Cascade-based attack vulnerability in complex networks

被引:0
|
作者
Xie, Feng [1 ]
Cheng, Suqi [2 ,3 ]
Chen, Dongqing [1 ]
Zhang, Guoqiang [2 ]
机构
[1] China Information Technology Security Evaluation Center, Beijing 100085, China
[2] Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China
[3] Graduate University of the Chinese Academy of Sciences, Beijing 100190, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
17
引用
收藏
页码:1252 / 1257
相关论文
共 50 条
  • [41] A NODE-BASED MULTISCALE VULNERABILITY OF COMPLEX NETWORKS
    Criado, R.
    Pello, J.
    Romance, M.
    Vela-Perez, M.
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2009, 19 (02): : 703 - 710
  • [42] Cascade-based disaggregation of continuous rainfall time series:: the influence of climate
    Güntner, A
    Olsson, J
    Calver, A
    Gannon, B
    HYDROLOGY AND EARTH SYSTEM SCIENCES, 2001, 5 (02) : 145 - 164
  • [43] Evaluation of a Cascade-Based Acoustic Model for Fan Tonal Noise Prediction
    de Laborderie, Jerome
    Moreau, Stephane
    AIAA JOURNAL, 2014, 52 (12) : 2877 - 2890
  • [44] When Less Is More: Systematic Analysis of Cascade-Based Community Detection
    Prokhorenkova, Liudmila
    Tikhonov, Alexey
    Litvak, Nelly
    ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2022, 16 (04)
  • [45] Analyzing the Vulnerability of Superpeer Networks Against Attack
    Mitra, B.
    Peruani, F.
    Ghose, S.
    Ganguly, N.
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 225 - +
  • [46] Attack vulnerability of self-organizing networks
    Zhang, Jianhua
    Xu, Xiaoming
    Hong, Liu
    Wang, Shuliang
    Fei, Qi
    SAFETY SCIENCE, 2012, 50 (03) : 443 - 447
  • [47] Hybrid Task Cascade-Based Building Extraction Method in Remote Sensing Imagery
    Deng, Runqin
    Zhou, Meng
    Huang, Yinni
    Tu, Wei
    REMOTE SENSING, 2023, 15 (20)
  • [48] Learning from unbalanced data: A cascade-based approach for detecting clustered microcalcifications
    Bria, A.
    Karssemeijer, N.
    Tortorella, F.
    MEDICAL IMAGE ANALYSIS, 2014, 18 (02) : 241 - 252
  • [49] Hierarchy and Vulnerability of Complex Networks
    Mishkovski, Igor
    ICT INNOVATIONS 2013: ICT INNOVATIONS AND EDUCATION, 2014, 231 : 273 - 281
  • [50] Multiscale vulnerability of complex networks
    Boccaletti, Stefano
    Buldu, Javier
    Criado, Regino
    Flores, Julio
    Latora, Vito
    Pello, Javier
    Romance, Miguel
    CHAOS, 2007, 17 (04)