|
|
|
|
LEADER |
02126nmm a2200373 u 4500 |
001 |
EB000364709 |
003 |
EBX01000000000000000217761 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
130626 ||| eng |
020 |
|
|
|a 9781461448600
|
100 |
1 |
|
|a Zhou, Qing
|
245 |
0 |
0 |
|a Network Robustness under Large-Scale Attacks
|h Elektronische Ressource
|c by Qing Zhou, Long Gao, Ruifang Liu, Shuguang Cui
|
250 |
|
|
|a 1st ed. 2013
|
260 |
|
|
|a New York, NY
|b Springer New York
|c 2013, 2013
|
300 |
|
|
|a VIII, 41 p. 12 illus
|b online resource
|
505 |
0 |
|
|a Introduction -- System Models -- Link-Level Network Robustness to Area Attacks -- Network-Wide Robustness to Area Attacks -- Simulation Results -- Conclusion
|
653 |
|
|
|a Computer Communication Networks
|
653 |
|
|
|a Data Structures and Information Theory
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Information theory
|
653 |
|
|
|a Telecommunication
|
653 |
|
|
|a Data structures (Computer science)
|
653 |
|
|
|a Communications Engineering, Networks
|
700 |
1 |
|
|a Gao, Long
|e [author]
|
700 |
1 |
|
|a Liu, Ruifang
|e [author]
|
700 |
1 |
|
|a Cui, Shuguang
|e [author]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a SpringerBriefs in Computer Science
|
028 |
5 |
0 |
|a 10.1007/978-1-4614-4860-0
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-1-4614-4860-0?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 621.382
|
520 |
|
|
|a Network Robustness under Large-Scale Attacks provides the analysis of network robustness under attacks, with a focus on large-scale correlated physical attacks. The book begins with a thorough overview of the latest research and techniques to analyze the network responses to different types of attacks over various network topologies and connection models. It then introduces a new large-scale physical attack model coined as area attack, under which a new network robustness measure is introduced and applied to study the network responses. With this book, readers will learn the necessary tools to evaluate how a complex network responds to random and possibly correlated attacks
|