Identifying Vulnerable Nodes of Complex Networks in Cascading Failures Induced by Node-Based Attacks
Figure 2
Under RA and HL attacks, the relative size of nodes in the largest component as a function of for (a) SF network, (b) WS small-world network with the rewiring probability , (c) WS network with , and (d) ER random network. The simulations under RA attack are averaged over 20 times.