Complex systems and network science: a survey

K Yang, J Li, M Liu, T Lei, X Xu, H Wu… - Journal of systems …, 2023 - ieeexplore.ieee.org
Complex systems widely exist in nature and human society. There are complex interactions
between system elements in a complex system, and systems show complex features at the …

Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes

S Wang, J Sun, J Zhang, Q Dong, X Gu… - International Journal of …, 2023 - Elsevier
In recent years, some game models were proposed to protect critical infrastructure networks.
But they mainly focused on the protection of key nodes, and there are rarely models to …

[HTML][HTML] Mitigating adversarial cascades in large graph environments

JD Cunningham, CS Tucker - Expert Systems with Applications, 2024 - Elsevier
A significant amount of society's infrastructure can be modeled using graph structures, from
electric and communication grids, to traffic networks, to social networks. Each of these …

An attack–defense game model in infrastructure networks under link hiding

G Qi, J Li, X Xu, G Chen, K Yang - Chaos: An Interdisciplinary Journal …, 2022 - pubs.aip.org
Our increasing dependence on infrastructure networks leads to growing concerns over the
protection of these networks. Many methods have been proposed to select protective …

Identifying important nodes affecting network security in complex networks

Y Liu, J Wang, H He, G Huang… - International Journal of …, 2021 - journals.sagepub.com
An important node identification algorithm based on an improved structural hole and K-shell
decomposition algorithm is proposed to identify important nodes that affect security in …

Hardening Active Directory Graphs via Evolutionary Diversity Optimization based Policies

D Goel, M Ward, A Neumann, F Neumann… - ACM Transactions on …, 2024 - dl.acm.org
Active Directory (AD) is the default security management system for Windows domain
networks. An AD environment can be described as a cyber-attack graph, with nodes …

Attack and Defense Game with Intuitionistic Fuzzy Payoffs in Infrastructure Networks

Y Dong, J Liu, J Ren, Z Li, W Li - Tsinghua Science and …, 2024 - ieeexplore.ieee.org
Due to our increasing dependence on infrastructure networks, the attack and defense game
in these networks has draw great concerns from security agencies. Moreover, when it comes …

An attack-defense game on interdependent networks

R Peng, D Wu, M Sun, S Wu - Journal of the Operational Research …, 2021 - Taylor & Francis
This paper analyzes the optimal strategies for an attacker and a defender in an attack-
defense game on a network consisting of interdependent subnetworks. The defender moves …

Modelling and research on intuitionistic fuzzy goal-based attack and defence game for infrastructure networks

Z Li, J Liu, Y Dong, J Ren, W Li - Entropy, 2023 - mdpi.com
Network attack and defence games are gradually becoming a new approach through which
to study the protection of infrastructure networks such as power grids and transportation …

An Effective Node Injection Approach for Attacking Social Network Alignment

S Jiang, Y Qiu, X Mo, R Tang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The importance of social network alignment (SNA) for various downstream applications,
such as social network information fusion and e-commerce recommendation, has prompted …