Cascade-based attack vulnerability in complex networks

被引:0
|
作者
Xie, Feng [1 ]
Cheng, Suqi [2 ,3 ]
Chen, Dongqing [1 ]
Zhang, Guoqiang [2 ]
机构
[1] China Information Technology Security Evaluation Center, Beijing 100085, China
[2] Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China
[3] Graduate University of the Chinese Academy of Sciences, Beijing 100190, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
17
引用
下载
收藏
页码:1252 / 1257
相关论文
共 50 条
  • [1] Cascade-based attack vulnerability on the US power grid
    Wang, Jian-Wei
    Rong, Li-Li
    SAFETY SCIENCE, 2009, 47 (10) : 1332 - 1336
  • [2] Cascade-based attacks on complex networks
    Motter, AE
    Lai, YC
    PHYSICAL REVIEW E, 2002, 66 (06) : 4
  • [3] Vulnerability assessment in social networks under cascade-based node departures
    Malliaros, Fragkiskos D.
    Vazirgiannis, Michalis
    EPL, 2015, 110 (06)
  • [4] Attack vulnerability of complex networks
    Holme, Petter
    Kim, Beom Jun
    Yoon, Chang No
    Han, Seung Kee
    Physical Review E - Statistical, Nonlinear, and Soft Matter Physics, 2002, 65 (05): : 1 - 056109
  • [5] Attack vulnerability of complex networks
    Holme, P
    Kim, BJ
    Yoon, CN
    Han, SK
    PHYSICAL REVIEW E, 2002, 65 (05)
  • [6] Attack vulnerability of complex networks based on local information
    Wu, Jun
    Deng, Hong-Zhong
    Tan, Yue-Jin
    Li, Yong
    Zhu, Da-Zhi
    MODERN PHYSICS LETTERS B, 2007, 21 (16): : 1007 - 1014
  • [7] Attack vulnerability of complex communication networks
    Xia, Yongxiang
    Hill, David J.
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2008, 55 (01) : 65 - 69
  • [8] Smart Grid Vulnerability under Cascade-based Sequential Line-Switching Attacks
    Yan, Jun
    Tang, Yufei
    Zhu, Yihai
    He, Haibo
    Sun, Yan
    2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [9] Cascade-based Echo Chamber Detection
    Minici, Marco
    Cinus, Federico
    Monti, Corrado
    Bonchi, Francesco
    Manco, Giuseppe
    PROCEEDINGS OF THE 31ST ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2022, 2022, : 1511 - 1520
  • [10] Influence maximization in social networks under an independent cascade-based model
    Wang, Qiyao
    Jin, Yuehui
    Lin, Zhen
    Cheng, Shiduan
    Yang, Tan
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2016, 444 : 20 - 34