2021
DOI: 10.1103/physreve.103.022313
|View full text |Cite
|
Sign up to set email alerts
|

Global disassortative rewiring strategy for enhancing the robustness of scale-free networks against localized attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 25 publications
0
1
0
Order By: Relevance
“…The structural properties of the network are not considered to establish a robust network. [13][14][15]20 S4: GCE, ASPL and ACC provide information to establish an efficient network.…”
Section: L4mentioning
confidence: 99%
See 2 more Smart Citations
“…The structural properties of the network are not considered to establish a robust network. [13][14][15]20 S4: GCE, ASPL and ACC provide information to establish an efficient network.…”
Section: L4mentioning
confidence: 99%
“…Whereas, it is weak against malicious attacks. 8,9 Hence, it is a research challenge to design a resilient network against malicious attacks [10][11][12][13][14][15] along with topology optimization. [16][17][18] The SFNs is constructed using a preferential attachment process.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The first studies in this field were able to identify a substantial difference in the response to attacks in dependence of the structure of the attacked network [1,2,3]: in fact, networks with exponential degree distribution, such as the Erdős-Rényi graph, are equally sensitive to random failures and targeted attacks, while scale-free networks are almost insensitive to random failures, being severely disrupted by targeted attacks. Random failures are generally understood to consist in random deletion of nodes [1,4,5,6,7], while targeted attacks are usually performed by removing nodes according to some centrality measure, such as degree centrality [1,3,4,5,6,7,8,9], or betweenness centrality [3,5,6,7,8,9], even though other types of attacks have been studied in the literature [3,9,10,11].…”
Section: Introductionmentioning
confidence: 99%