Only when we understand how hackers think, can we defend against their attacks. Towards this end, this paper studies the cyber-attacks that aim to remove nodes or links from network topologies. We particularly focus on one type of such attacks called Maximum Vertex Coverage Attacks under Knapsack constraint (MVCAK), in which a hacker has a fixed budget to remove nodes from a network with the nodes involving different costs for removal, and the hacker's goal is to maximize the number of links incident to the nodes removed. Since the MVCAK problem is NP-hard, we firstly propose an optimal solution by Integer Linear Program formulation. Secondly, we give an approximate solution by Linear Programming relaxation that achieves an approximation ra...
This paper considers the problem of optimal Byzantine attacks or data falsification attacks on distr...
A network attack is a set of network elements that are disabled by an adversary. The goal for the at...
Vulnerability metrics play a key role in the understanding of cascading failures and target/random a...
Measuring robustness of complex networks is a fundamental task for analyzing the structure and funct...
The robustness of networks is an important problem that has been stud-ied in a variety of situations...
We perform all possible removals of nodes from networks of size , then we identify and measure the l...
We perform all possible removals of n nodes from networks of size N, then we identify and measure th...
Abstract The number of triangles is a fundamental metric for analyzing the structure and function of...
The robustness of complex networks under targeted attacks is deeply connected to the resilience of c...
To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper,...
Given a graph G and an interdiction budget k, the Maximum Clique Interdiction Problem asks to find a...
International audienceGiven a graph G and an interdiction budget k, the Maximum Clique Interdiction ...
Given a graph G and an interdiction budget k, the Maximum Clique Interdiction Problem asks to find a...
In this paper, we develop solutions to the problem of identifying the k most vital cut-sets of a net...
Abstract: A network attack is a set of network elements that are disabled by an ad-versary. The goal...
This paper considers the problem of optimal Byzantine attacks or data falsification attacks on distr...
A network attack is a set of network elements that are disabled by an adversary. The goal for the at...
Vulnerability metrics play a key role in the understanding of cascading failures and target/random a...
Measuring robustness of complex networks is a fundamental task for analyzing the structure and funct...
The robustness of networks is an important problem that has been stud-ied in a variety of situations...
We perform all possible removals of nodes from networks of size , then we identify and measure the l...
We perform all possible removals of n nodes from networks of size N, then we identify and measure th...
Abstract The number of triangles is a fundamental metric for analyzing the structure and function of...
The robustness of complex networks under targeted attacks is deeply connected to the resilience of c...
To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper,...
Given a graph G and an interdiction budget k, the Maximum Clique Interdiction Problem asks to find a...
International audienceGiven a graph G and an interdiction budget k, the Maximum Clique Interdiction ...
Given a graph G and an interdiction budget k, the Maximum Clique Interdiction Problem asks to find a...
In this paper, we develop solutions to the problem of identifying the k most vital cut-sets of a net...
Abstract: A network attack is a set of network elements that are disabled by an ad-versary. The goal...
This paper considers the problem of optimal Byzantine attacks or data falsification attacks on distr...
A network attack is a set of network elements that are disabled by an adversary. The goal for the at...
Vulnerability metrics play a key role in the understanding of cascading failures and target/random a...