2012
DOI: 10.1103/physreve.85.066130
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing network robustness against malicious attacks

Abstract: In a recent work [Schneider et al., Proc. Natl. Acad. Sci. USA 108, 3838 (2011)], the authors proposed a simple measure for network robustness under malicious attacks on nodes. Using a greedy algorithm, they found that the optimal structure with respect to this quantity is an onion structure in which high-degree nodes form a core surrounded by rings of nodes with decreasing degree. However, in real networks the failure can also occur in links such as dysfunctional power cables and blocked airlines. Accordingly… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
86
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 168 publications
(86 citation statements)
references
References 34 publications
0
86
0
Order By: Relevance
“…Our analyses show that the behavior of optimal networks with respect to edge removal is much similar to the non-optimal case, for the three edge removals rules considered. In order to increase the robustness for edge removal, it is possible also to include in the optimization process a measure of robustness, as the ones proposed in [25] and [35], for instance. It is straightforward to change the algorithm in such a way that an edge swap is accepted only if it increases both the synchronization order parameter and the adopted robustness measure.…”
Section: Decentralized Power Gridsmentioning
confidence: 99%
See 2 more Smart Citations
“…Our analyses show that the behavior of optimal networks with respect to edge removal is much similar to the non-optimal case, for the three edge removals rules considered. In order to increase the robustness for edge removal, it is possible also to include in the optimization process a measure of robustness, as the ones proposed in [25] and [35], for instance. It is straightforward to change the algorithm in such a way that an edge swap is accepted only if it increases both the synchronization order parameter and the adopted robustness measure.…”
Section: Decentralized Power Gridsmentioning
confidence: 99%
“…We have also studied the robustness of the networks against edge removal. The size of the giant component S (m) is a common topological measure employed in the analysis of how connected a network remains after removing m edges [35]. We have considered three different edge removals rules: random removal; the socalled degree product rule, where one removes first the edges with the highest product of the degrees of the vertices connected to them; and the so-called edgebetweenness rule, where the edges with highest edge-betweenness are removed firstly.…”
Section: Decentralized Power Gridsmentioning
confidence: 99%
See 1 more Smart Citation
“…It would be very interesting to test the modified centrality in other dynamic process. For example, one can investigate whether the malicious attack according to the IRA-based degree will cause more harmful results to the giant component of networks [42,43]. In addition, the interdependent networks have attracted much attention recently [44]; how to design an iterative resource allocation in these systems can also be an interesting and important open problem.…”
Section: Effectiveness Of the Ira Methodmentioning
confidence: 99%
“…Vaccination of hosts (network nodes) is often the most effective way to prevent large epidemics. Other strategies include manipulating the network topology [2][3][4] or introducing heterogeneity in transmission of the infection [5][6][7].…”
mentioning
confidence: 99%