메뉴 건너뛰기




Volumn 64, Issue 4 SPEC. ISS., 2005, Pages 483-502

Complex networks: Dynamics and security

Author keywords

Attacks; Cascading breakdown; Network security; Phase transition; Scale free network

Indexed keywords

CASCADE CONNECTIONS; NETWORKS (CIRCUITS); NUMERICAL METHODS; PHASE TRANSITIONS; PROBABILITY DISTRIBUTIONS; PROBLEM SOLVING;

EID: 15744374640     PISSN: 03044289     EISSN: None     Source Type: Journal    
DOI: 10.1007/bf02706197     Document Type: Conference Paper
Times cited : (35)

References (50)
  • 6
    • 0004081447 scopus 로고    scopus 로고
    • Princeton University Press, Princeton
    • D J Watts, Small worlds (Princeton University Press, Princeton, 1999)
    • (1999) Small Worlds
    • Watts, D.J.1
  • 19
    • 17144362273 scopus 로고    scopus 로고
    • R Guimerà, A Arenas, A Días-Guilera and F Giralt, e-print cond-mat/0206077
    • R Guimerà, A Arenas, A Días-Guilera and F Giralt, e-print cond-mat/0206077
  • 30
    • 17144382956 scopus 로고    scopus 로고
    • note
    • A different model and mechanism for overload breakdown in growing networks has been considered in [28]. These authors focus on overloads caused by the growth of the network. Their model assigns the same capacity to every node in the network. In their analysis, when a node is overloaded, the links to that node are removed but the node itself is not removed and can be reconnected in the future. Their conclusion is that, to avoid overloads, the capacity must grow with the size of the network. Our model is different from the model in [28] as we assume the capacity to be node-dependent and the failed nodes to be permanently removed from the network. More importantly, we address the issues of intentional attack and random breakdown, and we study how the network collapses under overload failures induced by them. We assume that the time-scale for these events is much smaller than the time-scale in which the network grows
  • 35
    • 17144400058 scopus 로고    scopus 로고
    • http://moat.nlanr.net/AS/Data/ASconnlist.20000102.946809601
  • 36
    • 17144419870 scopus 로고    scopus 로고
    • ftp://ftp.santafe.edu/pub/duncan/power.unweighted
  • 46
    • 17144407376 scopus 로고    scopus 로고
    • note
    • We choose to sort the links according to the initial distribution of ranges, instead of an updated distribution, because we want to address the relative importance of short-range and long-range links for the original network. In addition, in terms of attack efficiency, updating is time consuming
  • 48
    • 17144382602 scopus 로고    scopus 로고
    • note
    • Indeed, the range of a link can be regarded as the length of the second shortest path between the nodes that are connected to the link. Since we are considering the semi-random model, for which everything other than the connectivity distribution is random, the length of the second shortest path should also be correlated with the product of connectivities


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.