{"@context":["https://w3id.org/fdo/context/v1",{"schema":"https://schema.org/","prov":"http://www.w3.org/ns/prov#","fdo":"https://w3id.org/fdo/vocabulary/"}],"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q5239286","@type":"DigitalObject","kernel":{"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q5239286","digitalObjectType":"https://schema.org/ScholarlyArticle","primaryIdentifier":"mardi:Q5239286","kernelVersion":"v1","immutable":true,"modified":"2025-04-18T20:43:16Z","fdo:hasComponent":[{"@id":"#fulltext","componentId":"fulltext","mediaType":"application/pdf"}]},"profile":{"@context":"https://schema.org","@type":"ScholarlyArticle","@id":"https://portal.mardi4nfdi.de/entity/Q5239286","name":"Vulnerability of weighted networks","headline":"Vulnerability of weighted networks","description":"scientific article; zbMATH DE number 7120221","url":"https://portal.mardi4nfdi.de/entity/Q5239286","datePublished":"2019-10-22","author":[{"@id":"https://portal.mardi4nfdi.de/entity/Q934221"},{"@id":"https://portal.mardi4nfdi.de/entity/Q934222"},{"@id":"https://portal.mardi4nfdi.de/entity/Q1279303"},{"@id":"https://portal.mardi4nfdi.de/entity/Q934223"}],"publisher":[{"@id":"https://portal.mardi4nfdi.de/entity/Q80110"}],"identifier":{"@type":"PropertyValue","propertyID":"doi","value":"10.1088/1742-5468/2006/04/P04006","url":"https://doi.org/10.1088/1742-5468/2006/04/P04006"},"sameAs":["https://doi.org/10.1088/1742-5468/2006/04/P04006"],"citation":[{"@id":"https://portal.mardi4nfdi.de/entity/Q3077100"},{"@id":"https://portal.mardi4nfdi.de/entity/Q4792127"},{"@id":"https://portal.mardi4nfdi.de/entity/Q5350224"},{"@id":"https://portal.mardi4nfdi.de/entity/Q5385861"},{"@id":"https://portal.mardi4nfdi.de/entity/Q4968846"},{"@id":"https://portal.mardi4nfdi.de/entity/Q5289009"},{"@id":"https://portal.mardi4nfdi.de/entity/Q2765440"},{"@id":"https://portal.mardi4nfdi.de/entity/Q78129"}]},"provenance":{"prov:generatedAtTime":"2025-04-18T20:43:16Z","prov:wasAttributedTo":"MaRDI Knowledge Graph"}}