2017
DOI: 10.1155/2017/6108563
|View full text |Cite
|
Sign up to set email alerts
|

Combined Heuristic Attack Strategy on Complex Networks

Abstract: Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
6
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 55 publications
1
6
0
Order By: Relevance
“…A simultaneous fitting of the susceptibility and magnetization data led to the optimum set of magnetic parameters listed in Table . Nonlinear optimization of magnetic data (both dc and ac) was conducted by the MIF&FIT program that utilizes modern genetic algorithms along with other advanced methods. The spin Hamiltonian formalism is legitimate to use in the present case of the compressed tetragonal bipyramid for the cationic unit since the daughter ground term is orbitally nondegenerate 4 A 1g .…”
Section: Resultssupporting
confidence: 72%
“…A simultaneous fitting of the susceptibility and magnetization data led to the optimum set of magnetic parameters listed in Table . Nonlinear optimization of magnetic data (both dc and ac) was conducted by the MIF&FIT program that utilizes modern genetic algorithms along with other advanced methods. The spin Hamiltonian formalism is legitimate to use in the present case of the compressed tetragonal bipyramid for the cationic unit since the daughter ground term is orbitally nondegenerate 4 A 1g .…”
Section: Resultssupporting
confidence: 72%
“…Common kinds of attacks are adding or removing nodes or links, where the nodes or links are chosen randomly or preferentially based on the degree or centrality measures of the attacked node. They find that the response of the network depends on the kind of network -complex or random -and how the attacked nodes are chosen -random or preferential [36][37][38][39][40][41]. We briefly study the response of the imprinted networks to classical attacks in Appendix A.…”
Section: Attacks Unique To Quantum Network: Decoherence As Modeled By...mentioning
confidence: 99%
“…For targeted attacks, it is also assumed that the targeted object is more important than the others in maintaining the network connectedness. Commonly used measures of importance include degree centrality, betweenness centrality, neighborhood similarity [28], branch weighting [29], and structural holes [30]. However, ranking the importance of nodes or edges is practically intractable for large-scale networks, since most measures cannot guarantee that removing the targeted object will definitely cause a greatest effect of damage on the network.…”
Section: Introductionmentioning
confidence: 99%