Attack Vulnerability of Public Transport Networks
نویسندگان
چکیده
1 Applied Mathematics Research Centre, Coventry University, Coventry CV1 5FB, UK [email protected] 2 Physikalisches Institut, Universität Freiburg, 79104 Freiburg, Germany 3 Ivan Franko National University of Lviv, 79005 Lviv, Ukraine 4 Institute for Condensed Matter Physics of the National Academy of Sciences of Ukraine, 79011 Lviv, Ukraine 5 Institut für Theoretische Physik, Johannes Kepler Universität Linz, 4040 Linz, Austria [email protected]
منابع مشابه
Public Transport Networks under Random Failure and Directed Attack
The behaviour of complex networks under failure or attack depends strongly on the specific scenario. Of special interest are scale-free networks, which are usually seen as robust under random failure but appear to be especially vulnerable to targeted attacks. In a recent study of public transport networks of 14 major cities of the world we have shown that these systems when represented by appro...
متن کاملResilience of public transport networks against attacks
The behavior of complex networks under failure or attack depends strongly on the specific scenario. Of special interest are scale-free networks, which are usually seen as robust under random failure but appear to be especially vulnerable to targeted attacks. In recent studies of public transport networks of fourteen major cities of the world it was shown that these systems when represented by a...
متن کاملVULNERABILITY ASSESSMENT OF WATER DISTRIBUTION NETWORKS: GRAPH THEORY METHOD
The main functional purpose of a water distribution network is to transport water from a source to several domestic and industrial units while at the same time satisfying various requirements on hydraulic response. All the water distribution networks perform two basic operations: firstly the water network needs to deliver adequate amounts of water to meet specific requirements, and secondly the...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاململزومات امنیتی پیادهسازی IMS SIP سرور امن
IMS (IP Multimedia Subsystem) network is considered as an NGN (Next Generation Network) core networks by ETSI. Decomposition of IMS core network has resulted in a rapid increase of control and signaling message that makes security a required capability for IMS commercialization. The control messages are transmitted using SIP (Session Initiation Protocol) which is an application layer protocol. ...
متن کاملVulnerability Analysis of Public Transport Networks: a Dynamic Approach and Case Study for Stockholm
In this paper, a dynamic and stochastic notion of public transport network vulnerability is develoepd. While previous studies have considered only the network topology, the non-continuous availability of services requires a more refined model for supply and demand interactions in order to evaluate the impacts of disruptions. We extend the measures of betweenness centrality (often used to identi...
متن کامل