Conference
Resilience to intentional attacks of complex networks
العنوان: | Resilience to intentional attacks of complex networks |
---|---|
المؤلفون: | Yan, Shu, Tang, Shao Ting, Pei, Sen, Jiang, Shi Jin, Li, Wei Hua, Teng, Xian, Zheng, Zhi Ming |
المساهمون: | LMIB and School of Mathematics and Systems Science, Beihang University, Beijing, China, LMIB and School of Mathematical Science, Peking University, Beijing, China |
المصدر: | EI |
سنة النشر: | 2013 |
المجموعة: | Peking University Institutional Repository (PKU IR) / 北京大学机构知识库 |
الوصف: | The study of intentional attackshas become an important issue onthe research of complex networks. In this paper, we study the resilience of networks, introducing the parameters that describe the attacks effect and the parameters that measure the priority of intentional attacks. Weestablish analgorithm to analysis the intentional attack phenomenon and present the numerical simulation. ? (2013) Trans Tech Publications, Switzerland. ; EI ; 0 |
نوع الوثيقة: | conference object |
اللغة: | English |
تدمد: | 16627482 |
Relation: | 4th International Conference on Information Technology for Manufacturing Systems, ITMS 2013.Auckland, New zealand,421(647-651).; 1089686; http://hdl.handle.net/20.500.11897/411667 |
DOI: | 10.4028/www.scientific.net/AMM.421.647 |
الاتاحة: | https://hdl.handle.net/20.500.11897/411667 https://doi.org/10.4028/www.scientific.net/AMM.421.647 |
رقم الانضمام: | edsbas.A51E40A9 |
قاعدة البيانات: | BASE |
ResultId |
1 |
---|---|
Header |
edsbas BASE edsbas.A51E40A9 790 3 Conference conference 790.314270019531 |
PLink |
https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=edsbas&AN=edsbas.A51E40A9&custid=s6537998&authtype=sso |
FullText |
Array
(
[Availability] => 0
)
Array ( [0] => Array ( [Url] => https://hdl.handle.net/20.500.11897/411667# [Name] => EDS - BASE [Category] => fullText [Text] => View record in BASE [MouseOverText] => View record in BASE ) ) |
Items |
Array
(
[Name] => Title
[Label] => Title
[Group] => Ti
[Data] => Resilience to intentional attacks of complex networks
)
Array ( [Name] => Author [Label] => Authors [Group] => Au [Data] => <searchLink fieldCode="AR" term="%22Yan%2C+Shu%22">Yan, Shu</searchLink><br /><searchLink fieldCode="AR" term="%22Tang%2C+Shao+Ting%22">Tang, Shao Ting</searchLink><br /><searchLink fieldCode="AR" term="%22Pei%2C+Sen%22">Pei, Sen</searchLink><br /><searchLink fieldCode="AR" term="%22Jiang%2C+Shi+Jin%22">Jiang, Shi Jin</searchLink><br /><searchLink fieldCode="AR" term="%22Li%2C+Wei+Hua%22">Li, Wei Hua</searchLink><br /><searchLink fieldCode="AR" term="%22Teng%2C+Xian%22">Teng, Xian</searchLink><br /><searchLink fieldCode="AR" term="%22Zheng%2C+Zhi+Ming%22">Zheng, Zhi Ming</searchLink> ) Array ( [Name] => Author [Label] => Contributors [Group] => Au [Data] => LMIB and School of Mathematics and Systems Science, Beihang University, Beijing, China<br />LMIB and School of Mathematical Science, Peking University, Beijing, China ) Array ( [Name] => TitleSource [Label] => Source [Group] => Src [Data] => EI ) Array ( [Name] => DatePubCY [Label] => Publication Year [Group] => Date [Data] => 2013 ) Array ( [Name] => Subset [Label] => Collection [Group] => HoldingsInfo [Data] => Peking University Institutional Repository (PKU IR) / 北京大学机构知识库 ) Array ( [Name] => Abstract [Label] => Description [Group] => Ab [Data] => The study of intentional attackshas become an important issue onthe research of complex networks. In this paper, we study the resilience of networks, introducing the parameters that describe the attacks effect and the parameters that measure the priority of intentional attacks. Weestablish analgorithm to analysis the intentional attack phenomenon and present the numerical simulation. ? (2013) Trans Tech Publications, Switzerland. ; EI ; 0 ) Array ( [Name] => TypeDocument [Label] => Document Type [Group] => TypDoc [Data] => conference object ) Array ( [Name] => Language [Label] => Language [Group] => Lang [Data] => English ) Array ( [Name] => ISSN [Label] => ISSN [Group] => ISSN [Data] => 16627482 ) Array ( [Name] => NoteTitleSource [Label] => Relation [Group] => SrcInfo [Data] => 4th International Conference on Information Technology for Manufacturing Systems, ITMS 2013.Auckland, New zealand,421(647-651).; 1089686; http://hdl.handle.net/20.500.11897/411667 ) Array ( [Name] => DOI [Label] => DOI [Group] => ID [Data] => 10.4028/www.scientific.net/AMM.421.647 ) Array ( [Name] => URL [Label] => Availability [Group] => URL [Data] => https://hdl.handle.net/20.500.11897/411667<br />https://doi.org/10.4028/www.scientific.net/AMM.421.647 ) Array ( [Name] => AN [Label] => Accession Number [Group] => ID [Data] => edsbas.A51E40A9 ) |
RecordInfo |
Array
(
[BibEntity] => Array
(
[Identifiers] => Array
(
[0] => Array
(
[Type] => doi
[Value] => 10.4028/www.scientific.net/AMM.421.647
)
)
[Languages] => Array
(
[0] => Array
(
[Text] => English
)
)
[Titles] => Array
(
[0] => Array
(
[TitleFull] => Resilience to intentional attacks of complex networks
[Type] => main
)
)
)
[BibRelationships] => Array
(
[HasContributorRelationships] => Array
(
[0] => Array
(
[PersonEntity] => Array
(
[Name] => Array
(
[NameFull] => Yan, Shu
)
)
)
[1] => Array
(
[PersonEntity] => Array
(
[Name] => Array
(
[NameFull] => Tang, Shao Ting
)
)
)
[2] => Array
(
[PersonEntity] => Array
(
[Name] => Array
(
[NameFull] => Pei, Sen
)
)
)
[3] => Array
(
[PersonEntity] => Array
(
[Name] => Array
(
[NameFull] => Jiang, Shi Jin
)
)
)
[4] => Array
(
[PersonEntity] => Array
(
[Name] => Array
(
[NameFull] => Li, Wei Hua
)
)
)
[5] => Array
(
[PersonEntity] => Array
(
[Name] => Array
(
[NameFull] => Teng, Xian
)
)
)
[6] => Array
(
[PersonEntity] => Array
(
[Name] => Array
(
[NameFull] => Zheng, Zhi Ming
)
)
)
[7] => Array
(
[PersonEntity] => Array
(
[Name] => Array
(
[NameFull] => LMIB and School of Mathematics and Systems Science, Beihang University, Beijing, China
)
)
)
[8] => Array
(
[PersonEntity] => Array
(
[Name] => Array
(
[NameFull] => LMIB and School of Mathematical Science, Peking University, Beijing, China
)
)
)
)
[IsPartOfRelationships] => Array
(
[0] => Array
(
[BibEntity] => Array
(
[Dates] => Array
(
[0] => Array
(
[D] => 01
[M] => 01
[Type] => published
[Y] => 2013
)
)
[Identifiers] => Array
(
[0] => Array
(
[Type] => issn-print
[Value] => 16627482
)
[1] => Array
(
[Type] => issn-locals
[Value] => edsbas
)
)
[Titles] => Array
(
[0] => Array
(
[TitleFull] => EI
[Type] => main
)
)
)
)
)
)
)
|
IllustrationInfo |