Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,518,174 papers from all fields of science
Search
Sign In
Create Free Account
Attack tolerance
In the context of complex networks, attack tolerance is the network’s robustness meaning the ability to maintain the overall connectivity and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Complex network
Degree distribution
Node deletion
Robustness of complex networks
Broader (1)
Network theory
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Method of Graph Mining based on the Topological Anomaly Matrix and its Application for Discovering the Structural Peculiarities of Complex Networks
A. Potebnia
2018
Corpus ID: 53056235
The article introduces the mathematical concept of the topological anomaly matrix providing the foundation for the qualitative…
Expand
2017
2017
Attack tolerant finite-time consensus for multi-agent networks
Yiming Wu
,
Ming Xu
,
Ning Zheng
,
Xiongxiong He
13th IEEE International Conference on Control…
2017
Corpus ID: 31377653
In this paper, we study the secure consensus problem for continuous-time networked multi-agent systems under malicious attacks…
Expand
2014
2014
Addressing Real-Time Intrusion Detection
Álvaro HerreroA
,
M. Navarrob
,
Emilio CorchadoC
,
Vicente JuliánB
2014
Corpus ID: 62790463
This study presents a novel Hybrid Intelligent Intrusion Detection System (IDS) known as RT-MOVICAB-IDS that incorporates…
Expand
2011
2011
Topological resilience of complex networks against failure and attack
Ziping Hu
,
P. Verma
International Workshop on Ant Colony Optimization…
2011
Corpus ID: 16379344
Complex networks describe a variety of systems in nature and society. The past ten years have seen a dramatic increase in…
Expand
2010
2010
Empirical analysis for attack tolerance of bus network
Huang Zhang-can
2010
Corpus ID: 63783778
The attack tolerance of Wuhan's bus network is studied which is attacked by random and intended attack.The net-work performance…
Expand
2006
2006
A practical approach to secure Web services
Jie Xu
,
E. Yang
,
K. Bennett
IEEE International Symposium on Real-Time…
2006
Corpus ID: 16022699
Web services provide the potential to offer interoperability of distributed business-to-business application integration between…
Expand
2005
2005
SLAT : Secure Localization with Attack Tolerance
Matthew Pirretti
,
N. Vijaykrishnan
,
P. Mcdaniel
,
B. Madan
2005
Corpus ID: 1577749
Accurate and secure localization is essential to the correct operation of many applications of sensor networks. However, existing…
Expand
2005
2005
Mathematical investigations in network properties
G. Hernann
IEEE International Conference on Intelligent…
2005
Corpus ID: 18373812
We studytheattribute-distance innetworks, defined as theaverage distance between an attribute- possessed andan ordinary node…
Expand
2002
2002
A Middleware for Constructing Highly Available, Fault Tolerant, and Attack Tolerant Services
Shivakant Mishra
International Conference on Computers and Their…
2002
Corpus ID: 17041097
This paper describes the design of a middleware that provides support for constructing highly available, secure, fault-tolerant…
Expand
Highly Cited
2001
Highly Cited
2001
correction: Error and attack tolerance of complex networks
R. Albert
,
Hawoong Jeong
,
A. Barabási
Nature
2001
Corpus ID: 41015844
This corrects the article DOI: 10.1038/35019019
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE