نتایج جستجو برای: network vulnerability
تعداد نتایج: 710634 فیلتر نتایج به سال:
Inspired by socio-political scenarios, like dictatorships, in which a minority of people exercise control over a majority of weakly interconnected individuals, we propose vulnerability and power measures defined on groups of actors of networks. We establish an unexpected connection between network vulnerability and graph regularizability. We use the Shapley value of coalition games to introduce...
A measure to quantify vulnerability under perturbations (attacks, failures, large fluctuations) in ensembles (networks) of coupled dynamical systems is proposed. Rather than addressing the issue of how the network properties change upon removal of elements of the graph (the strategy followed by most of the existing methods for studying the vulnerability of a network based on its topology), here...
Electric power SCADA (Supervisory Control and Data Acquisition) system gradually transforming from a separate private network to an open public network, seriously increases the vulnerability risk in electric power SCADA. In order to assess the vulnerability risk in electric power SCADA system, the paper firstly uses Delphi method and AHP (Analytic Hierarchy Process) to build an index system of ...
With an increasing emphasis on network security, much more attention has been attracted to the vulnerability of complex networks. The multi-scale evaluation of vulnerability is widely used since it makes use of combined powers of the links’ betweenness and has an effective evaluation to vulnerability. However, how to determine the coefficient in existing multi-scale evaluation model to measure ...
Modern information systems are geographically distributed, parallel and network-based computing systems. The vulnerability of such computing systems greatly exceed the vulnerability of stand-alone computers. This is due, primarily, to the openness scale and heterogeneity of computer networks themselves. Accordingly, there are many ways to realize modern network attacks against distributed, para...
In this paper, we propose a quantification of the vulnerability of a communication network where links are subject to failures due to the actions of a strategic adversary. We model the adversarial nature of the problem as a 2-player game between a network manager who chooses a spanning tree of the network as communication infrastructure and an attacker who is trying to disrupt the communication...
nowadays, environmental impact assessment (eia) is a one of planning tool that used for the prediction of environmental impacts. there are several methods to assess environmental impacts in the world. degradation model is one of the mathematics models that investigates and predicts data for assessing the impact of development. degradation model consist degradation coefficient per ecology unit, ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید