Research Article

Vulnerability Analysis of Interdependent Scale-Free Networks with Complex Coupling

Figure 5

Maximum node attack.