Security analysis of CPS systems under different swapping strategies in IoT environments

H Peng, C Liu, D Zhao, H Ye, Z Fang, W Wang - IEEE Access, 2020 - ieeexplore.ieee.org
In this paper, we give attention to the robustness of the Cyber-Physical System, which
consists of interdependent physical resources and computational resources. Numerous …

[HTML][HTML] Multiple scenario simulation and optimization of an urban green infrastructure network based on complex network theory: a case study in Harbin City, China

S Song, SH Wang, MX Shi, SS Hu, DW Xu - Ecological Processes, 2022 - Springer
Background Urban green infrastructure (GI) networks play a significant role in ensuring
regional ecological security; however, they are highly vulnerable to the influence of urban …

Identifying critical nodes' group in complex networks

ZY Jiang, Y Zeng, ZH Liu, JF Ma - Physica A: Statistical Mechanics and its …, 2019 - Elsevier
Recently, network vulnerability or security has attracted much attention in various networked
systems, and especially in security related attacks or protections, there are a set of influential …

[HTML][HTML] Integrating pattern, process, and function in urban landscape ecological network planning: A case study of Harbin central city

S Song, Y Gong, Y Yu - Ecological Indicators, 2024 - Elsevier
Scientific planning of landscape ecological networks can promote the overall improvement
of urban ecosystems, but the current basis on single index and simple landscape ecological …

[HTML][HTML] Maximizing network resilience against malicious attacks

W Li, Y Li, Y Tan, Y Cao, C Chen, Y Cai, KY Lee… - Scientific reports, 2019 - nature.com
The threat of a malicious attack is one of the major security problems in complex networks.
Resilience is the system-level self-adjusting ability of a complex network to retain its basic …

Measure of invulnerability for command and control network based on mission link

W Yunming, C Si, P Chengsheng, C Bo - Information Sciences, 2018 - Elsevier
Abstract In Command and Control (C2) network, the measure of invulnerability mainly
focuses on structural characteristics of the network, where the operational mission has not …

Reliability analysis of interdependent hypergraph network under different attack strategies

H Peng, Z Xie, D Zhao, M Zhong, J Han… - International Journal of …, 2023 - World Scientific
Nodes usually cooperate to form groups and survive or fail in real-world systems.
Researchers typically consider the interdependence between node groups in studying the …

An efficient link closing strategy for improving traffic capacity on scale-free networks

J Zhang, J Ma, HJ Li - Physica A: Statistical Mechanics and its Applications, 2022 - Elsevier
Network structure and its traffic capacity are closely related. A reasonable layout of the
network structure can bring a larger traffic capacity. In this paper, a high-contraction …

Incremental routing strategy on scale-free networks

ZY Jiang, MG Liang - Physica A: Statistical Mechanics and its Applications, 2013 - Elsevier
The most important function of a network is for transporting traffic. Due to the low traffic
capacity of network systems under the global shortest path routing, plenty of heuristic routing …

Regional economic vulnerability based on investment and financing network attacks

Q Lu, B Ding, J Gu - Cities, 2024 - Elsevier
Amidst challenges like industrial shifts, financial systemic risks, and COVID-19 impacts,
assessing China's regional economic vulnerability is crucial for sustainable growth …