Computational complexity of network vulnerability analysis
نویسندگان
چکیده
Abstract Residual closeness is recently proposed as a vulnerability measure to characterize the stability of complex networks. essential in analysis networks, but costly compute. Currently, fastest known algorithms run polynomial time. Motivated by fast-growing need compute measures on new for computing node and edge residual are introduced this paper. Those reduce running times Θ(n 3 ) Θ (n 4 unweighted respectively, where n number nodes.
منابع مشابه
analysis of power in the network society
اندیشمندان و صاحب نظران علوم اجتماعی بر این باورند که مرحله تازه ای در تاریخ جوامع بشری اغاز شده است. ویژگیهای این جامعه نو را می توان پدیده هایی از جمله اقتصاد اطلاعاتی جهانی ، هندسه متغیر شبکه ای، فرهنگ مجاز واقعی ، توسعه حیرت انگیز فناوری های دیجیتال، خدمات پیوسته و نیز فشردگی زمان و مکان برشمرد. از سوی دیگر قدرت به عنوان موضوع اصلی علم سیاست جایگاه مهمی در روابط انسانی دارد، قدرت و بازتولید...
15 صفحه اولseismic vulnerability analysis of urban roads network
while risk reduction has been mainly addressed by seismologists and engineers by now, the total impact of earthquake greatly depends on urban planning factors. the effects of planning can be considered in the socio economic and physical aspects. urban planning may have a dominant role in various earthquake phases: at the time of earthquake; rescue, and emergency, as well as temporary and perman...
متن کاملNetwork Topology Vulnerability/Cost Trade-Off: Model, Application, and Computational Complexity
Technological networks (e.g. telephone and sensor networks, Internet) have provided modern society with increased efficiency, but have also exposed us to the risks posed by their vulnerability to attacks. Mitigating these risks involves designing robust network topologies in situations where resources are economically constrained. In this paper, we consider the vulnerability of network topologi...
متن کاملAn Ant Colony Optimization Algorithm for Network Vulnerability Analysis
Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...
متن کاملComputational Complexity in Analysis
In this paper we will introduce well motivated definitions of computational complexity on type-2 objects. Similar to the model of Kawamura and Cook (and earlier models) our models will be both based on classical Turing machines and the notion of representations. The main differences to the model of Kawamura and Cook is that we give up type-2-polynomials and, additionally, use parameter based ty...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Acta Universitatis Sapientiae: Informatica
سال: 2022
ISSN: ['1844-6086', '2066-7760']
DOI: https://doi.org/10.2478/ausi-2022-0012