2010
DOI: 10.1016/j.cnsns.2009.05.002
|View full text |Cite
|
Sign up to set email alerts
|

Application of modal analysis in assessing attack vulnerability of complex networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
21
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 25 publications
(21 citation statements)
references
References 17 publications
0
21
0
Order By: Relevance
“…Identified the critical airports for the global ATN of November 2011-November 2012 [15]. Irina Petreska et al started from the similarity of structural dynamics and complex networks, the network node/link busy degree is proposed on the basis of the modal equation, which could be used as the measure of vulnerability reflecting the influence on neighboring nodes [25]. Sun, D. et al defined that the station vulnerability is the change of the topological efficiency and the influence of passenger flow after attacked, as well as the probability of station being attacked.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Identified the critical airports for the global ATN of November 2011-November 2012 [15]. Irina Petreska et al started from the similarity of structural dynamics and complex networks, the network node/link busy degree is proposed on the basis of the modal equation, which could be used as the measure of vulnerability reflecting the influence on neighboring nodes [25]. Sun, D. et al defined that the station vulnerability is the change of the topological efficiency and the influence of passenger flow after attacked, as well as the probability of station being attacked.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Network robustness can be assessed through the effect of the isolation of a fraction f of nodes on the size of the network's giant component (ie, the connected subset of the network with the highest number of nodes). The network will be robust when the size of the giant component decreases little for relatively high values of f (Petreska et al, 2010;Mishkovski et al, 2011). The nodes to isolate can be selected either at random (errors) or through a criterion usually based on node centrality (attacks) (Albert et al, 2000) The study of the robustness allows to evaluate the capacity of a network to avoid a malfunction when a fraction of its components is damaged (Boccaletti et al, 2006).…”
Section: Methodsmentioning
confidence: 99%
“… These problems are of central importance in the study of social networks [3, 10], which have received substantial attention in the past decade since the introduction of the “small‐world network” concept [58]. The term was originally proposed to demonstrate the small‐world phenomenon arising in collaboration networks but has also shown promise in describing complex systems in biology, sociology, economics, and medicine [47, 48]. Latora and Marchiori [35] and Crucitti et al [18] emphasize the importance of studying vulnerability and protecting such networks.…”
Section: Introductionmentioning
confidence: 99%