首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Vulnerability of network of networks
Authors:S Havlin  DY Kenett  A Bashan  J Gao  HE Stanley
Institution:1. Department of Physics, Bar-Ilan University, Ramat Gan, Israel
2. Center for Polymer Studies and Department of Physics, Boston University, Boston, MA, 02215, USA
3. Channing Division of Network Medicine, Brigham and Women’s Hospital, and Harvard Medical School, Boston, MA, 02115, USA
4. Department of Automation, Shanghai Jiao Tong, University, 800 Dongchuan Road, Shanghai, 200240, P.R. China
5. Center for Complex Network Research and Department of Physics, Northeastern University, Boston, MA, 02115, USA
Abstract:Our dependence on networks – be they infrastructure, economic, social or others – leaves us prone to crises caused by the vulnerabilities of these networks. There is a great need to develop new methods to protect infrastructure networks and prevent cascade of failures (especially in cases of coupled networks). Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How, and at which cost can one restructure the network such that it will become more robust against malicious attacks? The gradual increase in attacks on the networks society depends on – Internet, mobile phone, transportation, air travel, banking, etc. – emphasize the need to develop new strategies to protect and defend these crucial networks of communication and infrastructure networks. One example is the threat of liquid explosives a few years ago, which completely shut down air travel for days, and has created extreme changes in regulations. Such threats and dangers warrant the need for new tools and strategies to defend critical infrastructure. In this paper we review recent advances in the theoretical understanding of the vulnerabilities of interdependent networks with and without spatial embedding, attack strategies and their affect on such networks of networks as well as recently developed strategies to optimize and repair failures caused by such attacks.
Keywords:
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号