نتایج جستجو برای: network vulnerability

تعداد نتایج: 710634  

Journal: :Network Science 2015
Enrico Bozzo Massimo Franceschet Franca Rinaldi

Inspired by socio-political scenarios, like dictatorships, in which a minority of people exercise control over a majority of weakly interconnected individuals, we propose vulnerability and power measures defined on groups of actors of networks. We establish an unexpected connection between network vulnerability and graph regularizability. We use the Shapley value of coalition games to introduce...

2011
Ricardo Gutiérrez Francisco del-Pozo Stefano Boccaletti

A measure to quantify vulnerability under perturbations (attacks, failures, large fluctuations) in ensembles (networks) of coupled dynamical systems is proposed. Rather than addressing the issue of how the network properties change upon removal of elements of the graph (the strategy followed by most of the existing methods for studying the vulnerability of a network based on its topology), here...

Journal: :Transportation Research Part E: Logistics and Transportation Review 2017

2014
Yuancheng Li Shengnan Chu

Electric power SCADA (Supervisory Control and Data Acquisition) system gradually transforming from a separate private network to an open public network, seriously increases the vulnerability risk in electric power SCADA. In order to assess the vulnerability risk in electric power SCADA system, the paper firstly uses Delphi method and AHP (Analytic Hierarchy Process) to build an index system of ...

Journal: :CoRR 2014
Li Gou Bo Wei Rehan Sadiq Sankaran Mahadevan Yong Deng

With an increasing emphasis on network security, much more attention has been attracted to the vulnerability of complex networks. The multi-scale evaluation of vulnerability is widely used since it makes use of combined powers of the links’ betweenness and has an effective evaluation to vulnerability. However, how to determine the coefficient in existing multi-scale evaluation model to measure ...

Journal: :JoWUA 2016
Igor V. Kotenko

Modern information systems are geographically distributed, parallel and network-based computing systems. The vulnerability of such computing systems greatly exceed the vulnerability of stand-alone computers. This is due, primarily, to the openness scale and heterogeneity of computer networks themselves. Accordingly, there are many ways to realize modern network attacks against distributed, para...

2012
Assane Gueye Vladimir Marbukh Jean C. Walrand

In this paper, we propose a quantification of the vulnerability of a communication network where links are subject to failures due to the actions of a strategic adversary. We model the adversarial nature of the problem as a 2-player game between a network manager who chooses a spanning tree of the network as communication infrastructure and an attacker who is trying to disrupt the communication...

Journal: :محیط شناسی 0
غلامرضا یاوری دکترای اقتصاد کشاورزی استادیاردانشگاه پیام نور، گروه علمی اقتصاد کشاورزی محمد مهدی فاضل بیگی کارشناس ارشد توسعه روستایی، دانشگاه آزاد اسلامی- واحد علوم و تحقیقات، تهران

nowadays, environmental impact assessment (eia) is a one of planning tool that used for the prediction of environmental impacts. there are several methods to assess environmental impacts in the world. degradation model is one of the mathematics models that investigates and predicts data for assessing the impact of development. degradation model consist degradation coefficient per ecology unit, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید