Attack vulnerability of complex networks

被引:480
|
作者
Holme, Petter [1 ]
Kim, Beom Jun [1 ,3 ]
Yoon, Chang No [2 ]
Han, Seung Kee [2 ]
机构
[1] Department of Theoretical Physics, Umeå University, 901 87 Umeå, Sweden
[2] Department of Physics, Chungbuk National University, Cheongju, Chungbuk 361-763, Korea, Republic of
[3] Dept. of Molec. Sci. and Technology, Ajou University, Suwon 442-749, Korea, Republic of
关键词
D O I
10.1103/PhysRevE.65.056109
中图分类号
学科分类号
摘要
64
引用
收藏
页码:1 / 056109
相关论文
共 50 条
  • [1] Attack vulnerability of complex networks
    Holme, P
    Kim, BJ
    Yoon, CN
    Han, SK
    [J]. PHYSICAL REVIEW E, 2002, 65 (05)
  • [2] Attack vulnerability of complex communication networks
    Xia, Yongxiang
    Hill, David J.
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2008, 55 (01) : 65 - 69
  • [3] Attack vulnerability of complex networks with different initial failure
    Liu Yunyuan
    [J]. PROCEEDINGS OF THE 35TH CHINESE CONTROL CONFERENCE 2016, 2016, : 1292 - 1295
  • [4] Cascade-based attack vulnerability in complex networks
    Xie, Feng
    Cheng, Suqi
    Chen, Dongqing
    Zhang, Guoqiang
    [J]. Qinghua Daxue Xuebao/Journal of Tsinghua University, 2011, 51 (10): : 1252 - 1257
  • [5] Attack vulnerability of complex networks based on local information
    Wu, Jun
    Deng, Hong-Zhong
    Tan, Yue-Jin
    Li, Yong
    Zhu, Da-Zhi
    [J]. MODERN PHYSICS LETTERS B, 2007, 21 (16): : 1007 - 1014
  • [6] Vulnerability of complex networks under intentional attack with incomplete information
    Wu, J.
    Deng, H. Z.
    Tan, Y. J.
    Zhu, D. Z.
    [J]. JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2007, 40 (11) : 2665 - 2671
  • [7] Application of modal analysis in assessing attack vulnerability of complex networks
    Petreska, Irina
    Tomovski, Igor
    Gutierrez, Eugenio
    Kocarev, Ljupco
    Bono, Flavio
    Poljansek, Karmen
    [J]. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2010, 15 (04) : 1008 - 1018
  • [8] Vulnerability of Complex Networks under Approximate Longest Chain Attack Strategies
    Hao, Yao-Hui
    Song, Jia-Liang
    Lin, Yi
    Han, Ji-Hong
    [J]. 3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA 2016), 2016, 7
  • [9] Attack structural vulnerability of power grids: A hybrid approach based on complex networks
    Chen, Guo
    Dong, Zhao Yang
    Hill, David J.
    Zhang, Guo Hua
    Hua, Ke Qian
    [J]. PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2010, 389 (03) : 595 - 603
  • [10] Vulnerability Analysis for Complex Networks under the Shortest Path-Attack Strategies
    Hao, Yaohui
    Han, Jihong
    Cheng, Qinghua
    Hu, Yongjin
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY, 2016, 47 : 138 - 141