Vulnerability of robust preferential attachment networks
power lawrobustnessmultitype branching processdiameterpercolationpreferential attachmentscale-free networkvulnerabilitykilled branching random walksmall worldmaximal degreenetwork distanceBarabási-Albert model
Applications of graph theory (05C90) Random graphs (graph-theoretic aspects) (05C80) Applications of branching processes (60J85) Interacting random processes; statistical mechanics type models; percolation theory (60K35) Graph theory (including graph drawing) in computer science (68R10) Stochastic network models in operations research (90B15)
- When is a scale-free graph ultra-small?
- Robustness of scale-free spatial networks
- Vulnerability of complex networks under three-level-tree attacks
- Robustness and Vulnerability of Scale-Free Random Graphs
- Distance evolutions in growing preferential attachment graphs
- Security of scale-free networks
- Thresholds in the resilience of modular social networks to invasion by defectors
- Vulnerability of weighted networks
- Tomography and stability of complex networks
- Robustness of spatial preferential attachment networks
- Connectivity of random graphs after centrality-based vertex removal
- Exploiting the robustness on power-law networks
- Robustness of power-law networks: its assessment and optimization
- Lyapunov-based anomaly detection in preferential attachment networks
This page was built for publication: Vulnerability of robust preferential attachment networks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q743481)