2021
DOI: 10.1016/j.cnsns.2020.105492
|View full text |Cite
|
Sign up to set email alerts
|

Percolation in multilayer complex networks with connectivity and interdependency topological structures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(14 citation statements)
references
References 58 publications
0
14
0
Order By: Relevance
“…The classic approach considers such impacts (or attacks) as an accidental (unintentional) occurrence. The corresponding models are the error tolerance model [7]; "forest fire"-based models [8], including the one with immune trees [9]; demon model [10]; cellular automata-based model [11,12]; and random attack percolation models [13,14]. The latter ones, including the targeted attack percolation models [15][16][17][18], localized attack percolation models [19], and k-core percolation [20][21][22][23], are also used to simulate the intentional attacks on a network's nodes and edges, assuming that the Attacker tries to disrupt the network connectivity as quickly as possible.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The classic approach considers such impacts (or attacks) as an accidental (unintentional) occurrence. The corresponding models are the error tolerance model [7]; "forest fire"-based models [8], including the one with immune trees [9]; demon model [10]; cellular automata-based model [11,12]; and random attack percolation models [13,14]. The latter ones, including the targeted attack percolation models [15][16][17][18], localized attack percolation models [19], and k-core percolation [20][21][22][23], are also used to simulate the intentional attacks on a network's nodes and edges, assuming that the Attacker tries to disrupt the network connectivity as quickly as possible.…”
Section: Introductionmentioning
confidence: 99%
“…The obtained results are the step towards deriving the optimal placement criteria for arbitrary structures. (1) Random attack percolation models [13,14] Error tolerance model [7] "Forest fire" (FF) [8] based models: FF with immune trees [9], Demon model [10],…”
Section: Introductionmentioning
confidence: 99%
“…According to the collected papers in this study, more layers have a devastating effect on the robustness of the multilayer network [44,54,59,61,76]. However, Radicchi et al [88] showed that in a network with a large number of layers adding a new layer can boost the robustness since it can create redundant interdependencies among layers.…”
Section: E the Effect Of Number Of Layersmentioning
confidence: 85%
“…In [50,61], weighted links were defined as the spatial length of connectivity and dependency links while [53][54][55] defined tolerate parameter as the weight of dependency links between layers. More information regarding the tolerance parameter can be found in Section F.…”
Section: Linksmentioning
confidence: 99%
“…Recent research on the vulnerability of power systems has primarily focused on the CPS vulnerability analysis of the power grid. Studies on the vulnerability of the power grid structure were generally based on the complex network theory, especially the analysis and verification of small‐world (SW) characteristics and scale‐free characteristics in power systems 9,10,11,12,13 . However, some scholars focused on the vulnerability analysis of ADNs 5,6,14 .…”
Section: Introductionmentioning
confidence: 99%