Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2021
DOI: 10.1109/access.2021.3063928
|View full text |Cite
|
Sign up to set email alerts
|

Model and Analyze the Cascading Failure of Scale-Free Network Considering the Selective Forwarding Attack

Abstract: Many real-world networks have scale-free characteristics and can be abstracted into scalefree networks. Aiming at the problem that scale-free networks have low fault tolerance in the face of malicious attacks, we focus on the selective forwarding attack behavior that exists widely in the networks, and build a selective forwarding attack model based on node importance. Moreover, according to the neighbor node's malicious and non-malicious behavior, a load redistribution strategy for failed node is proposed. The… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 31 publications
0
1
0
Order By: Relevance
“…In malicious attacks, targets are attacked in the order of their importance; for example, nodes with larger degrees tend to be removed in priority [ 14 ]. Generally, malicious attacks are likely to cause more distinct structural losses than random attacks; therefore, such attack model has been intensively studied in previous studies including the attack on connectivity [ 15 , 16 , 17 ], on community [ 18 , 19 ], and on the diffusion behavior [ 13 ]. Several reasonable robustness performance evaluation factors have been designed [ 20 , 21 ]; based on these, methods that can improve the robustness are also developed [ 13 , 20 , 22 , 23 , 24 ].…”
Section: Introductionmentioning
confidence: 99%
“…In malicious attacks, targets are attacked in the order of their importance; for example, nodes with larger degrees tend to be removed in priority [ 14 ]. Generally, malicious attacks are likely to cause more distinct structural losses than random attacks; therefore, such attack model has been intensively studied in previous studies including the attack on connectivity [ 15 , 16 , 17 ], on community [ 18 , 19 ], and on the diffusion behavior [ 13 ]. Several reasonable robustness performance evaluation factors have been designed [ 20 , 21 ]; based on these, methods that can improve the robustness are also developed [ 13 , 20 , 22 , 23 , 24 ].…”
Section: Introductionmentioning
confidence: 99%