Identification of key components after unintentional failures for cascading failure protection

X Li, T Pan, K Pan - IEEE Transactions on Network Science …, 2022 - ieeexplore.ieee.org
Cascading failure can aggravate the vulnerability of power grids, which brings attention to
cascading failure protection research. Existing works focus on either finding the critical …

Network resilience and the length-bounded multicut problem: reaching the dynamic billion-scale with guarantees

A Kuhnle, VG Crawford, MT Thai - … of the ACM on Measurement and …, 2018 - dl.acm.org
Motivated by networked systems in which the functionality of the network depends on
vertices in the network being within a bounded distance T of each other, we study the length …

The key technology of computer network vulnerability assessment based on neural network

S Wang - EURASIP Journal on Wireless Communications and …, 2020 - Springer
With the wide application of computer network, network security has attracted more and
more attention. The main reason why all kinds of attacks on the network can pose a great …

Scalable approximations to k-cycle transversal problems on dynamic networks

A Kuhnle, VG Crawford, MT Thai - Knowledge and Information Systems, 2019 - Springer
We study scalable approximation algorithms for the k-cycle transversal problem, which is to
find a minimum-size set of edges that intersects all simple cycles of length k in a network …

Scalable Algorithms for Vulnerability Assessment of Large-Scale Networked Systems

A Kuhnle - 2018 - search.proquest.com
In this work, problems relevant to network reliability are studied; vulnerability assessments
are proposed for network clustering and length-bounded cutting problems. Since modern …