2010 Proceedings IEEE INFOCOM 2010
DOI: 10.1109/infcom.2010.5462098
|View full text |Cite
|
Sign up to set email alerts
|

On Approximation of New Optimization Methods for Assessing Network Vulnerability

Abstract: Assessing network vulnerability before potential disruptive events such as natural disasters or malicious attacks is vital for network planning and risk management. It enables us to seek and safeguard against most destructive scenarios in which the overall network connectivity falls dramatically. Existing vulnerability assessments mainly focus on investigating the inhomogeneous properties of graph elements, node degree for example, however, these measures and the corresponding heuristic solutions can provide n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 54 publications
(28 citation statements)
references
References 21 publications
0
26
0
Order By: Relevance
“…is N P -hard on general graphs even if c uv = 1 for all edges uv: this follows easily from [13,Theorem 1], where a slightly different problem (called β-edge disruptor problem) is considered. However, we show that the algorithm of Section 3 can be adapted to handle this variant of the CNP, provided that the concept of CCC is slightly extended.…”
Section: Remarks and Extensionsmentioning
confidence: 99%
See 1 more Smart Citation
“…is N P -hard on general graphs even if c uv = 1 for all edges uv: this follows easily from [13,Theorem 1], where a slightly different problem (called β-edge disruptor problem) is considered. However, we show that the algorithm of Section 3 can be adapted to handle this variant of the CNP, provided that the concept of CCC is slightly extended.…”
Section: Remarks and Extensionsmentioning
confidence: 99%
“…In this case R is clearly a feasible solution to problem P i (S, α, m), thus f i (S, α, m) ≥ w(R) = f j (S, α, m). Now assume that f j (S ′ , α ′ , m) is finite for some α ′ as in (13). Then there exists R ′ such that S ′ ⊆ R ′ ⊆ V j \ (X j \ S ′ ), α ′ is the CCC of S ′ with respect to G[R ′ ], and m is the number of connected pairs in G[R ′ ].…”
Section: Proposition 13mentioning
confidence: 99%
“…The algebraic connectivity α could be used to approximate the sparsest cut γ as α/2 ≤ γ ≤ α(2δ − α) [4,21]. Dinh et al [23] investigated the notion of pairwise connectivity (the number of connected pairs, which bears similarities to the sparsest-cut problem), and proved that finding the smallest set of nodes/links whose removal degrades the pairwise connectivity to certain degree is NPcomplete.…”
Section: Definition 7 (Maximum Cut)mentioning
confidence: 99%
“…Dinh et al [6] focus on telecommunication networks; they propose algorithms for detecting in a directed graph what they call node-disruptors and arc-disruptors, i.e., sets of nodes and arcs to be deleted in order to minimize the number of directed connections surviving in the residual graph.…”
Section: Introductionmentioning
confidence: 99%