Computational complexity of network vulnerability analysis

نویسندگان

چکیده

Abstract Residual closeness is recently proposed as a vulnerability measure to characterize the stability of complex networks. essential in analysis networks, but costly compute. Currently, fastest known algorithms run polynomial time. Motivated by fast-growing need compute measures on new for computing node and edge residual are introduced this paper. Those reduce running times Θ(n 3 ) Θ (n 4 unweighted respectively, where n number nodes.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

analysis of power in the network society

اندیشمندان و صاحب نظران علوم اجتماعی بر این باورند که مرحله تازه ای در تاریخ جوامع بشری اغاز شده است. ویژگیهای این جامعه نو را می توان پدیده هایی از جمله اقتصاد اطلاعاتی جهانی ، هندسه متغیر شبکه ای، فرهنگ مجاز واقعی ، توسعه حیرت انگیز فناوری های دیجیتال، خدمات پیوسته و نیز فشردگی زمان و مکان برشمرد. از سوی دیگر قدرت به عنوان موضوع اصلی علم سیاست جایگاه مهمی در روابط انسانی دارد، قدرت و بازتولید...

15 صفحه اول

seismic vulnerability analysis of urban roads network

while risk reduction has been mainly addressed by seismologists and engineers by now, the total impact of earthquake greatly depends on urban planning factors. the effects of planning can be considered in the socio economic and physical aspects. urban planning may have a dominant role in various earthquake phases: at the time of earthquake; rescue, and emergency, as well as temporary and perman...

متن کامل

Network Topology Vulnerability/Cost Trade-Off: Model, Application, and Computational Complexity

Technological networks (e.g. telephone and sensor networks, Internet) have provided modern society with increased efficiency, but have also exposed us to the risks posed by their vulnerability to attacks. Mitigating these risks involves designing robust network topologies in situations where resources are economically constrained. In this paper, we consider the vulnerability of network topologi...

متن کامل

An Ant Colony Optimization Algorithm for Network Vulnerability Analysis

Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...

متن کامل

Computational Complexity in Analysis

In this paper we will introduce well motivated definitions of computational complexity on type-2 objects. Similar to the model of Kawamura and Cook (and earlier models) our models will be both based on classical Turing machines and the notion of representations. The main differences to the model of Kawamura and Cook is that we give up type-2-polynomials and, additionally, use parameter based ty...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Acta Universitatis Sapientiae: Informatica

سال: 2022

ISSN: ['1844-6086', '2066-7760']

DOI: https://doi.org/10.2478/ausi-2022-0012