Research Article

Identifying Vulnerable Nodes of Complex Networks in Cascading Failures Induced by Node-Based Attacks

Figure 2

Under RA and HL attacks, the relative size of nodes in the largest component as a function of for (a) SF network, (b) WS small-world network with the rewiring probability , (c) WS network with , and (d) ER random network. The simulations under RA attack are averaged over 20 times.
938398.fig.002a
(a)
938398.fig.002b
(b)
938398.fig.002c
(c)
938398.fig.002d
(d)