Research Article
Identifying Vulnerable Nodes of Complex Networks in Cascading Failures Induced by Node-Based Attacks
Figure 6
Under HL attack, the ratio for different weighting methods as a function of for (a) the autonomous system network (AS) and (b) US airport network.