skip to main content
Visitante
Meu Espaço
Minha Conta
Sair
Identificação
This feature requires javascript
Tags
Revistas Eletrônicas (eJournals)
Livros Eletrônicos (eBooks)
Bases de Dados
Bibliotecas USP
Ajuda
Ajuda
Idioma:
Inglês
Espanhol
Português
This feature required javascript
This feature requires javascript
Primo Advanced Search
Busca Geral
Busca Geral
Acervo Físico
Acervo Físico
Produção Intelectual da USP
Produção USP
Primo Advanced Search Query Term
Input search text:
Show Results with:
criteria input
Qualquer
Show Results with:
Qualquer
Primo Advanced Search prefilters
Tipo de material:
criteria input
Todos os itens
Busca Geral
Busca Simples
This feature requires javascript
Attack Vulnerability of Network Controllability
Lu, Zhe-Ming ; Li, Xin-Feng Du, Wen-Bo
PloS one, 2016-09, Vol.11 (9), p.e0162289-e0162289
[Periódico revisado por pares]
United States: Public Library of Science
Texto completo disponível
Citações
Citado por
Exibir Online
Detalhes
Resenhas & Tags
Mais Opções
Nº de Citações
This feature requires javascript
Enviar para
Adicionar ao Meu Espaço
Remover do Meu Espaço
E-mail (máximo 30 registros por vez)
Imprimir
Link permanente
Referência
EasyBib
EndNote
RefWorks
del.icio.us
Exportar RIS
Exportar BibTeX
This feature requires javascript
Título:
Attack Vulnerability of Network Controllability
Autor:
Lu, Zhe-Ming
;
Li, Xin-Feng
Du, Wen-Bo
Assuntos:
Access control (Computers)
;
Aeronautics
;
Algorithms
;
Communications networks
;
Computer access control
;
Computer and Information Sciences
;
Computer security
;
Computer Simulation
;
Control theory
;
Controllability
;
Cybersecurity
;
Engineering and
Technology
;
Evolution
;
Failure
;
Internet
;
Mathematical models
;
Model testing
;
Models, Theoretical
;
Networks
;
Neural Networks (Computer)
;
Physical Sciences
;
Research and Analysis Methods
;
Robust control
;
Robustness (mathematics)
;
Social networks
;
Sociology
;
Stability
;
Strategies
;
System theory
;
Vulnerability
É parte de:
PloS one, 2016-09, Vol.11 (9), p.e0162289-e0162289
Notas:
ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
Competing Interests: The authors have declared that no competing interests exist.
Conceived and designed the experiments: ZML XFL. Performed the experiments: XFL. Analyzed the data: ZML XFL. Contributed reagents/materials/analysis tools: ZML XFL. Wrote the paper: ZML XFL.
Descrição:
Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability.
Editor:
United States: Public Library of
Science
Idioma:
Inglês
Links
View this record in MEDLINE/PubMed
This feature requires javascript
This feature requires javascript
Voltar para lista de resultados
Anterior
Resultado
5
Avançar
This feature requires javascript
This feature requires javascript
Buscando em bases de dados remotas. Favor aguardar.
Buscando por
em
scope:(USP_VIDEOS),scope:("PRIMO"),scope:(USP_FISICO),scope:(USP_EREVISTAS),scope:(USP),scope:(USP_EBOOKS),scope:(USP_PRODUCAO),primo_central_multiple_fe
Mostrar o que foi encontrado até o momento
This feature requires javascript
This feature requires javascript