Combined Heuristic Attack Strategy on Complex Networks
暂无分享,去创建一个
Ladislav Huraj | Iveta Dirgová Luptáková | Marek Šimon | Iveta Dirgová Luptáková | Marián Hosťovecký | Jiří Pospíchal | M. Hosťovecký | L. Huraj | Jiri Pospíchal | M. Šimon | I. D. Luptáková
[1] Michele Bellingeri,et al. Efficiency of attack strategies on complex model and real-world networks , 2013, ArXiv.
[2] Ryan A. Rossi,et al. The Network Data Repository with Interactive Graph Analytics and Visualization , 2015, AAAI.
[3] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[4] Romualdo Pastor-Satorras,et al. Topological structure and the H index in complex networks. , 2017, Physical review. E.
[5] Teng-Hung Chen,et al. Graph theory and stability analysis of protein complex interaction networks. , 2016, IET systems biology.
[6] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[7] Hans J. Herrmann,et al. Onion-like network topology enhances robustness against malicious attacks , 2011 .
[8] Hao Wang,et al. Optimization of disintegration strategy for multi-edges complex networks , 2016, 2016 IEEE Congress on Evolutionary Computation (CEC).
[9] T. Killingback,et al. Attack Robustness and Centrality of Complex Networks , 2013, PloS one.
[10] Francisco J. Rodríguez,et al. Optimizing network attacks by artificial bee colony , 2017, Inf. Sci..
[11] Derek Ruths,et al. Robustness of Network Controllability to Degree-Based Edge Attacks , 2016, COMPLEX NETWORKS.
[12] Kun Zhao,et al. New attack strategies for complex networks , 2015 .
[13] Frances M. T. Brazier,et al. The Impact of the Topology on Cascading Failures in a Power Grid Model , 2014 .
[14] B. Kahng,et al. Percolation transitions in scale-free networks under the Achlioptas process. , 2009, Physical review letters.
[15] P. Duijn,et al. Social Network Analysis Applied to Criminal Networks: Recent Developments in Dutch Law Enforcement , 2014 .
[16] U. Brandes. A faster algorithm for betweenness centrality , 2001 .
[17] Duanbing Chen,et al. Vital nodes identification in complex networks , 2016, ArXiv.
[18] Hsinchun Chen,et al. The topology of dark networks , 2008, Commun. ACM.
[19] Reuven Cohen,et al. Attack Strategies on Complex Networks , 2006, International Conference on Computational Science.
[20] Pasquale De Meo,et al. Network Structure and Resilience of Mafia Syndicates , 2015, Inf. Sci..
[21] Oriol Lordan,et al. Robustness of the air transport network , 2014 .
[22] Eduardo L. Pasiliao,et al. Critical nodes for distance‐based connectivity and related problems in graphs , 2015, Networks.
[23] Juan Carlos González-Avella,et al. Fast Fragmentation of Networks Using Module-Based Attacks , 2015, PloS one.
[24] Matjaz Perc,et al. Statistical physics of crime: A review , 2014, Physics of life reviews.
[25] Hernán A. Makse,et al. Collective Influence Algorithm to find influencers via optimal percolation in massively large social media , 2016, Scientific Reports.
[26] Jun Wu,et al. Optimal attack strategy of complex networks based on tabu search , 2016 .
[27] Alessandro Vespignani,et al. Immunization of complex networks. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.
[28] Massimo Marchiori,et al. Error and attacktolerance of complex network s , 2004 .
[29] T. Tanizawa,et al. Optimization of robustness of complex networks , 2005 .
[30] P. Hui,et al. Modeling Insurgent Dynamics Including Heterogeneity , 2013, Journal of Statistical Physics.
[31] ArulselvanAshwin,et al. Detecting critical nodes in sparse graphs , 2009 .
[32] F. Chung,et al. Connected Components in Random Graphs with Given Expected Degree Sequences , 2002 .
[33] Roberto Aringhieri,et al. Hybrid constructive heuristics for the critical node problem , 2016, Annals of Operations Research.
[34] Tao Zhou,et al. The H-index of a network node and its relation to degree and coreness , 2016, Nature Communications.
[35] Lada A. Adamic,et al. The political blogosphere and the 2004 U.S. election: divided they blog , 2005, LinkKDD '05.
[36] Hernán A. Makse,et al. Influence maximization in complex networks through optimal percolation , 2015, Nature.
[37] V Latora,et al. Efficient behavior of small-world networks. , 2001, Physical review letters.
[38] Reuven Cohen,et al. Efficient immunization strategies for computer networks and populations. , 2002, Physical review letters.
[39] Jing Liu,et al. A memetic algorithm for enhancing the robustness of scale-free networks against malicious attacks , 2014 .
[40] Roberto Aringhieri,et al. A general Evolutionary Framework for different classes of Critical Node Problems , 2016, Eng. Appl. Artif. Intell..
[41] Hans J. Herrmann,et al. Mitigation of malicious attacks on networks , 2011, Proceedings of the National Academy of Sciences.
[42] Beom Jun Kim,et al. Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[43] Paul Erdös,et al. On random graphs, I , 1959 .
[44] Bruce A. Reed,et al. A Critical Point for Random Graphs with a Given Degree Sequence , 1995, Random Struct. Algorithms.
[45] P. Duijn,et al. The Relative Ineffectiveness of Criminal Network Disruption , 2014, Scientific Reports.
[46] Panos M. Pardalos,et al. Detecting critical nodes in sparse graphs , 2009, Comput. Oper. Res..
[47] Charles Z. Marshak,et al. Growth and containment of a hierarchical criminal network. , 2015, Physical review. E.