Measuring robustness of complex networks under MVC attack
暂无分享,去创建一个
Hong Cheng | Jeffrey Xu Yu | Rong-Hua Li | Xin Huang | Zechao Shang | Hong Cheng | J. Yu | Xin Huang | Ronghua Li | Zechao Shang
[1] S. Havlin,et al. Breakdown of the internet under intentional attack. , 2000, Physical review letters.
[2] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[3] Jiawei Zhang,et al. On approximation of max-vertex-cover , 2002, Eur. J. Oper. Res..
[4] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[5] Hans J. Herrmann,et al. Mitigation of malicious attacks on networks , 2011, Proceedings of the National Academy of Sciences.
[6] Cohen,et al. Resilience of the internet to random breakdowns , 2000, Physical review letters.
[7] M. Fiedler. Algebraic connectivity of graphs , 1973 .
[8] Andreas S. Schulz,et al. Revisiting the Greedy Approach to Submodular Set Function Maximization , 2007 .
[9] Andreas Krause,et al. Cost-effective outbreak detection in networks , 2007, KDD '07.
[10] S. Low,et al. The "robust yet fragile" nature of the Internet. , 2005, Proceedings of the National Academy of Sciences of the United States of America.
[11] Laurence A. Wolsey,et al. Worst-Case and Probabilistic Analysis of Algorithms for a Location Problem , 1980, Oper. Res..
[12] Christos Faloutsos,et al. ANF: a fast and scalable tool for data mining in massive graphs , 2002, KDD.
[13] Massimo Marchiori,et al. Error and attacktolerance of complex network s , 2004 .
[14] D S Callaway,et al. Network robustness and fragility: percolation on random graphs. , 2000, Physical review letters.
[15] Mauricio Barahona,et al. Spectral Measure of Structural Robustness in Complex Networks , 2011, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[16] Bojan Mohar,et al. Isoperimetric numbers of graphs , 1989, J. Comb. Theory, Ser. B.
[17] M. L. Fisher,et al. An analysis of approximations for maximizing submodular set functions—I , 1978, Math. Program..
[18] Frank Harary,et al. Conditional connectivity , 1983, Networks.
[19] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[20] Philippe Flajolet,et al. Probabilistic Counting Algorithms for Data Base Applications , 1985, J. Comput. Syst. Sci..