2020
DOI: 10.1007/s10559-020-00247-4
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability of Complex Network Structures and Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
5
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 13 publications
0
5
0
1
Order By: Relevance
“…The authors in [ 56 ] report a comprehensive analysis of the tolerance to attack and error on seven different datasets. In [ 57 ], the authors investigate the robustness of multigraph scale-free networks to targeted attacks. A sequential reverse list of nodes is maintained based on degree.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors in [ 56 ] report a comprehensive analysis of the tolerance to attack and error on seven different datasets. In [ 57 ], the authors investigate the robustness of multigraph scale-free networks to targeted attacks. A sequential reverse list of nodes is maintained based on degree.…”
Section: Related Workmentioning
confidence: 99%
“…One sorts the nodes in degree-descending order. They also use the betweenness centrality, which counts the fraction of shortest paths in the network that goes through the node [ 39 , 57 ].…”
Section: Related Workmentioning
confidence: 99%
“…Controlling susceptible people in virus transmission networks can prevent large-scale virus infections, and protecting high-traffic sites in the transportation networks can effectively avoid traffic congestion. [1][2][3][4][5][6][7][8][9][10] In recent years, the identification of key nodes in complex networks has become a hot spot in network scientific research, and more and more scientific research results have been proposed. The key node identification methods can be divided into two categories, local identification, and global identification.…”
Section: Introductionmentioning
confidence: 99%
“…ese two concepts can be used to determine the negative impact of complex network structure on internal and external [14]. Furthermore, Sun et al considered the impact of passenger flow on the vulnerability of Shanghai's subway network [15].…”
Section: Introductionmentioning
confidence: 99%