Resilience to intentional attacks of complex networks

التفاصيل البيبلوغرافية
العنوان: Resilience to intentional attacks of complex networks
المؤلفون: Yan, Shu, Tang, Shao Ting, Pei, Sen, Jiang, Shi Jin, Li, Wei Hua, Teng, Xian, Zheng, Zhi Ming
المساهمون: LMIB and School of Mathematics and Systems Science, Beihang University, Beijing, China, LMIB and School of Mathematical Science, Peking University, Beijing, China
المصدر: EI
سنة النشر: 2013
المجموعة: Peking University Institutional Repository (PKU IR) / 北京大学机构知识库
الوصف: The study of intentional attackshas become an important issue onthe research of complex networks. In this paper, we study the resilience of networks, introducing the parameters that describe the attacks effect and the parameters that measure the priority of intentional attacks. Weestablish analgorithm to analysis the intentional attack phenomenon and present the numerical simulation. ? (2013) Trans Tech Publications, Switzerland. ; EI ; 0
نوع الوثيقة: conference object
اللغة: English
تدمد: 16627482
Relation: 4th International Conference on Information Technology for Manufacturing Systems, ITMS 2013.Auckland, New zealand,421(647-651).; 1089686; http://hdl.handle.net/20.500.11897/411667
DOI: 10.4028/www.scientific.net/AMM.421.647
الاتاحة: https://hdl.handle.net/20.500.11897/411667
https://doi.org/10.4028/www.scientific.net/AMM.421.647
رقم الانضمام: edsbas.A51E40A9
قاعدة البيانات: BASE
ResultId 1
Header edsbas
BASE
edsbas.A51E40A9
790
3
Conference
conference
790.314270019531
PLink https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=edsbas&AN=edsbas.A51E40A9&custid=s6537998&authtype=sso
FullText Array ( [Availability] => 0 )
Array ( [0] => Array ( [Url] => https://hdl.handle.net/20.500.11897/411667# [Name] => EDS - BASE [Category] => fullText [Text] => View record in BASE [MouseOverText] => View record in BASE ) )
Items Array ( [Name] => Title [Label] => Title [Group] => Ti [Data] => Resilience to intentional attacks of complex networks )
Array ( [Name] => Author [Label] => Authors [Group] => Au [Data] => <searchLink fieldCode="AR" term="%22Yan%2C+Shu%22">Yan, Shu</searchLink><br /><searchLink fieldCode="AR" term="%22Tang%2C+Shao+Ting%22">Tang, Shao Ting</searchLink><br /><searchLink fieldCode="AR" term="%22Pei%2C+Sen%22">Pei, Sen</searchLink><br /><searchLink fieldCode="AR" term="%22Jiang%2C+Shi+Jin%22">Jiang, Shi Jin</searchLink><br /><searchLink fieldCode="AR" term="%22Li%2C+Wei+Hua%22">Li, Wei Hua</searchLink><br /><searchLink fieldCode="AR" term="%22Teng%2C+Xian%22">Teng, Xian</searchLink><br /><searchLink fieldCode="AR" term="%22Zheng%2C+Zhi+Ming%22">Zheng, Zhi Ming</searchLink> )
Array ( [Name] => Author [Label] => Contributors [Group] => Au [Data] => LMIB and School of Mathematics and Systems Science, Beihang University, Beijing, China<br />LMIB and School of Mathematical Science, Peking University, Beijing, China )
Array ( [Name] => TitleSource [Label] => Source [Group] => Src [Data] => EI )
Array ( [Name] => DatePubCY [Label] => Publication Year [Group] => Date [Data] => 2013 )
Array ( [Name] => Subset [Label] => Collection [Group] => HoldingsInfo [Data] => Peking University Institutional Repository (PKU IR) / 北京大学机构知识库 )
Array ( [Name] => Abstract [Label] => Description [Group] => Ab [Data] => The study of intentional attackshas become an important issue onthe research of complex networks. In this paper, we study the resilience of networks, introducing the parameters that describe the attacks effect and the parameters that measure the priority of intentional attacks. Weestablish analgorithm to analysis the intentional attack phenomenon and present the numerical simulation. ? (2013) Trans Tech Publications, Switzerland. ; EI ; 0 )
Array ( [Name] => TypeDocument [Label] => Document Type [Group] => TypDoc [Data] => conference object )
Array ( [Name] => Language [Label] => Language [Group] => Lang [Data] => English )
Array ( [Name] => ISSN [Label] => ISSN [Group] => ISSN [Data] => 16627482 )
Array ( [Name] => NoteTitleSource [Label] => Relation [Group] => SrcInfo [Data] => 4th International Conference on Information Technology for Manufacturing Systems, ITMS 2013.Auckland, New zealand,421(647-651).; 1089686; http://hdl.handle.net/20.500.11897/411667 )
Array ( [Name] => DOI [Label] => DOI [Group] => ID [Data] => 10.4028/www.scientific.net/AMM.421.647 )
Array ( [Name] => URL [Label] => Availability [Group] => URL [Data] => https://hdl.handle.net/20.500.11897/411667<br />https://doi.org/10.4028/www.scientific.net/AMM.421.647 )
Array ( [Name] => AN [Label] => Accession Number [Group] => ID [Data] => edsbas.A51E40A9 )
RecordInfo Array ( [BibEntity] => Array ( [Identifiers] => Array ( [0] => Array ( [Type] => doi [Value] => 10.4028/www.scientific.net/AMM.421.647 ) ) [Languages] => Array ( [0] => Array ( [Text] => English ) ) [Titles] => Array ( [0] => Array ( [TitleFull] => Resilience to intentional attacks of complex networks [Type] => main ) ) ) [BibRelationships] => Array ( [HasContributorRelationships] => Array ( [0] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Yan, Shu ) ) ) [1] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Tang, Shao Ting ) ) ) [2] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Pei, Sen ) ) ) [3] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Jiang, Shi Jin ) ) ) [4] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Li, Wei Hua ) ) ) [5] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Teng, Xian ) ) ) [6] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Zheng, Zhi Ming ) ) ) [7] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => LMIB and School of Mathematics and Systems Science, Beihang University, Beijing, China ) ) ) [8] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => LMIB and School of Mathematical Science, Peking University, Beijing, China ) ) ) ) [IsPartOfRelationships] => Array ( [0] => Array ( [BibEntity] => Array ( [Dates] => Array ( [0] => Array ( [D] => 01 [M] => 01 [Type] => published [Y] => 2013 ) ) [Identifiers] => Array ( [0] => Array ( [Type] => issn-print [Value] => 16627482 ) [1] => Array ( [Type] => issn-locals [Value] => edsbas ) ) [Titles] => Array ( [0] => Array ( [TitleFull] => EI [Type] => main ) ) ) ) ) ) )
IllustrationInfo