Identifying Vulnerable Nodes of Complex Networks in Cascading Failures Induced by Node-Based Attacks
Figure 4
Under RA attack, the ratio for different weighting methods as a function of for (a) SF network, (b) WS small-world network with the rewiring probability , (c) WS network with , and (d) ER random network. The simulations under RA attack are averaged over 20 times.