Network Defensive Strategy Definition Based on Node Criticality
暂无分享,去创建一个
[1] Y. Censor. Pareto optimality in multiobjective problems , 1977 .
[2] Simona Bernardi,et al. A Min-Max Problem for the Computation of the Cycle Time Lower Bound in Interval-Based Time Petri Nets , 2013, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[3] Wayne Pullan,et al. Heuristic identification of critical nodes in sparse real-world graphs , 2015, J. Heuristics.
[4] Massimo Marchiori,et al. Error and attacktolerance of complex network s , 2004 .
[5] Beom Jun Kim,et al. Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[6] Hongzhong Deng,et al. Vulnerability of complex networks under intentional attack with incomplete information , 2007 .
[7] L. Shapley,et al. The Shapley Value , 1994 .
[8] Panos M. Pardalos,et al. Detecting critical nodes in sparse graphs , 2009, Comput. Oper. Res..
[9] Amir Bashan,et al. Localized attacks on spatially embedded networks with dependencies , 2015, Scientific Reports.
[10] Nam P. Nguyen,et al. On the Discovery of Critical Links and Nodes for Assessing Network Vulnerability , 2013, IEEE/ACM Transactions on Networking.
[11] Marco Tomassini,et al. Generating Robust and Efficient Networks Under Targeted Attacks , 2015, Propagation Phenomena in Real World Networks.
[12] Mark A. Shayman,et al. On pairwise connectivity of wireless multihop networks , 2007, Int. J. Secur. Networks.
[13] R. Myerson. Conference structures and fair allocation rules , 1978 .
[14] Stefano Panzieri,et al. Finding critical nodes in infrastructure networks , 2017, Int. J. Crit. Infrastructure Prot..
[15] Valdis E. Krebs,et al. Mapping Networks of Terrorist Cells , 2001 .
[16] Marco Di Summa,et al. Branch and cut algorithms for detecting critical nodes in undirected graphs , 2012, Computational Optimization and Applications.
[17] Harry Eugene Stanley,et al. Percolation of localized attack on complex networks , 2014, ArXiv.
[18] Masaharu Munetomo,et al. Network Structural Vulnerability: A Multiobjective Attacker Perspective , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[19] Beatrice M. Ombuki-Berman,et al. An Experimental Evaluation of Multi-objective Evolutionary Algorithms for Detecting Critical Nodes in Complex Networks , 2015, EvoApplications.