Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Fig 1.

The USAir97 network.

(a) Its topology, in which the darkness of node color is proportional to its degree. (b) Its degree distribution, where the points represent the frequency distribution of degree, the red line denotes the fitting curve with equation P(k) = 0.1948k−0.6959−0.01029, the goodness of fit is 0.9198.

More »

Fig 1 Expand

Fig 2.

The Erdos971 network.

(a) Its topology, in which the darkness of node color is proportional to its degree. (b) Its degree distribution, where the points represent the frequency distribution of degree, the red line denotes the fitting curve with equation P(k) = 0.2727k−0.4256−0.06745, the goodness of fit is 0.9434.

More »

Fig 2 Expand

Table 1.

The summaries of benchmark networks used in this paper.

More »

Table 1 Expand

Fig 3.

The density of driver nodes nD as a function of removal fraction f for ER network under different node attacks.

The black and blue dashed lines are theoretical results obtained from Eqs (24) and (26), respectively. The numerical results are averaged over 100 independent realizations.

More »

Fig 3 Expand

Fig 4.

nD as a function of the removal fraction f under different node attacks for (a) WS network and (b) NW network.

The results are averaged over 100 independent realizations.

More »

Fig 4 Expand

Fig 5.

(a) Correlation between the node betweenness CB and the node degree k for WS and NW networks. (b) The degree distribution of WS, NW and ER network.

More »

Fig 5 Expand

Fig 6.

nD as a function of removal fraction f under different node attacks for the BA scale-free network.

The simulation results are averaged over 100 independent realizations, the analytical result of RA is obtained by Eq (27).

More »

Fig 6 Expand

Fig 7.

(a) Node betweenness-degree correlation of the BA network. (b) The degree distribution of the BA network.

More »

Fig 7 Expand

Fig 8.

nD as a function of removal fraction f under different node attacks for the (a) USAir97 and (b) Erdos971 network.

The results are averaged over 100 independent runs.

More »

Fig 8 Expand

Fig 9.

The node betweenness-degree correlation for the (a) USAir97 and (b) Erdos971 network.

More »

Fig 9 Expand

Fig 10.

nD as a function of the removal fraction fe under different edge attacks for the ER random network.

The results are averaged over 100 independent realizations.

More »

Fig 10 Expand

Fig 11.

The degree distribution P(k) of the ER random network under different edge removal fraction fe subject to the ID attack.

fe = 0 denotes the initial degree distribution.

More »

Fig 11 Expand

Table 2.

The structural characteristics of ER random network, including average degree 〈k〉, degree heterogeneity H and average betweenness centrality 〈B〉, vary with fe subject to ID and IB attacks.

More »

Table 2 Expand

Fig 12.

nD as a function of removal fraction fe subject to different edge attacks for (a) WS network and (b) NW network.

The results are averaged over 100 independent realizations.

More »

Fig 12 Expand

Fig 13.

The degree distribution under different fe subject to the ID attack for (a) WS network and (b) NW network.

More »

Fig 13 Expand

Table 3.

The average degree 〈k〉 and degree heterogeneity H under different fe subject to IDA for WS and NW network.

More »

Table 3 Expand

Fig 14.

nD as a function of fe under different edge attacks for the BA scale-free network.

The results are averaged over 100 independent realizations.

More »

Fig 14 Expand

Fig 15.

The structural characteristics of BA network vary with the edge removal fraction fe.

The characteristics include (a) the degree heterogeneity H, (b) APL and (c) the average betweenness centrality 〈B〉.

More »

Fig 15 Expand

Fig 16.

nD as a function of fe subject to different edge attacks for (a) USAir97 network and (b) Erdos971 network.

The results are averaged over 100 independent realizations.

More »

Fig 16 Expand

Table 4.

The node attack vulnerability of the real networks analyzed in this paper.

More »

Table 4 Expand

Table 5.

The edge attack vulnerability of real networks analyzed in this paper.

More »

Table 5 Expand