Research Article

Identifying Vulnerable Nodes of Complex Networks in Cascading Failures Induced by Node-Based Attacks

Figure 6

Under HL attack, the ratio for different weighting methods as a function of for (a) the autonomous system network (AS) and (b) US airport network.
938398.fig.006a
(a)
938398.fig.006b
(b)