Research Article

Identifying Vulnerable Nodes of Complex Networks in Cascading Failures Induced by Node-Based Attacks

Figure 1

The iterative process of cascading failures in complex networks.
938398.fig.001