Skip navigation
Skip navigation

Attack Vulnerability of Complex Communication Networks

Xia, Yongxiang; Hill, David

Description

The Internet has been studied as a typical example of real-world complex networks. In this brief, we study the traffic performance of the Internet when it encounters a random or intentional attack. Different from previous approaches, the congestion control protocols are considered so that the bandwidth can be reallocated among flows. In this way, cascading breakdown is less likely to happen. The flow rates are adjusted when a node is attacked and out of function. Consequently, the traffic...[Show more]

CollectionsANU Research Publications
Date published: 2008
Type: Journal article
URI: http://hdl.handle.net/1885/34184
Source: IEEE Transactions on Circuits and Systems-II
DOI: 10.1109/TCSII.2007.908954

Download

File Description SizeFormat Image
01_Xia_Attack_Vulnerability_of_2008.pdf144.98 kBAdobe PDF    Request a copy


Items in Open Research are protected by copyright, with all rights reserved, unless otherwise indicated.

Updated:  20 July 2017/ Responsible Officer:  University Librarian/ Page Contact:  Library Systems & Web Coordinator