Efficient disintegration strategies with cost constraint in complex networks: The crucial role of nodes near average degree.
暂无分享,去创建一个
[1] Asim S. Siddiqui,et al. Preferential network perturbation , 2006 .
[2] Michele Bellingeri,et al. Efficiency of attack strategies on complex model and real-world networks , 2013, ArXiv.
[3] Shlomo Havlin,et al. Finding a better immunization strategy. , 2008, Physical review letters.
[4] J. A. Rodríguez-Velázquez,et al. Subgraph centrality in complex networks. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.
[5] Guanrong Chen,et al. Complex networks: small-world, scale-free and beyond , 2003 .
[6] Teruyoshi Kobayashi,et al. Efficient immunization strategies to prevent financial contagion , 2013, Scientific Reports.
[7] Hsinchun Chen,et al. Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network , 2005, ISI.
[8] Ellis L. Johnson,et al. Solving Large-Scale Zero-One Linear Programming Problems , 1983, Oper. Res..
[9] Wu Jun,et al. Natural Connectivity of Complex Networks , 2010 .
[10] Mark E. J. Newman,et al. The Structure and Function of Complex Networks , 2003, SIAM Rev..
[11] J. A. Rodríguez-Velázquez,et al. Spectral measures of bipartivity in complex networks. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.
[12] Mauricio Barahona,et al. Spectral Measure of Structural Robustness in Complex Networks , 2011, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[13] Yicheng Zhang,et al. Identifying influential nodes in complex networks , 2012 .
[14] Lada A. Adamic,et al. The political blogosphere and the 2004 U.S. election: divided they blog , 2005, LinkKDD '05.
[15] Jun Wu,et al. Optimal attack strategy of complex networks based on tabu search , 2016 .
[16] Lev Muchnik,et al. Identifying influential spreaders in complex networks , 2010, 1001.5285.
[17] Behrouz Shafei,et al. Seismic Resilience of Transportation Networks with Deteriorating Components , 2016 .
[18] Xin Lu,et al. Efficient network disintegration under incomplete information: the comic effect of link prediction , 2016, Scientific reports.
[19] Jun Zhuang,et al. Modeling a Multitarget Attacker-Defender Game with Budget Constraints , 2017, Decis. Anal..
[20] Wu Jun,et al. Optimal Attack Strategy in Random Scale-Free Networks Based on Incomplete Information , 2011 .
[21] Beom Jun Kim,et al. Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[22] Rae Zimmerman,et al. Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness , 2008, Risk analysis : an official publication of the Society for Risk Analysis.
[23] Mauricio Barahona,et al. Robustness of random graphs based on graph spectra. , 2012, Chaos.
[24] Yijia Cao,et al. Cascading Failure Analysis Considering Interaction Between Power Grids and Communication Networks , 2016, IEEE Transactions on Smart Grid.
[25] Desmond Curran,et al. Budget constraint and vaccine dosing: a mathematical modelling exercise , 2014, Cost Effectiveness and Resource Allocation.
[26] Francesco Bullo,et al. Voltage collapse in complex power grids , 2016, Nature Communications.
[27] Cohen,et al. Resilience of the internet to random breakdowns , 2000, Physical review letters.
[28] M. Newman,et al. Renormalization Group Analysis of the Small-World Network Model , 1999, cond-mat/9903357.
[29] Jun Zhuang,et al. Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker , 2013, Risk analysis : an official publication of the Society for Risk Analysis.
[30] Albert-László Barabási,et al. Error and attack tolerance of complex networks , 2000, Nature.
[31] John A. Major. Advanced Techniques for Modeling Terrorism Risk , 2002 .