Vulnerability metrics play a key role in the understanding of cascading failures and target/random attacks to a network. The graph fragmentation problem (GFP) is the result of a worst-case analysis of a random attack. We can choose a fixed number of individuals for protection, and a nonprotected target node immediately destroys all reachable nodes. The goal is to minimize the expected number of destroyed nodes in the network. In this paper, we address the GFP by several approaches: metaheuristics, approximation algorithms, polytime methods for specific instances, and exact methods for small instances. The computational complexity of the GFP is included in our analysis, where we formally prove that the corresponding decision version of the p...
We study the problems of finding a subset of nodes having a given size k and satisfying one of the f...
We study the problems of finding a subset of nodes having a given size k and satisfying one of the f...
We study the problems of finding a subset of nodes having a given size k and satisfying one of the f...
Vulnerability metrics play a key role in the understanding of cascading failures and target/random a...
We perform all possible removals of nodes from networks of size , then we identify and measure the l...
We perform all possible removals of n nodes from networks of size N, then we identify and measure th...
In the multidisciplinary field of Network Science, optimization of procedures for efficiently breaki...
In the multidisciplinary field of Network Science, optimization of procedures for efficiently breaki...
<div><p>In the multidisciplinary field of Network Science, optimization of procedures for efficientl...
In network security hardening a network administrator may need to use limited resources (such as hon...
AbstractIn this paper, we introduce a new property for graphs called bounded fragmentation, by which...
The identification of Critical Nodes in technological, biological and social networks is a fundament...
We study the problems of finding a subset of nodes having a given size k and satisfying one of the f...
We study the problems of finding a subset of nodes having a given size k and satisfying one of the f...
This paper presents a patrol problem, where a patroller traverses a graph through edges to detect po...
We study the problems of finding a subset of nodes having a given size k and satisfying one of the f...
We study the problems of finding a subset of nodes having a given size k and satisfying one of the f...
We study the problems of finding a subset of nodes having a given size k and satisfying one of the f...
Vulnerability metrics play a key role in the understanding of cascading failures and target/random a...
We perform all possible removals of nodes from networks of size , then we identify and measure the l...
We perform all possible removals of n nodes from networks of size N, then we identify and measure th...
In the multidisciplinary field of Network Science, optimization of procedures for efficiently breaki...
In the multidisciplinary field of Network Science, optimization of procedures for efficiently breaki...
<div><p>In the multidisciplinary field of Network Science, optimization of procedures for efficientl...
In network security hardening a network administrator may need to use limited resources (such as hon...
AbstractIn this paper, we introduce a new property for graphs called bounded fragmentation, by which...
The identification of Critical Nodes in technological, biological and social networks is a fundament...
We study the problems of finding a subset of nodes having a given size k and satisfying one of the f...
We study the problems of finding a subset of nodes having a given size k and satisfying one of the f...
This paper presents a patrol problem, where a patroller traverses a graph through edges to detect po...
We study the problems of finding a subset of nodes having a given size k and satisfying one of the f...
We study the problems of finding a subset of nodes having a given size k and satisfying one of the f...
We study the problems of finding a subset of nodes having a given size k and satisfying one of the f...