Please use this identifier to cite or link to this item: http://hdl.handle.net/20.500.12188/25092
DC FieldValueLanguage
dc.contributor.authorMishkovski, Igoren_US
dc.contributor.authorFiliposka, Sonjaen_US
dc.contributor.authorGramatikov, Sashoen_US
dc.contributor.authorTrajanov, Dimitaren_US
dc.contributor.authorKocarev, Ljupchoen_US
dc.date.accessioned2022-12-22T12:19:37Z-
dc.date.available2022-12-22T12:19:37Z-
dc.date.issued2010-
dc.identifier.urihttp://hdl.handle.net/20.500.12188/25092-
dc.description.abstractComplex networks have been an up-and-coming exciting field in the realm of interactions. With their widespread use appearing on the horizon it is ever more vital to be able to measure their vulnerability as a function of their topology. Precisely, discovering vulnerable links, disposed to attacks, can help in hardening these links and by that providing more secure and reliable network structure. This paper addresses the link vulnerability of different topologies of complex networks such as: random networks, geographic random networks, small world networks and scale-free networks. We introduce measure for vulnerability of complex networks, and prove by simulations that network vulnerability heavily depends on the network topology.en_US
dc.publisherSpringer Netherlandsen_US
dc.relation.ispartofNovel Algorithms and Techniques in Telecommunications and Networkingen_US
dc.subjectComplex Networks, Vulnerability, Game Theory, Network Topologyen_US
dc.titleGame Theoretic Approach for Discovering Vulnerable Links in Complex Networksen_US
dc.typeArticleen_US
item.grantfulltextopen-
item.fulltextWith Fulltext-
crisitem.author.deptFaculty of Computer Science and Engineering-
crisitem.author.deptFaculty of Computer Science and Engineering-
crisitem.author.deptFaculty of Computer Science and Engineering-
crisitem.author.deptFaculty of Computer Science and Engineering-
Appears in Collections:Faculty of Computer Science and Engineering: Journal Articles
Files in This Item:
File Description SizeFormat 
Game_Theoretic_Approach_for_Discovering_Vulnerable.pdf357.09 kBAdobe PDFView/Open
Show simple item record

Page view(s)

41
checked on May 3, 2024

Download(s)

7
checked on May 3, 2024

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.