Please use this identifier to cite or link to this item:
http://hdl.handle.net/20.500.12188/25092
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Mishkovski, Igor | en_US |
dc.contributor.author | Filiposka, Sonja | en_US |
dc.contributor.author | Gramatikov, Sasho | en_US |
dc.contributor.author | Trajanov, Dimitar | en_US |
dc.contributor.author | Kocarev, Ljupcho | en_US |
dc.date.accessioned | 2022-12-22T12:19:37Z | - |
dc.date.available | 2022-12-22T12:19:37Z | - |
dc.date.issued | 2010 | - |
dc.identifier.uri | http://hdl.handle.net/20.500.12188/25092 | - |
dc.description.abstract | Complex networks have been an up-and-coming exciting field in the realm of interactions. With their widespread use appearing on the horizon it is ever more vital to be able to measure their vulnerability as a function of their topology. Precisely, discovering vulnerable links, disposed to attacks, can help in hardening these links and by that providing more secure and reliable network structure. This paper addresses the link vulnerability of different topologies of complex networks such as: random networks, geographic random networks, small world networks and scale-free networks. We introduce measure for vulnerability of complex networks, and prove by simulations that network vulnerability heavily depends on the network topology. | en_US |
dc.publisher | Springer Netherlands | en_US |
dc.relation.ispartof | Novel Algorithms and Techniques in Telecommunications and Networking | en_US |
dc.subject | Complex Networks, Vulnerability, Game Theory, Network Topology | en_US |
dc.title | Game Theoretic Approach for Discovering Vulnerable Links in Complex Networks | en_US |
dc.type | Article | en_US |
item.grantfulltext | open | - |
item.fulltext | With Fulltext | - |
crisitem.author.dept | Faculty of Computer Science and Engineering | - |
crisitem.author.dept | Faculty of Computer Science and Engineering | - |
crisitem.author.dept | Faculty of Computer Science and Engineering | - |
crisitem.author.dept | Faculty of Computer Science and Engineering | - |
Appears in Collections: | Faculty of Computer Science and Engineering: Journal Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Game_Theoretic_Approach_for_Discovering_Vulnerable.pdf | 357.09 kB | Adobe PDF | View/Open |
Page view(s)
47
checked on Jul 24, 2024
Download(s)
9
checked on Jul 24, 2024
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.