نتایج جستجو برای: graph vulnerability

تعداد نتایج: 239961  

2002
ALPAY KIRLANGIÇ

The scattering number of a graph G, denoted sc(G), is defined by sc(G)=max{c(G−S)− |S| : S ⊆ V(G) and c(G−S)≠ 1} where c(G−S) denotes the number of components in G− S. It is one measure of graph vulnerability. In this paper, general results on the scattering number of a graph are considered. Firstly, some bounds on the scattering number are given. Further, scattering number of a binomial tree i...

Journal: :IEEE Transactions on Power Systems 2021

During major power system disturbances, when multiple component outages occur in rapid succession, it becomes crucial to quickly identify the transmission interconnections that have limited transfer capability. Understanding impact of an outage on these critical (called saturated cut-sets) is important for enhancing situational awareness and taking correct actions. This paper proposes a new gra...

1997
Laura Painton Swiler Timothy Gaylor

This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps,...

Journal: :Chaos 2007
Stefano Boccaletti Javier Buldú Regino Criado Julio Flores Vito Latora Javier Pello Miguel Romance

We present a novel approach to quantify the vulnerability of a complex network, i.e., the capacity of a graph to maintain its functional performance under random damages or malicious attacks. The proposed measure represents a multiscale evaluation of vulnerability, and makes use of combined powers of the links' betweenness. We show that the proposed approach is able to properly describe some ca...

Journal: :Mathematical and Computer Modelling 2013
Joanna A. Gutiérrez-Pérez Manuel Herrera Rafael Pérez-García Eva Ramos-Martínez

Many critical infrastructures consist of networks with complex structure, since they have highly interdependent elements and nontrivial designs with a degree of complexity that depends on the settings and level of interaction between these elements. The theory of complex networks employs techniques borrowed from graph theory to classify different types of networks, analyse their structures, and...

2016
Ersin Aslan Celal Bayar

The scattering number is a measure of the vulnerability of a graph. In this paper we investigate a refinement that involves the neighbour isolated version of the parameter. The neighbour isolated scattering number of a noncomplete graph G is defined to be NIS(G) =max{i(G/X )−|X | : i(G/X )3⁄4 1} where the maximum is taken over all X , the cut strategy of G, and i(G/X ) is the number of componen...

2006
Kameswari Kotapati Peng Liu Thomas F. LaPorta

This paper presents aCAT Advanced Cellular Network Vulnerability Assessment Toolkit, a graph based end-to-end vulnerability assessment tool for 3G networks. The novelties of this tool include (1) usage of technical specifications written in the Specification and Description Language (SDL); (2) the definition of a network dependency model for accurate chain derivation; and (3) exhaustive attack ...

Journal: :Network Science 2015
Enrico Bozzo Massimo Franceschet Franca Rinaldi

Inspired by socio-political scenarios, like dictatorships, in which a minority of people exercise control over a majority of weakly interconnected individuals, we propose vulnerability and power measures defined on groups of actors of networks. We establish an unexpected connection between network vulnerability and graph regularizability. We use the Shapley value of coalition games to introduce...

Journal: :Discrete Applied Mathematics 1997
Dieter Kratsch Ton Kloks Haiko Müller

A general method for the computation of various parameters measuring the vulnerability of a graph is introduced. Four measures of vulnerability are considered, i.e., the toughness, scattering number, vertex integrity and the size of a minimum balanced separator. We show how to compute these parameters by polynomial time algorithms for various classes of intersection graphs like permutation grap...

2012
Fengwei Li

The tenacity of an incomplete connected graph G is defined as T (G) = min{ |S|+m(G−S) ω(G−S) : S ⊂ V (G), ω(G− S) > 1}, where ω(G− S) and m(G− S), respectively, denote the number of components and the order of a largest component inG−S. This is a reasonable parameter to measure the vulnerability of networks, as it takes into account both the amount of work done to damage the network and how bad...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید