Efficient local strategies for vaccination and network attack
@article{Holme2004EfficientLS, title={Efficient local strategies for vaccination and network attack}, author={Petter Holme}, journal={EPL}, year={2004}, volume={68}, pages={908-914} }
We study how a fraction of a population should be vaccinated to most efficiently stop epidemics. Our starting point is that only local information-about the neighborhood of specific vertices-is usa ...
138 Citations
Containing epidemic outbreaks by message-passing techniques
- Computer ScienceArXiv
- 2013
Computational epidemiology uses algorithms to identify and eradicate viruses. Researchers investigate targeted immunization as an optimization problem for a given choice of parameters and costs.
Functional immunization of networks based on message passing
- Computer ScienceAppl. Math. Comput.
- 2020
A dissemination strategy for immunizing scale-free networks
- Computer SciencePhysical review. E, Statistical, nonlinear, and soft matter physics
- 2006
This work introduces a method, based on vaccine dissemination, that seems to reflect more accurately what is expected to occur in real-world networks, and is seen to render the network practically invulnerable to attacks while requiring only a small fraction of the nodes to receive the vaccine.
Robustness of networks against propagating attacks under vaccination strategies
- MathematicsArXiv
- 2011
It is shown that, when vaccines are inefficient, the random graph is more robust against propagating attacks than the scale-free network and the random graphs with the random defense are more robust than the size-based network with the degree-based defense.
Immunization of Geographical Networks
- MathematicsComplex
- 2009
The results suggest that within the limitation of the network models considered here, in which the infection probability is assumed to decrease with the geographic distance, the simple SN strategy works almost equally or better than the CN strategy, especially when the detection time is longer.
Non massive immunization to contain spreading on complex networks
- Computer SciencePhysical review. E
- 2020
It is reported that moderate and weakly supervised immunizations can lead to finite epidemic thresholds of the susceptible-infected-susceptible model on scale-free networks by changing the nature of the transition from a specific motif to a collectively driven process.
Evolutionary Algorithm for Optimal Vaccination Scheme
- Computer Science
- 2014
The following work uses the dynamic capabilities of an evolutionary algorithm in order to obtain an optimal immunization strategy in a user specified network. The produced algorithm uses a basic…
A local immunization strategy for networks with overlapping community structure
- Computer Science
- 2017
An Efficient Immunization Strategy Using Overlapping Nodes and Its Neighborhoods
- Computer ScienceWWW
- 2018
Comparisons with alternative local immunization strategies using the fraction of the Largest Connected Component (LCC) after immunization, show that the proposed method is much more efficient and compares favorably to global measures such as degree and betweenness centrality.
References
SHOWING 1-10 OF 23 REFERENCES
Efficient immunization strategies for computer networks and populations.
- Computer SciencePhysical review letters
- 2003
It is shown that the immunization threshold is dramatically reduced with the suggested strategy, for all studied cases, and analytically the critical threshold for complete immunization is studied.
Random graphs
- Mathematics, Computer ScienceSODA '06
- 2006
Some of the major results in random graphs and some of the more challenging open problems are reviewed, including those related to the WWW.
Sexual networks: implications for the transmission of sexually transmitted infections.
- BiologyMicrobes and infection
- 2003
Attack vulnerability of complex networks.
- Computer SciencePhysical review. E, Statistical, nonlinear, and soft matter physics
- 2002
It is found that the removals by the recalculated degrees and betweenness centralities are often more harmful than the attack strategies based on the initial network, suggesting that the network structure changes as important vertices or edges are removed.
Infectious disease epidemiology.
- MedicineClinical proceedings - Children's Hospital of the District of Columbia
- 1970
The development of antibiotics, improved access to safe food, clean water, sewage disposal and vaccines has led to dramatic progress in controlling infectious diseases, but some have become established in both the developed and developing world.
The Structure and Function of Complex Networks
- Computer ScienceSIAM Rev.
- 2003
Developments in this field are reviewed, including such concepts as the small-world effect, degree distributions, clustering, network correlations, random graph models, models of network growth and preferential attachment, and dynamical processes taking place on networks.
Modern Infectious Disease Epidemiology
- Medicine, Biology
- 1994
What Is Special About Infectious Disease Epidemiology? Definitions Risk, Relative Risk and Attack Rate Descriptive Epidemiology The Case-Control Study: Odds, Odds Ratios. The Concepts of Confounding…
Emergence of scaling in random networks
- Computer ScienceScience
- 1999
A model based on these two ingredients reproduces the observed stationary scale-free distributions, which indicates that the development of large networks is governed by robust self-organizing phenomena that go beyond the particulars of the individual systems.
Assortative mixing in networks.
- Computer SciencePhysical review letters
- 2002
This work proposes a model of an assortatively mixed network and finds that networks percolate more easily if they are assortative and that they are also more robust to vertex removal.
Networking the seceder model: Group formation in social and economic systems.
- EconomicsPhysical review. E, Statistical, nonlinear, and soft matter physics
- 2004
The original, agent based, seceder model is turned into a model of network evolution and it is found that the structural characteristics of the model closely match empirical social networks.