2015
DOI: 10.1016/j.physa.2014.10.038
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability of complex networks under path-based attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(19 citation statements)
references
References 44 publications
0
19
0
Order By: Relevance
“…To date, link betweenness has been the most prevalent mechanism, [46]. Counting the number of all shortest paths that a specific link features on, link betweenness intuitively prioritises links in the barycenter of the network.…”
Section: Introductionmentioning
confidence: 99%
“…To date, link betweenness has been the most prevalent mechanism, [46]. Counting the number of all shortest paths that a specific link features on, link betweenness intuitively prioritises links in the barycenter of the network.…”
Section: Introductionmentioning
confidence: 99%
“…In this section, the proposed three shortest path-attack strategies and RPA [9] are applied to random, scale-free and small-world three model networks. The results of RSP and RPA are the average of 1000 independent runs.…”
Section: Numerical Results and Analysismentioning
confidence: 99%
“…So, Pu found that "terrorists usually prefer much larger scale attacks, and drugs always affect many targets". The RPA(the random augmenting approach) and HPA(the Hamilton path based approach) longest path-attack strategies were proposed on this basis [9]. However, according to the experimental results of Milgram [10], when people choose a path in the network, they tend to choose the shortest one between two points.…”
Section: Introductionmentioning
confidence: 99%
“…Second, RLC randomly chooses a neighboring node of the initial node as the second node of the chain, and then chooses a neighboring node of the second node as the third node of the chain, and so on [21]. No node should be invaded twice in the chain augmenting process and it continues until no appropriate node could be found.…”
Section: Chain Structure Of Invasionmentioning
confidence: 99%
“…The number of iterative steps (T) reflects the tolerance of a network [21]. The initial value of T is zero, and it increases by one each time with a chain-attack.…”
Section: Implement and Measure Of Chain Attackmentioning
confidence: 99%