Resilience to Intentional Attacks of Complex Networks

Article Preview

Abstract:

The study of intentional attackshas become an important issue onthe research of complex networks. In this paper, we study the resilience of networks, introducing the parameters that describe the attacks effect and the parameters that measure the priority of intentional attacks. Weestablish analgorithm to analysis the intentional attack phenomenon and present the numerical simulation.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

647-651

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] C. Castellano, S. Fortunato, and V. Loreto, Rev. Mod. Phys. 81, 591 (2009).

Google Scholar

[2] J. A. Dunne, R. J. Williams, and N. D. Martinez, Proc. Natl. Acad. Sci. USA 99, 12917 (2002).

Google Scholar

[3] H. Jeong, B. Tombor,R. Albert, Z. N. Oltvai, and A. -L. Barab´asi, Nature (London) 407, 651 (2000).

Google Scholar

[4] L. N´egyessy, T. Nepusz, L. Kocsis, and F. Bazs´o, Eur. J. Neurosci. 23, 1919 (2006).

Google Scholar

[5] D. J. Watts and S. H. Strogatz, Nature (London) 393, 440(1998).

Google Scholar

[6] A. -L. Baraba´si and R. Albert, Science 286, 509 (1999).

Google Scholar

[7] E. Ravasz, A. L. Somera, D. A. Mongru, Z. N. Oltvai, andA. -L. Baraba´si, Science 297, 1551 (2002).

Google Scholar

[8] M. E. J. Newman, Phys. Rev. Lett. 89, 208701 (2002).

Google Scholar

[9] A. Vázques and Y. Moreno, Phys. Rev. E 67, 015101 (2003).

Google Scholar

[10] Miorandi D, De Pellegrini F. Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), 2010 Proceedings of the 8th International Symposium on. IEEE, 2010: 488-496.

DOI: 10.23919/wiopt47501.2019.9144104

Google Scholar

[11] Diekmann, O., &Heesterbeek, J. A. P. Mathematical Epidemiology of Infectious Diseases: Model Building, Analysis and Interpretation (Wiley Series in Mathematical & Computational Biology, New York, 2000).

Google Scholar

[12] Keeling, M. J. &Rohani, P. Modeling Infectious Diseases in Humans and Animals (PrincetonUniversity Press, 2008).

Google Scholar

[13] Kitsak M, Gallos L K, Havlin S, et al. Identification of influential spreaders in complex networks[J]. Nature Physics, 2010, 6(11): 888-893.

DOI: 10.1038/nphys1746

Google Scholar

[14] R. Albert, A.L. Barab´asi, Science 286 (1999) 509.

Google Scholar