2016
DOI: 10.24846/v25i4y201608
|View full text |Cite
|
Sign up to set email alerts
|

Revisiting Models of Vulnerabilities of the Networks

Abstract: Abstract:The study critically revisits the models of 'vulnerability' of various types of networks and shows several limits of the current state of the art, including the ambiguous definitions of vulnerability and robustness concepts, the arbitrary use of various connectivity indexes on graphs for assessing the 'vulnerability' of real-world networks to real-world attacks, the lack of any evidence for the proposed models, and the lack of significant statistical approaches. Next, the study shows the limits of usi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…Many studies tried to analyze different aspects of these type of networks like network centrality [2][3][4][5], vulnerability [6][7][8], reliability [9,10], resilience [11][12][13], flows [14][15][16], etc., and there has been a considerable progress in the past few decades. However, most of the studies are at a theoretical level and the decision-makers need a consistent background in the field of graph theory to perform such analyses and to accurately interpret the results.…”
Section: Introductionmentioning
confidence: 99%
“…Many studies tried to analyze different aspects of these type of networks like network centrality [2][3][4][5], vulnerability [6][7][8], reliability [9,10], resilience [11][12][13], flows [14][15][16], etc., and there has been a considerable progress in the past few decades. However, most of the studies are at a theoretical level and the decision-makers need a consistent background in the field of graph theory to perform such analyses and to accurately interpret the results.…”
Section: Introductionmentioning
confidence: 99%
“…Fuzzy logic can be involved in adaptive GWO in order to exploit the advantages of the nonlinear input-output maps of fuzzy systems [46][47][48][49][50]. The hybridization with other algorithms is a good option because of the small numbers of GWO; metaheuristics or classical algorithms can be used with this regard in several applications [51][52][53][54].…”
Section: Grey Wolf Optimizer and Analysismentioning
confidence: 99%