2020
DOI: 10.1016/j.physa.2020.124347
|View full text |Cite
|
Sign up to set email alerts
|

Central attacks in complex networks: A revisit with new fallback strategy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 32 publications
0
11
0
Order By: Relevance
“…Inspired by its application in biology (Seguin et al, 2018), traffic analysis (Scellato et al, 2010), and network attack analysis (Lekha and Balakrishnan, 2020), we use edge betweenness centrality (Das et al, 2018) as the generic (non-topic) measure of navigability. Let α ij be the number of shortest paths from node i to j and α ij (k) is the number of paths passes through the edge k. Then the edge-betweenness centrality is…”
Section: Measures Of For Relative Interestingnessmentioning
confidence: 99%
“…Inspired by its application in biology (Seguin et al, 2018), traffic analysis (Scellato et al, 2010), and network attack analysis (Lekha and Balakrishnan, 2020), we use edge betweenness centrality (Das et al, 2018) as the generic (non-topic) measure of navigability. Let α ij be the number of shortest paths from node i to j and α ij (k) is the number of paths passes through the edge k. Then the edge-betweenness centrality is…”
Section: Measures Of For Relative Interestingnessmentioning
confidence: 99%
“…In the following formulas, let N represent the number of identified software classes. Degree information in complex network including degree k i , sum of indegree sum k in , sum of outdegree sum k out , and sum of degree sum k [21], respectively, is expressed as follows:…”
Section: Directed Weighted Class Interaction Software Networkmentioning
confidence: 99%
“…Lekha et al confirmed the relevance of closeness centrality in central attacks [6]. Wang et al demonstrated that a critical-point before which damage attack is more destructive than degree attack for real networks in a wide range of domains [7].…”
Section: Introductionmentioning
confidence: 97%