Skip to main content

System Models

  • Chapter
  • First Online:
  • 598 Accesses

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

Abstract

In this chapter, we describe the network models and the attack model for the area attack problem under consideration.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Boesch FT, Harary F, Kabell JA (1981) Networks 11(1):57–63. doi:10.1002/net. 3230110106

    Article  MathSciNet  MATH  Google Scholar 

  2. Phillips CA (1993) In: Proceedings of ACM symposium on theory of computing, vol 25. ACM, New York, p 776. doi:10.1145/167088.167286

    Google Scholar 

  3. Wood RK (1993) Math Comput Model 17(2):1. doi:10.1016/0895-7177(93)90236-R

    Article  MATH  Google Scholar 

  4. Bingol L (2001) A lagrangian heuristic for solving a network interdiction problem. Master’s thesis, Naval Postgraduate School

    Google Scholar 

  5. Royset JO, Wood RK (2008) INFORMS J Comput 19(2):175. doi:10.1287/ijoc.1060. 0191

    Article  MathSciNet  Google Scholar 

  6. Motter AE, Lai YC (2002) Phys Rev E 66(6):065102. doi:10.1103/PhysRevE.66. 065102

    Article  Google Scholar 

  7. Sachtjen M, Carreras B, Lynch V (2000) Phys Rev E 61(5):4877. doi:10.1103/ PhysRevE.61.4877

    Article  Google Scholar 

  8. Goh KI, Kahng B, Kim D (2002) Phys Rev Lett 88(10):108701. doi:10.1103/ PhysRevLett.88.108701

    Article  Google Scholar 

  9. Watts D (2002) Proc Natl Acad Sci 99(9), 5766. doi:10.1073/pnas.082090499

    Article  MathSciNet  MATH  Google Scholar 

  10. Moreno Y, Gomez J, Pacheco A (2002) Europhys Lett 58(4):630. doi:10.1209/epl/ i2002-00442-2

    Article  Google Scholar 

  11. Willinger W, Govindan R, Jamin S, Paxson V, Shenker S (2002) Proc Natl Acad Sci 99(1), 2573. doi:10.1073/pnas.012583099

    Article  Google Scholar 

  12. Callaway DS, Newman MEJ, Strogatz SH, Watts DJ (2000) Phys Rev Lett 85:5468. doi:10.1103/PhysRevLett.85.5468

    Article  Google Scholar 

  13. Ball F, Mollison D, Scalia-Tomba G (1997) Ann Appl Probab 7(1):46. doi:10.1214/ aoap/1034625252

    Article  MathSciNet  MATH  Google Scholar 

  14. Newman MEJ, Watts DJ (1999) Phys Rev E 60(6):7332. doi:10.1103/PhysRevE.60. 7332

    Article  Google Scholar 

  15. Cohen R, Erez K, ben Avraham D, Havlin S (2000) Phys Rev Lett 85:4624. doi:10.1103/PhysRevLett.85.4626

    Google Scholar 

  16. Zhou Q, Gao L, Cui S (2010) In: Proceedings of IEEE GLOBECOM. IEEE, Piscataway, pp 368–372. doi:10.1109/GLOCOMW.2010.5700343

    Google Scholar 

  17. Foster JS, Gjelde E, Graham WR, Hermann RJ, Kluepfel HM, Lawson RL, Soper GK, Wood LL, Woodard JB (2004) Report of the commission to assess the threat to the united states from electromagnetic pulse (emp) attack. http://www.empcommission.org/docs/empctextunderscoreexectextunderscorerpt.pdf. Accessed 20 Apr 2012

  18. Radasky W (2007) High-altitude electromagnetic pulse (hemp): a threat to our way of life. http://www.todaysengineer.org/2007/Sep/HEMP.asp. Accessed 20 Apr 2012

  19. Ozdamar L, Ekinci E, Kucukyazici B (2004) Ann Oper Res 129:217. doi:10.1023/B: ANOR.0000030690.27939.39

    Article  MathSciNet  Google Scholar 

  20. Radwan AE, Hobeika AG, Sivasailam D (1985) Inst Transp Eng J 55(9):25

    Google Scholar 

  21. Young S, Balluz L, Malilay J (2004) Sci Total Environ 322:3. doi:10.1016/ S0048-9697(03)00446-7

    Article  Google Scholar 

  22. Feng QS, Chen JF, Ai MY (2010) J Acta Petrolei Sinica 1:139

    Google Scholar 

  23. Wang JW, Rong LL (2009) Elsevier Saf Sci 47(10):1332. doi:10.1016/j.ssci.2009.02.002

    Article  Google Scholar 

  24. Pastor-Satorras R, Vazquez A, Vespignani A (2001) Phys Rev Lett 87(25):258701. doi:10.1103/PhysRevLett.87.258701

    Article  Google Scholar 

  25. Cohen R, Erez K, Ben-Avraham D, Havlin S (2001) Phys Rev Lett 86(16):3682. doi:10.1103/PhysRevLett.86.3682

    Article  Google Scholar 

  26. Gligor VD (1984) Proc IEEE Trans Softw Eng 10(3), 320. doi:10.1109/TSE.1984. 5010241

    Article  Google Scholar 

  27. Peng T, Leckie C, Ramamohanarao K (2007) ACM Comput Surv 39(1):1. doi:10. 1145/1216370.1216373

    Article  Google Scholar 

  28. Mirkovic J, Reiher P (2004) ACM Comput Commun Rev 34(2):39. doi:10.1145/ 997150.997156

    Article  Google Scholar 

  29. Burch H, Cheswick B (2000) In: Proceedings of the USENIX LISA. USENIX Association, Berkeley, pp 319–327

    Google Scholar 

  30. Savage S, Wetherall D, Karlin A, Anderson T (2000) ACM Comput Commun Rev 30(4):295. doi:10.1145/347057.347560

    Article  Google Scholar 

  31. Snoeren AC, Partridge C, Sanchez LA, Jones CE, Tehakountio F, Kent ST, Strayer WT (2001) ACM Comput Commun Rev 31(4):3. doi:10.1145/964723.383060

    Article  Google Scholar 

  32. Albert R, Jeong H, Barabasi AL (1999) Nature 6749:130

    Google Scholar 

  33. Barabasi AL, Albert R (1999) Science 286(5439):509

    Article  MathSciNet  Google Scholar 

  34. Barabasi AL, Albert R, Jeong H (2000) Phys A Stat Mech Appl 281(1–4):69. doi:10.1016/S0378-4371(00)00018-2

    Article  Google Scholar 

  35. Faloutsos M, Faloutsos P, Faloutsos C (1999) Comput Commun Rev 29(4):251. doi:10.1145/316194.316229

    Article  Google Scholar 

  36. Li W, Cai X (2004) Phys Rev E 69(4):046106. doi:10.1103/PhysRevE.69.046106

    Article  Google Scholar 

  37. Albert R, Jeong H, Barabasi AL (2000) Nature 406(6794):378. doi:10.1038/35019019

    Article  Google Scholar 

  38. Neumayer S, Zussman G, Cohen R, Modiano E (2009) In: Proceedings of IEEE INFOCOM. IEEE, Piscataway, pp 1566–1574. doi:10.1109/INFCOM.2009.5062074

    Google Scholar 

  39. Brown G, Carlyle WM, Salmeron J, Wood K (2005) Tutorials in operations research. INFORMS, Hanover, pp 102–123

    Google Scholar 

  40. Brown G, Carlyle M, Salmeron J, Wood K (2006) Informs 36(6):530. doi:10.1287/ inte.1060.0252

    Google Scholar 

  41. Kephart J, White S (1991) IEEE computer society symposium on research in security and privacy. IEEE, Los Alamitos, pp 343–359. doi:10.1109/RISP.1991.130801

    Google Scholar 

  42. Gallos LK, Cohen R, Argyrakis P, Bunde A, Havlin S (2005) Phys Rev Lett 94(18):188701. doi:10.1103/PhysRevLett.94.188701

    Google Scholar 

  43. Magoni D (2003) IEEE J Sel Areas Commun 21(6):949. doi:10.1109/JSAC.2003. 814364

    Google Scholar 

  44. Agarwal P, Efrat A, Ganjugunte S, Sankararaman S, Hay D, Zussman G (2011) In: Proceedings of IEEE INFOCOM. IEEE, New York, pp 1521–1529. doi:10.1109/ INFCOM.2011.5934942

    Google Scholar 

  45. Sen A, Banerjee S, Ghosh P, Shirazipourazad S (2009) In: Proceedings 47th annual allerton conference on communication, control, and computing. IEEE, Piscataway, pp 1430–1437. doi:10.1109/ALLERTON.2009.5394506

    Google Scholar 

  46. Liu J, Jiang X, Nishiyama H, Kato N (2011) IEEE Trans Veh Technol 60(5):2253. doi:10.1109/TVT.2011.2114684

    Google Scholar 

  47. Kim K, Venkatasabramanian N (2010) In: Proceedings of IEEE GLOBECOM. IEEE, Piscataway, pp 1–5. doi:10.1109/GLOCOM.2010.5685229

    Google Scholar 

  48. Neumayer S, Modiano E (2010) In: Proceedings of IEEE INFOCOM. IEEE, New York, pp 1–9. doi:10.1109/INFCOM.2010.5461984

    Google Scholar 

  49. Mathew P (2003) Random geometric graphs. Oxford University Press, Oxford

    Google Scholar 

  50. Mathew P (2003) Random geometric graphs. Oxford University Press, Oxford

    MATH  Google Scholar 

  51. Schlick T (2002) Molecular modeling and simulation: an interdisciplinary guide. Springer, New York

    MATH  Google Scholar 

  52. Manna SS, Sen P (2002) Phys Rev E 66(3):066114. doi:10.1103/PhysRevE.66.066114

    Google Scholar 

  53. Ebel H, Mielsch L, Bornholdt S (2002) Phys Rev E 66:35103. doi:10.1103/PhysRevE. 66.035103

    Article  Google Scholar 

  54. Meester R, Roy R (1996) Continuum percolation. Cambridge University Press, New York

    Book  MATH  Google Scholar 

  55. Chung F, Lu L (2003) Internet Math 1(1):91. doi:10.1080/15427951.2004.10129081

    Article  MathSciNet  MATH  Google Scholar 

  56. Level 3 Communication Corp (2012) Level 3 communications network map. http://www.level3.com/en/resource-library/maps/level-3-network-map/. Accessed 20 Apr 2012

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 The Authors

About this chapter

Cite this chapter

Zhou, Q., Gao, L., Liu, R., Cui, S. (2013). System Models. In: Network Robustness under Large-Scale Attacks. SpringerBriefs in Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-4860-0_2

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-4860-0_2

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-4859-4

  • Online ISBN: 978-1-4614-4860-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics