Network Robustness under Large-Scale Attacks (SpringerBriefs by Qing Zhou,Long Gao,Ruifang Liu,Shuguang Cui

By Qing Zhou,Long Gao,Ruifang Liu,Shuguang Cui

Network Robustness less than Large-Scale Attacks provides the research of community robustness less than assaults, with a spotlight on large-scale correlated actual assaults. The booklet starts off with a radical evaluate of the newest examine and methods to investigate the community responses to kinds of assaults over a number of community topologies and connection types. It then introduces a brand new large-scale actual assault version coined as sector assault, less than which a brand new community robustness degree is brought and utilized to review the community responses. With this e-book, readers will study the necessary instruments to judge how a posh community responds to random and doubtless correlated attacks.

Show description

Read or Download Network Robustness under Large-Scale Attacks (SpringerBriefs in Computer Science) PDF

Best computer information theory books

Security and Privacy in User Modeling (Human–Computer Interaction Series)

User-adaptive (or "personalized") platforms take person personality­ istics in their present clients into consideration and adapt their habit ac­ cordingly. numerous empirical reviews display their merits in components like schooling and coaching, on-line aid for advanced software program, dynamic info supply, provision of computing device entry to individuals with dis­ talents, and to a point info retrieval.

A Computable Universe:Understanding and Exploring Nature as Computation

This quantity, with a foreword through Sir Roger Penrose, discusses the principles of computation with regards to nature. It specializes in major questions: what's computation? How does nature compute? The participants are world-renowned specialists who've contributed to shaping a state-of-the-art computational figuring out of the universe.

Biometrics in the New World: The Cloud, Mobile Technology and Pervasive Identity

This e-book takes a clean examine biometrics and id administration, extending the discussion past technical issues, and exploring a number of the broader societal and philosophical facets surrounding using biometric purposes. positive aspects: provides a short heritage of the improvement of biometrics, and describes a number of the popularly held misconceptions surrounding the know-how; investigates the demanding situations and chances of biometrics throughout 3rd get together infrastructures and on cellular computing units; presents information on biometric structures layout; explores the mechanisms essential to allow id intelligence, together with logging mechanisms, information communications and knowledge codecs; discusses such utilization concerns as collaboration frameworks, and messaging and information translation; examines the impression of biometric applied sciences on society, masking problems with privateness and consumer components; experiences the present scenario in id administration, and predicts the place those tendencies could take us sooner or later.

Physical-Layer Security for Cooperative Relay Networks (Wireless Networks)

This publication provides physical-layer defense as a promising paradigm for reaching the information-theoretic secrecy required for instant networks. It explains how instant networks are tremendous prone to eavesdropping assaults and discusses more than a few safety concepts together with information-theoretic defense, man made noise aided safeguard, security-oriented beamforming, and variety assisted protection ways.

Extra info for Network Robustness under Large-Scale Attacks (SpringerBriefs in Computer Science)

Example text

Download PDF sample

Rated 4.06 of 5 – based on 50 votes