced-by-count":0,"title":["Network Stability Based on Node Weight"],"prefix":"10.1109","author":[{"given":"Seunghae","family":"Kim","sequence":"first","affiliation":[]},{"given":"Wonhyuk","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Hyuncheol","family":"Kim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"A Study on the Scheme for Gathering Network Management Information Using Biconnected Component Computation in Internet","year":"2001","author":"ahn","key":"3"},{"key":"2","first-page":"113","article-title":"Importance of network Articulation node of traffic base analysis techniques","author":"kim","year":"2007","journal-title":"Proceedings of the Digital Contents Society"},{"key":"1","article-title":"Technique of analysis of network importance through analysis on the relationship between an Articulation Node and its Adjacent Nodes","volume":"1","author":"kim","year":"2008","journal-title":"GESTS"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-5860-5_16"},{"journal-title":"Design and Implementation of Articulation Node Searching System for the Improvement of Network Weak Point","year":"2011","author":"chung","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88623-5_51"}],"event":{"name":"2014 International Conference on IT Convergence and Security (ICITCS)","start":{"date-parts":[[2014,10,28]]},"location":"Beijing, China","end":{"date-parts":[[2014,10,30]]}},"container-title":["2014 International Conference on IT Convergence and Security (ICITCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7017939\/7021698\/07021789.pdf?arnumber=7021789","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T01:40:33Z","timestamp":1490319633000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7021789\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":6,"URL":"https:\/\/doi.org\/10.1109\/icitcs.2014.7021789","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}