Mitigation of malicious attacks on networks

CM Schneider, AA Moreira… - Proceedings of the …, 2011 - National Acad Sciences
Terrorist attacks on transportation networks have traumatized modern societies. With a
single blast, it has become possible to paralyze airline traffic, electric power supply, ground …

Smart rewiring for network robustness

VHP Louzada, F Daolio, HJ Herrmann… - Journal of Complex …, 2013 - academic.oup.com
While new forms of attacks are developed every day to compromise essential infrastructures,
service providers are also expected to develop strategies to mitigate the risk of extreme …

Recovery of infrastructure networks after localised attacks

F Hu, CH Yeung, S Yang, W Wang, A Zeng - Scientific reports, 2016 - nature.com
The stability of infrastructure network is always a critical issue studied by researchers in
different fields. A lot of works have been devoted to reveal the robustness of the …

Resilience of public transport networks against attacks

B Berche, C Von Ferber, T Holovatch… - The European Physical …, 2009 - Springer
The behavior of complex networks under failure or attack depends strongly on the specific
scenario. Of special interest are scale-free networks, which are usually seen as robust under …

Enhancing network robustness against malicious attacks

A Zeng, W Liu - Physical Review E—Statistical, Nonlinear, and Soft …, 2012 - APS
In a recent work [Schneider, Proc. Natl. Acad. Sci. USA 108, 3838 (2011) PNASA6 0027-
8424 10.1073/pnas. 1009440108], the authors proposed a simple measure for network …

Vulnerability and protection of infrastructure networks

V Latora, M Marchiori - Physical Review E—Statistical, Nonlinear, and Soft …, 2005 - APS
Infrastructure systems are a key ingredient of modern society. We discuss a general method
to find the critical components of an infrastructure network, ie, the nodes and the links …

Robustness of complex networks with the local protection strategy against cascading failures

J Wang - Safety science, 2013 - Elsevier
Considering the role of the neighboring nodes of an overload node, we articulate a local
protection strategy to address the problem of the optimal defense in the cascading …

Analysis of electric grid security under terrorist threat

J Salmeron, K Wood, R Baldick - IEEE Transactions on power …, 2004 - ieeexplore.ieee.org
We describe new analytical techniques to help mitigate the disruptions to electric power
grids caused by terrorist attacks. New bilevel mathematical models and algorithms identify …

Attack vulnerability of complex communication networks

Y Xia, DJ Hill - IEEE Transactions on Circuits and Systems II …, 2008 - ieeexplore.ieee.org
The Internet has been studied as a typical example of real-world complex networks. In this
brief, we study the traffic performance of the Internet when it encounters a random or …

Optimal security hardening on attack tree models of networks: a cost-benefit analysis

R Dewri, I Ray, N Poolsappasit, D Whitley - International Journal of …, 2012 - Springer
Researchers have previously looked into the problem of determining whether a given set of
security hardening measures can effectively make a networked system secure. However …