Vulnerability of Complex Networks under Approximate Longest Chain Attack Strategies

被引:2
|
作者
Hao, Yao-Hui [1 ,2 ]
Song, Jia-Liang [1 ]
Lin, Yi [1 ]
Han, Ji-Hong [1 ]
机构
[1] ZhengZhou Inst Informat Sci & Technol, Zhengzhou 450001, Peoples R China
[2] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
关键词
ANALYZE; MODEL;
D O I
10.1051/itmconf/20160701011
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We proposed three approximate longest chain-attack strategies and studied the vulnerability of complex networks under these intentional attack strategies. Experimental results indicate that when random network and small-world network are under any one of the three chain-attacks, the larger the < k > is, the smaller the iterative step T is. However, scale-free network shows different characteristics: the larger the < k > is, the larger the T is. These findings supplement and extend the previous attack results on nodes and edges, and can thus help us better explain the vulnerability of different complex networks.
引用
下载
收藏
页数:6
相关论文
共 50 条
  • [1] Vulnerability Analysis for Complex Networks under the Shortest Path-Attack Strategies
    Hao, Yaohui
    Han, Jihong
    Cheng, Qinghua
    Hu, Yongjin
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY, 2016, 47 : 138 - 141
  • [2] Attack vulnerability of complex networks
    Holme, Petter
    Kim, Beom Jun
    Yoon, Chang No
    Han, Seung Kee
    Physical Review E - Statistical, Nonlinear, and Soft Matter Physics, 2002, 65 (05): : 1 - 056109
  • [3] Attack vulnerability of complex networks
    Holme, P
    Kim, BJ
    Yoon, CN
    Han, SK
    PHYSICAL REVIEW E, 2002, 65 (05)
  • [4] Vulnerability of complex networks under intentional attack with incomplete information
    Wu, J.
    Deng, H. Z.
    Tan, Y. J.
    Zhu, D. Z.
    JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2007, 40 (11) : 2665 - 2671
  • [5] The Vulnerability of the Military SoS Networks under Different Attack and Defense Strategies
    Jin, Wei-Xin
    Song, Ping
    Liu, Guo-Zhu
    2014 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS (SOLI), 2014, : 65 - 72
  • [6] Attack vulnerability of complex communication networks
    Xia, Yongxiang
    Hill, David J.
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2008, 55 (01) : 65 - 69
  • [7] Uncertainty in vulnerability of networks under attack
    Alireza Ermagun
    Nazanin Tajik
    Hani Mahmassani
    Scientific Reports, 13
  • [8] Uncertainty in vulnerability of networks under attack
    Ermagun, Alireza
    Tajik, Nazanin
    Mahmassani, Hani
    SCIENTIFIC REPORTS, 2023, 13 (01)
  • [9] Attack strategies on complex networks
    Gallos, Lazaros K.
    Cohen, Reuven
    Liljeros, Fredrik
    Argyrakis, Panos
    Bunde, Armin
    Havlin, Shlomo
    COMPUTATIONAL SCIENCE - ICCS 2006, PT 3, PROCEEDINGS, 2006, 3993 : 1048 - 1055
  • [10] New attack strategies for complex networks
    Nie, Tingyuan
    Guo, Zheng
    Zhao, Kun
    Lu, Zhe-Ming
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2015, 424 : 248 - 253