Many real-world infrastructure networks, such as power grids and communication networks, always depend on each other by their functional components that share geographic proximity. A lot of works were devoted to revealing the vulnerability of interdependent spatially embedded networks (ISENs) when facing node failures and showed that the ISENs are susceptible to geographically localized attacks caused by natural disasters or terrorist attacks. How to take emergency methods to prevent large scale of cascading failures on interdependent infrastructures is a longstanding problem. Here, we propose an effective strategy for the healing of local structures using the connection profile of a failed node, called the healing strategy by prioritizing ...
© 2018 IFIP. Complex systems such as smart cities and smart power grids rely heavily on their interd...
Abstract—We model smart grids as complex interdependent networks, and study targeted attacks on smar...
Cascading failures constitute an important vulnerability of interconnected systems. Here we focus on...
Critical infrastructures (CI) are the cornerstone of modern society, and they are connected with eac...
Cascading failures take place between networks after initial failures occur in interdependent networ...
Many real world complex systems such as critical infrastructure networks are embedded in space and t...
generating function Supplementarymaterial for this article is available online The robustness of com...
The structure of real-world multilayer infrastructure systems usually exhibits anisotropy due to con...
Cascading failures are catastrophic processes that can destroy the functionality of a system, thus, ...
Partially due to the fast developments of the network technology, the complex networks have found th...
Network models are widely used to solve the practical system problems as the result of rapid develop...
Understanding the complex network response to nodes failure is important to protect them and guarant...
<div><p>Cascading failures constitute an important vulnerability of interconnected systems. Here we ...
Abstract — Recent studies have shown that many real networks follow the power-law distribution of no...
Our dependence on networks – be they infrastructure, economic, social or others – leaves us prone to...
© 2018 IFIP. Complex systems such as smart cities and smart power grids rely heavily on their interd...
Abstract—We model smart grids as complex interdependent networks, and study targeted attacks on smar...
Cascading failures constitute an important vulnerability of interconnected systems. Here we focus on...
Critical infrastructures (CI) are the cornerstone of modern society, and they are connected with eac...
Cascading failures take place between networks after initial failures occur in interdependent networ...
Many real world complex systems such as critical infrastructure networks are embedded in space and t...
generating function Supplementarymaterial for this article is available online The robustness of com...
The structure of real-world multilayer infrastructure systems usually exhibits anisotropy due to con...
Cascading failures are catastrophic processes that can destroy the functionality of a system, thus, ...
Partially due to the fast developments of the network technology, the complex networks have found th...
Network models are widely used to solve the practical system problems as the result of rapid develop...
Understanding the complex network response to nodes failure is important to protect them and guarant...
<div><p>Cascading failures constitute an important vulnerability of interconnected systems. Here we ...
Abstract — Recent studies have shown that many real networks follow the power-law distribution of no...
Our dependence on networks – be they infrastructure, economic, social or others – leaves us prone to...
© 2018 IFIP. Complex systems such as smart cities and smart power grids rely heavily on their interd...
Abstract—We model smart grids as complex interdependent networks, and study targeted attacks on smar...
Cascading failures constitute an important vulnerability of interconnected systems. Here we focus on...