2012
DOI: 10.1103/physreve.86.036106
|View full text |Cite
|
Sign up to set email alerts
|

Correlations in complex networks under attack

Abstract: For any initially correlated network after any kind of attack where either nodes or edges are removed, we obtain general expressions for the degree-degree probability matrix and degree distribution. We show that the proposed analytical approach predicts the correct topological changes after the attack by comparing the evolution of the assortativity coefficient for different attack strategies and intensities in theory and simulations. We find that it is possible to turn an initially assortative network into a d… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
13
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(13 citation statements)
references
References 20 publications
0
13
0
Order By: Relevance
“…Since the network G 0 has no degree correlations, G τ generated by removing nodes randomly from G 0 with a probability depending only on the degree is also uncorrelated [29]. Therefore, the conditional probability is presented by P τ (k |k) = k P τ (k )/ k τ , where k τ is the average degree of G τ , and φ τ is written as…”
Section: Size Of the Giant Componentmentioning
confidence: 99%
“…Since the network G 0 has no degree correlations, G τ generated by removing nodes randomly from G 0 with a probability depending only on the degree is also uncorrelated [29]. Therefore, the conditional probability is presented by P τ (k |k) = k P τ (k )/ k τ , where k τ is the average degree of G τ , and φ τ is written as…”
Section: Size Of the Giant Componentmentioning
confidence: 99%
“…To consider the network topology, the rumor diffusion models on small-world network [22] and SFNs [21,23,24] have been described.…”
Section: Related Workmentioning
confidence: 99%
“…The Daley-Kendal and MK models have a serious weakness; these models do not take into account the topology of the underlying networks along with the rumor propagation process [21]. To consider the network topology, the rumor diffusion models on small-world network [22] and SFNs [21,23,24] have been described.…”
Section: Related Workmentioning
confidence: 99%
“…network connectivity) [13]- [16]. These attacks target the physical layer of network connection, and applicable to all higher level network-oriented protocols.…”
Section: Network Attacks Of Dh Integration In Protocolsmentioning
confidence: 99%