Research Article

Complexity and Vulnerability Analysis of Critical Infrastructures: A Methodological Approach

Figure 8

Changes of network efficiency with the largest degree node-based protocol.