Bound and exact methods for assessing link vulnerability in complex networks
暂无分享,去创建一个
[1] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[2] Fan Chung,et al. Spectral Graph Theory , 1996 .
[3] P. Erdos,et al. On the evolution of random graphs , 1984 .
[4] Mario Ventresca,et al. A derandomized approximation algorithm for the critical node detection problem , 2014, Comput. Oper. Res..
[5] Alan T. Murray,et al. A Methodological Overview of Network Vulnerability Analysis , 2008 .
[6] Taieb Znati,et al. On Approximation of New Optimization Methods for Assessing Network Vulnerability , 2010, 2010 Proceedings IEEE INFOCOM.
[7] Jack Dongarra,et al. ScaLAPACK user's guide , 1997 .
[8] B. Bollobás. The evolution of random graphs , 1984 .
[9] Panos M. Pardalos,et al. On New Approaches of Assessing Network Vulnerability: Hardness and Approximation , 2012, IEEE/ACM Transactions on Networking.
[10] B. Mohar,et al. Eigenvalues in Combinatorial Optimization , 1993 .
[11] Jeroen H. G. C. Rutten,et al. Disconnecting graphs by removing vertices: a polyhedral approach , 2007 .
[12] Andrew V. Goldberg,et al. A new approach to the maximum flow problem , 1986, STOC '86.
[13] Daniel Vanderpooten,et al. Critical edges/nodes for the minimum spanning tree problem: complexity and approximation , 2013, J. Comb. Optim..
[14] Massimo Marchiori,et al. Error and attacktolerance of complex network s , 2004 .
[15] Marco Di Summa,et al. Branch and cut algorithms for detecting critical nodes in undirected graphs , 2012, Computational Optimization and Applications.
[16] Marco Di Summa,et al. Identifying critical nodes in undirected graphs: Complexity results and polynomial algorithms for the case of bounded treewidth , 2013, Discret. Appl. Math..
[17] V. Klee,et al. Combinatorial and graph-theoretical problems in linear algebra , 1993 .
[18] Stephen P. Borgatti,et al. Identifying sets of key players in a social network , 2006, Comput. Math. Organ. Theory.
[19] A. Hoffman,et al. Lower bounds for the partitioning of graphs , 1973 .
[20] Panos M. Pardalos,et al. Detecting critical nodes in sparse graphs , 2009, Comput. Oper. Res..
[21] Jonathan Cole Smith,et al. Polynomial‐time algorithms for solving a class of critical node problems on trees and series‐parallel graphs , 2012, Networks.
[22] My T. Thai,et al. Network Under Joint Node and Link Attacks: Vulnerability Assessment Methods and Analysis , 2015, IEEE/ACM Transactions on Networking.
[23] Eytan Modiano,et al. Assessing the Vulnerability of the Fiber Infrastructure to Disasters , 2009, IEEE INFOCOM 2009.
[24] Arunabha Sen,et al. Region-based connectivity - a new paradigm for design of fault-tolerant networks , 2009, 2009 International Conference on High Performance Switching and Routing.
[25] Arnold L. Rosenberg,et al. Bounding damage from link destruction, with application to the internet , 2007, SIGMETRICS '07.
[26] Eduardo L. Pasiliao,et al. Exact identification of critical nodes in sparse networks via new compact formulations , 2014, Optim. Lett..
[27] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[28] Padhraic Smyth,et al. A Spectral Clustering Approach To Finding Communities in Graph , 2005, SDM.
[29] A. Barabasi,et al. Scale-free characteristics of random networks: the topology of the world-wide web , 2000 .
[30] Christos Faloutsos,et al. Graphs over time: densification laws, shrinking diameters and possible explanations , 2005, KDD '05.
[31] Brian Neil Levine,et al. Bounds on service quality for networks subject to augmentation and attack , 2010 .
[32] Alan T. Murray,et al. Modeling s-t path availability to support disaster vulnerability assessment of network infrastructure , 2010, Comput. Oper. Res..
[33] Alan T. Murray,et al. Comparative Approaches for Assessing Network Vulnerability , 2008 .
[34] Nam P. Nguyen,et al. On the Discovery of Critical Links and Nodes for Assessing Network Vulnerability , 2013, IEEE/ACM Transactions on Networking.
[35] Arunabha Sen,et al. Design and Analysis of Networks with Large Components in Presence of Region-Based Faults , 2011, 2011 IEEE International Conference on Communications (ICC).
[36] Peng Xiao,et al. Finding the anti-block vital edge of a shortest path between two nodes , 2007, J. Comb. Optim..
[37] Réka Albert,et al. Structural vulnerability of the North American power grid. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[38] Daniel Vanderpooten,et al. Complexity of determining the most vital elements for the p-median and p-center location problems , 2013, J. Comb. Optim..
[39] My T. Thai,et al. Precise structural vulnerability assessment via mathematical programming , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[40] My T. Thai,et al. Adaptive algorithms for detecting critical links and nodes in dynamic networks , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.