{"@context":["https://w3id.org/fdo/context/v1",{"schema":"https://schema.org/","prov":"http://www.w3.org/ns/prov#","fdo":"https://w3id.org/fdo/vocabulary/"}],"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q3078624","@type":"DigitalObject","kernel":{"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q3078624","digitalObjectType":"https://schema.org/ScholarlyArticle","primaryIdentifier":"mardi:Q3078624","kernelVersion":"v1","immutable":true,"modified":"2026-01-17T04:48:00Z"},"profile":{"@context":"https://schema.org","@type":"ScholarlyArticle","@id":"https://portal.mardi4nfdi.de/entity/Q3078624","name":"On imperfect node protection in complex communication networks","headline":"On imperfect node protection in complex communication networks","description":"scientific article; zbMATH DE number 5858811","url":"https://portal.mardi4nfdi.de/entity/Q3078624","datePublished":"2011-03-01","author":[{"@id":"https://portal.mardi4nfdi.de/entity/Q1976529"},{"@id":"https://portal.mardi4nfdi.de/entity/Q420314"}],"publisher":[{"@id":"https://portal.mardi4nfdi.de/entity/Q2812522"}],"identifier":{"@type":"PropertyValue","propertyID":"doi","value":"10.1088/1751-8113/44/5/055101","url":"https://doi.org/10.1088/1751-8113/44/5/055101"},"sameAs":["https://doi.org/10.1088/1751-8113/44/5/055101"]},"provenance":{"prov:generatedAtTime":"2026-01-17T04:48:00Z","prov:wasAttributedTo":"MaRDI Knowledge Graph"}}