2014
DOI: 10.1007/s13278-014-0213-5
|View full text |Cite
|
Sign up to set email alerts
|

Influence of vaccination strategies and topology on the herd immunity of complex networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
6
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 29 publications
1
6
0
Order By: Relevance
“…As clear from the exponential dependence on the k min and β , targeted vaccination strategy based on degree centrality provides a very efficient way to control epidemic spreading. Similar conclusions can be drawn by applying other centrality measures, such as betweenness and k-core centrality, or memberships, for the selection of immunized nodes [9,57,58,59,60,61].…”
Section: Introductionsupporting
confidence: 64%
“…As clear from the exponential dependence on the k min and β , targeted vaccination strategy based on degree centrality provides a very efficient way to control epidemic spreading. Similar conclusions can be drawn by applying other centrality measures, such as betweenness and k-core centrality, or memberships, for the selection of immunized nodes [9,57,58,59,60,61].…”
Section: Introductionsupporting
confidence: 64%
“…Some of these approaches to vaccine deployment have previously been tested against one-another (Salathé and Jones, 2010; Thedchanamoorthy et al, 2014; Ventresca and Aleman, 2013). However, there is limited systematic evidence comparing a range of different intervention approaches requiring different levels of resource input, particularly using real-world or real-world-like (i.e.…”
Section: Introductionmentioning
confidence: 99%
“…a lattice) as is sometimes the case in the literature 15 16 17 . Some real world examples of such networks could be social networks, both online and offline 16 17 18 , contact networks in epidemiological studies where any individual can come into contact with any other individual 19 20 21 22 , or the World Wide Web (WWW) where any website could link to any other website 6 16 , to name a few. In fact, most real world social, biological, and technical networks studied in the literature will fall into this category, where link formation is not constrained by node type 6 16 .…”
mentioning
confidence: 99%