Research Article

Identifying Vulnerable Nodes of Complex Networks in Cascading Failures Induced by Node-Based Attacks

Figure 3

Under HL attack, the ratio for different weighting methods as a function of for (a) SF network, (b) WS small-world network with the rewiring probability , (c) WS network with , and (d) ER random network.
938398.fig.003a
(a)
938398.fig.003b
(b)
938398.fig.003c
(c)
938398.fig.003d
(d)