Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2013, Article ID 938398, 10 pages
http://dx.doi.org/10.1155/2013/938398
Research Article

Identifying Vulnerable Nodes of Complex Networks in Cascading Failures Induced by Node-Based Attacks

1College of Mathematics and Information Science, Shandong Institute of Business and Technology, Shandong, Yantai 264005, China
2School of Computer Science, National University of Defense Technology, Hunan, Changsha 410073, China
3Information Security Center, Beijing University of Posts and Telecommunications, P.O. Box 145, Beijing 100876, China
4National Computer Network Emergency Response Technical Team/Coordination Center, Beijing 100029, China

Received 18 July 2013; Accepted 7 August 2013

Academic Editor: Ming Li

Copyright © 2013 Shudong Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [5 citations]

The following is the list of published articles that have cited the current article.

  • Jie Wang, Sheng Liu, and Jiafu Su, “Identifying vulnerable nodes in supply chain based on the risk transmission model,” 2017 6th International Conference on Industrial Technology and Management (ICITM), pp. 1–5, . View at Publisher · View at Google Scholar
  • Haiyan Han, and Rennong Yang, “Improvement on Load-Induced Cascading Failure in Asymmetrical Interdependent Networks: Modeling and Analysis,” Mathematical Problems in Engineering, vol. 2015, pp. 1–10, 2015. View at Publisher · View at Google Scholar
  • Shudong Li, Zhou Yan, Xiaobo Wu, Aiping Li, and Bin Zhou, “A Method of Emotional Analysis of Movie Based on Convolution Neural Network and Bi-directional LSTM RNN,” Proceedings - 2017 IEEE 2nd International Conference on Data Science in Cyberspace, DSC 2017, pp. 156–161, 2017. View at Publisher · View at Google Scholar
  • Hannah S. Walsh, Andy Dong, and Irem Y. Tumer, “The structure of vulnerable nodes in behavioral network models of complex engineered systems,” Proceedings of the ASME Design Engineering Technical Conference, vol. 7, 2017. View at Publisher · View at Google Scholar
  • Xiue Gao, Keqiu Li, and Bo Chen, “Invulnerability Measure of a Military Heterogeneous Network Based on Network Structure Entropy,” IEEE Access, vol. 6, pp. 6700–6708, 2018. View at Publisher · View at Google Scholar