Skip to content Skip to navigation
University of Warwick
  • Study
  • |
  • Research
  • |
  • Business
  • |
  • Alumni
  • |
  • News
  • |
  • About

University of Warwick
Publications service & WRAP

Highlight your research

  • WRAP
    • Home
    • Search WRAP
    • Browse by Warwick Author
    • Browse WRAP by Year
    • Browse WRAP by Subject
    • Browse WRAP by Department
    • Browse WRAP by Funder
    • Browse Theses by Department
  • Publications Service
    • Home
    • Search Publications Service
    • Browse by Warwick Author
    • Browse Publications service by Year
    • Browse Publications service by Subject
    • Browse Publications service by Department
    • Browse Publications service by Funder
  • Help & Advice
University of Warwick

The Library

  • Login
  • Admin

Core identification and attack strategies against regenerative complex networks

Tools
- Tools
+ Tools

Guo, Weisi and Lu, X. (2016) Core identification and attack strategies against regenerative complex networks. Electronic Letters, 52 (6). pp. 450-452. doi:10.1049/el.2015.3788 ISSN 0013-5194.

[img]
Preview
PDF
WRAP_Guo_P__IET_EL___Complex_Network_Attack.pdf - Accepted Version - Requires a PDF viewer.

Download (874Kb) | Preview
Official URL: http://doi.org/10.1049/el.2015.3788

Request Changes to record.

Abstract

Modelling enemy networks in a way that reveals their key entities and links is important when disrupting complex networks with high redundancy. In this paper, we examine how best to attack such networks under a limited ground intelligence constraint. The key modelling contribution is to include both the heterogeneity of the node functions and the dynamics of recuperation after destruction. Through identifying the core nodes, the results show that ground intelligence should focus on locating and attacking high degree nodes, yielding a 41% reduction in conflict length over random opportunistic targeting and a 23% reduction over specialist targeting. Even when difficult to replace specialists are considered, targeting high degree nodes that can recuperate quickly, remains the most effective method of attack. The impact is to allow military forces to more effectively target enemy nodes that will cause functional paralysis and create further collapses.

Item Type: Journal Article
Subjects: T Technology > TK Electrical engineering. Electronics Nuclear engineering
U Military Science > U Military Science (General)
Divisions: Faculty of Science, Engineering and Medicine > Engineering > Engineering
Library of Congress Subject Headings (LCSH): Artificial intelligence -- Military applications, Electronic countermeasures -- Networks, Computer, Cyberspace operations (Military science), Computers -- Military aspects
Journal or Publication Title: Electronic Letters
Publisher: IET
ISSN: 0013-5194
Official Date: 17 March 2016
Dates:
DateEvent
17 March 2016Published
5 February 2016Available
13 January 2016Accepted
Volume: 52
Number: 6
Page Range: pp. 450-452
DOI: 10.1049/el.2015.3788
Status: Peer Reviewed
Publication Status: Published
Access rights to Published version: Restricted or Subscription Access
Copyright Holders: IET, IEEE
Date of first compliant deposit: 14 January 2016
Date of first compliant Open Access: 14 January 2016
Related URLs:
  • Publisher

Request changes or add full text files to a record

Repository staff actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics

twitter

Email us: wrap@warwick.ac.uk
Contact Details
About Us