Skip navigation
Skip navigation

Attack Vulnerability of Complex Communication Networks

Xia, Yongxiang; Hill, David


The Internet has been studied as a typical example of real-world complex networks. In this brief, we study the traffic performance of the Internet when it encounters a random or intentional attack. Different from previous approaches, the congestion control protocols are considered so that the bandwidth can be reallocated among flows. In this way, cascading breakdown is less likely to happen. The flow rates are adjusted when a node is attacked and out of function. Consequently, the traffic...[Show more]

CollectionsANU Research Publications
Date published: 2008
Type: Journal article
Source: IEEE Transactions on Circuits and Systems-II
DOI: 10.1109/TCSII.2007.908954


File Description SizeFormat Image
01_Xia_Attack_Vulnerability_of_2008.pdf144.98 kBAdobe PDF    Request a copy

Items in Open Research are protected by copyright, with all rights reserved, unless otherwise indicated.

Updated:  23 August 2018/ Responsible Officer:  University Librarian/ Page Contact:  Library Systems & Web Coordinator