2020
DOI: 10.1016/j.physa.2019.122759
|View full text |Cite
|
Sign up to set email alerts
|

Edge attack strategies in interdependent scale-free networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 33 publications
(9 citation statements)
references
References 41 publications
0
9
0
Order By: Relevance
“…Most of the previous works with regard to the cascading failure in the interdependent network utilize the percolation theory to decide whether the failure propagation is triggered [1]- [4], [6], [7], [10], [12]- [14], [17], [18]. In terms of the percolation theory, it is assumed that the component containing the most nodes, namely the giant component, can keep the normal function, which means that the nodes belonging to the component with the fewer nodes fail to work.…”
Section: B Cascading Failure Model In Imecnmentioning
confidence: 99%
See 1 more Smart Citation
“…Most of the previous works with regard to the cascading failure in the interdependent network utilize the percolation theory to decide whether the failure propagation is triggered [1]- [4], [6], [7], [10], [12]- [14], [17], [18]. In terms of the percolation theory, it is assumed that the component containing the most nodes, namely the giant component, can keep the normal function, which means that the nodes belonging to the component with the fewer nodes fail to work.…”
Section: B Cascading Failure Model In Imecnmentioning
confidence: 99%
“…Taking into account that it is likely to intentionally remove the node in reality, Huang et al developed a general framework to investigate the cascading failure triggered by attacks on the nodes with either high or low degrees [12]. Due to the fact that the interdependent network is vulnerable to random attacks, the targeted attack in networks of networks [13] and the edge attack strategy in interdependent networks [14] have also been explored.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, when a vaccine is not available, control policies must rely upon non-pharmaceutical interventions (NPIs), which mainly consist in policies reducing the chances to disease transmission by imposing the so called "social distancing" [18]. In terms of network, this is equivalent to remove links, and in the network science research, rich literature exists on the most efficient link removal strategies to disentangle network connectivity (see, e.g., [19][20][21][22][23]). Although the link removal (LR) analyses can help model the consequences of NPIs policies and evaluate their efficacy [9], it has been rarely used for this purpose.…”
Section: Introductionmentioning
confidence: 99%
“…In addition to the number of interdependent links, the robustness of interdependent networks with the coupling preferences according to the node load [32], the node degree [33], and the harmonic closeness [34], has also been thoroughly explored. In addition, in consideration of the vulnerability of the single network subjected to targeted attacks, the attack strategies aiming at removing the key nodes and edges for interdependent networks were proposed [35][36][37]. Many works have revealed that the interdependent network is more vulnerable than the single network; thus, Chattopadhyay et al presented an optimization framework for the maximization of the robustness of interdependent networks by optimizing the distribution of interdependent links [38].…”
Section: Introductionmentioning
confidence: 99%