Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2013, Article ID 938398, 10 pages
http://dx.doi.org/10.1155/2013/938398
Research Article

Identifying Vulnerable Nodes of Complex Networks in Cascading Failures Induced by Node-Based Attacks

1College of Mathematics and Information Science, Shandong Institute of Business and Technology, Shandong, Yantai 264005, China
2School of Computer Science, National University of Defense Technology, Hunan, Changsha 410073, China
3Information Security Center, Beijing University of Posts and Telecommunications, P.O. Box 145, Beijing 100876, China
4National Computer Network Emergency Response Technical Team/Coordination Center, Beijing 100029, China

Received 18 July 2013; Accepted 7 August 2013

Academic Editor: Ming Li

Copyright © 2013 Shudong Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [12 citations]

The following is the list of published articles that have cited the current article.

  • Jie Wang, Sheng Liu, and Jiafu Su, “Identifying vulnerable nodes in supply chain based on the risk transmission model,” 2017 6th International Conference on Industrial Technology and Management (ICITM), pp. 1–5, . View at Publisher · View at Google Scholar
  • Haiyan Han, and Rennong Yang, “Improvement on Load-Induced Cascading Failure in Asymmetrical Interdependent Networks: Modeling and Analysis,” Mathematical Problems in Engineering, vol. 2015, pp. 1–10, 2015. View at Publisher · View at Google Scholar
  • Shudong Li, Zhou Yan, Xiaobo Wu, Aiping Li, and Bin Zhou, “A Method of Emotional Analysis of Movie Based on Convolution Neural Network and Bi-directional LSTM RNN,” Proceedings - 2017 IEEE 2nd International Conference on Data Science in Cyberspace, DSC 2017, pp. 156–161, 2017. View at Publisher · View at Google Scholar
  • Jin-Tao Liu, and Ke-Ping Li, “A cascading failure model for analyzing railway accident causation,” International Journal of Modern Physics B, vol. 32, no. 1, 2017. View at Publisher · View at Google Scholar
  • Hannah S. Walsh, Andy Dong, and Irem Y. Tumer, “The structure of vulnerable nodes in behavioral network models of complex engineered systems,” Proceedings of the ASME Design Engineering Technical Conference, vol. 7, 2017. View at Publisher · View at Google Scholar
  • Yun-ming Wang, Bo Chen, Xiao-shuang Chen, and Xiu-e Gao, “ Cascading Failure Model for Command and Control Networks Based on an m -Order Adjacency Matrix ,” Mobile Information Systems, vol. 2018, pp. 1–11, 2018. View at Publisher · View at Google Scholar
  • Hannah S. Walsh, Andy Dong, and Irem Y. Tumer, “The role of bridging nodes in behavioral network models of complex engineered systems,” Design Science, vol. 4, 2018. View at Publisher · View at Google Scholar
  • Xiue Gao, Keqiu Li, and Bo Chen, “Invulnerability Measure of a Military Heterogeneous Network Based on Network Structure Entropy,” IEEE Access, vol. 6, pp. 6700–6708, 2018. View at Publisher · View at Google Scholar
  • Nasrin Hamzelou, and Mehrdad Ashtiani, “A mitigation strategy for the prevention of cascading trust failures in social networks,” Future Generation Computer Systems, vol. 94, pp. 564–586, 2019. View at Publisher · View at Google Scholar
  • Hao Zhong, Shimon Y. Nof, Hao Zhong, and Shimon Y. Nof, “Introduction,” Dynamic Lines of Collaboration, vol. 6, pp. 1–21, 2019. View at Publisher · View at Google Scholar
  • Minzhen Zheng, Shudong Li, Danna Lu, Wei Wang, Xiaobo Wu, and Dawei Zhao, “Structural Vulnerability of Power Grid Under Malicious Node-Based Attacks,” Dependability in Sensor, Cloud, and Big Data Systems and Applications, vol. 1123, pp. 446–453, 2019. View at Publisher · View at Google Scholar
  • Yixia Li, Shudong Li, Yanshan Chen, Peiyan He, Xiaobo Wu, and Weihong Han, “Electric Power Grid Invulnerability Under Intentional Edge-Based Attacks,” Dependability in Sensor, Cloud, and Big Data Systems and Applications, vol. 1123, pp. 454–461, 2019. View at Publisher · View at Google Scholar