2016
DOI: 10.1016/j.physa.2016.06.130
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability of complex networks under three-level-tree attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(11 citation statements)
references
References 21 publications
0
11
0
Order By: Relevance
“…In particular, the relation between the topological characteristics of the ground-truth network and the robustness of the network attack strategies should be investigated in the future research. Moreover, new attack strategies [2, 4] have been proposed since CI, and analyzing the robustness of these strategies is also important future work. Third, to understand the effectiveness of network attack strategies for the network immunization problem, more detailed investigations are still necessary.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In particular, the relation between the topological characteristics of the ground-truth network and the robustness of the network attack strategies should be investigated in the future research. Moreover, new attack strategies [2, 4] have been proposed since CI, and analyzing the robustness of these strategies is also important future work. Third, to understand the effectiveness of network attack strategies for the network immunization problem, more detailed investigations are still necessary.…”
Section: Resultsmentioning
confidence: 99%
“…The network attack problem has received much attention, and several network attack strategies have been proposed [14]. The network attack problem involves finding a (small) set of nodes whose removal fragments the network [1].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Previous studies show that a large number of real systems such as the World Wide Web, the Internet, power grids, and airline networks, etc. are with notable heterogeneity [14], which means that the role of nodes in network structure and function varies greatly. These networks have a higher tolerance to random failures but are sensitive to intentional attacks.…”
Section: Introductionmentioning
confidence: 99%
“…In order to obtain the security status of the network and to predict its trend, the researchers first studied attack threats [1,2], network vulnerability [3,4], and other related aspects. In summary, the researches on these aspects are relatively mature.…”
Section: Introductionmentioning
confidence: 99%