The Effects of Observation Errors on the Attack Vulnerability of Complex Networks

Identifying the key nodes to target in a social network is an important problem in several application areas, including the disruption of terrorist networks and the crafting of effective immunization strategies. One important issue that has received limited attention is how such targeting strategies...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Booker, Lashon B
Format: Report
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Booker, Lashon B
description Identifying the key nodes to target in a social network is an important problem in several application areas, including the disruption of terrorist networks and the crafting of effective immunization strategies. One important issue that has received limited attention is how such targeting strategies are affected by erroneous data about network structure. This paper describes simulation experiments that investigate this issue.
format Report
fullrecord <record><control><sourceid>dtic_1RU</sourceid><recordid>TN_cdi_dtic_stinet_ADA576235</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>ADA576235</sourcerecordid><originalsourceid>FETCH-dtic_stinet_ADA5762353</originalsourceid><addsrcrecordid>eNrjZAgMyUhVcE1LS00uKVbIT1PwTypOLSpLLMnMz1NwLSrKLwKK5imUABU5lpQkJmcrhJXm5KUWJSZl5mSWVIJ0OOfnFuSkVij4pZaU5xdlF_MwsKYl5hSn8kJpbgYZN9cQZw_dlJLM5Pjiksy81JJ4RxdHU3MzI2NTYwLSAGniNHU</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>report</recordtype></control><display><type>report</type><title>The Effects of Observation Errors on the Attack Vulnerability of Complex Networks</title><source>DTIC Technical Reports</source><creator>Booker, Lashon B</creator><creatorcontrib>Booker, Lashon B ; MITRE CORP MCLEAN VA</creatorcontrib><description>Identifying the key nodes to target in a social network is an important problem in several application areas, including the disruption of terrorist networks and the crafting of effective immunization strategies. One important issue that has received limited attention is how such targeting strategies are affected by erroneous data about network structure. This paper describes simulation experiments that investigate this issue.</description><language>eng</language><subject>ATTACK ; CENTRALITY MEASURES ; COMMUNICATIONS NETWORKS ; Computer Systems ; COMPUTERIZED SIMULATION ; CRITICAL NODE IDENTIFICATION ; DELIBERATE NODE REMOVAL ; EDGE ADDITION ERRORS ; EDGE DELETION ERRORS ; ERRORS ; GRAPHS ; INTENTIONAL ATTACKS ; INTERPERSONAL RELATIONS ; KEY NODE IDENTIFICATION ; MEASURES OF EFFECTIVENESS ; NETWORK ATTACK MODELING ; NETWORK TOPOLOGY ; NODE ADDITION ERRORS ; NODE DELETION ERRORS ; NODES ; OBSERVATION ; OBSERVATION ERRORS ; RANDOM ATTACKS ; RANDOM NODE REMOVAL ; REMOVAL ; ROBUSTNESS ; SOCIAL NETWORKS ; Sociology and Law ; TARGETED ATTACKS ; TARGETING ; VULNERABILITY</subject><creationdate>2012</creationdate><rights>Approved for public release; distribution is unlimited.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,776,881,27544,27545</link.rule.ids><linktorsrc>$$Uhttps://apps.dtic.mil/sti/citations/ADA576235$$EView_record_in_DTIC$$FView_record_in_$$GDTIC$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Booker, Lashon B</creatorcontrib><creatorcontrib>MITRE CORP MCLEAN VA</creatorcontrib><title>The Effects of Observation Errors on the Attack Vulnerability of Complex Networks</title><description>Identifying the key nodes to target in a social network is an important problem in several application areas, including the disruption of terrorist networks and the crafting of effective immunization strategies. One important issue that has received limited attention is how such targeting strategies are affected by erroneous data about network structure. This paper describes simulation experiments that investigate this issue.</description><subject>ATTACK</subject><subject>CENTRALITY MEASURES</subject><subject>COMMUNICATIONS NETWORKS</subject><subject>Computer Systems</subject><subject>COMPUTERIZED SIMULATION</subject><subject>CRITICAL NODE IDENTIFICATION</subject><subject>DELIBERATE NODE REMOVAL</subject><subject>EDGE ADDITION ERRORS</subject><subject>EDGE DELETION ERRORS</subject><subject>ERRORS</subject><subject>GRAPHS</subject><subject>INTENTIONAL ATTACKS</subject><subject>INTERPERSONAL RELATIONS</subject><subject>KEY NODE IDENTIFICATION</subject><subject>MEASURES OF EFFECTIVENESS</subject><subject>NETWORK ATTACK MODELING</subject><subject>NETWORK TOPOLOGY</subject><subject>NODE ADDITION ERRORS</subject><subject>NODE DELETION ERRORS</subject><subject>NODES</subject><subject>OBSERVATION</subject><subject>OBSERVATION ERRORS</subject><subject>RANDOM ATTACKS</subject><subject>RANDOM NODE REMOVAL</subject><subject>REMOVAL</subject><subject>ROBUSTNESS</subject><subject>SOCIAL NETWORKS</subject><subject>Sociology and Law</subject><subject>TARGETED ATTACKS</subject><subject>TARGETING</subject><subject>VULNERABILITY</subject><fulltext>true</fulltext><rsrctype>report</rsrctype><creationdate>2012</creationdate><recordtype>report</recordtype><sourceid>1RU</sourceid><recordid>eNrjZAgMyUhVcE1LS00uKVbIT1PwTypOLSpLLMnMz1NwLSrKLwKK5imUABU5lpQkJmcrhJXm5KUWJSZl5mSWVIJ0OOfnFuSkVij4pZaU5xdlF_MwsKYl5hSn8kJpbgYZN9cQZw_dlJLM5Pjiksy81JJ4RxdHU3MzI2NTYwLSAGniNHU</recordid><startdate>201211</startdate><enddate>201211</enddate><creator>Booker, Lashon B</creator><scope>1RU</scope><scope>BHM</scope></search><sort><creationdate>201211</creationdate><title>The Effects of Observation Errors on the Attack Vulnerability of Complex Networks</title><author>Booker, Lashon B</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-dtic_stinet_ADA5762353</frbrgroupid><rsrctype>reports</rsrctype><prefilter>reports</prefilter><language>eng</language><creationdate>2012</creationdate><topic>ATTACK</topic><topic>CENTRALITY MEASURES</topic><topic>COMMUNICATIONS NETWORKS</topic><topic>Computer Systems</topic><topic>COMPUTERIZED SIMULATION</topic><topic>CRITICAL NODE IDENTIFICATION</topic><topic>DELIBERATE NODE REMOVAL</topic><topic>EDGE ADDITION ERRORS</topic><topic>EDGE DELETION ERRORS</topic><topic>ERRORS</topic><topic>GRAPHS</topic><topic>INTENTIONAL ATTACKS</topic><topic>INTERPERSONAL RELATIONS</topic><topic>KEY NODE IDENTIFICATION</topic><topic>MEASURES OF EFFECTIVENESS</topic><topic>NETWORK ATTACK MODELING</topic><topic>NETWORK TOPOLOGY</topic><topic>NODE ADDITION ERRORS</topic><topic>NODE DELETION ERRORS</topic><topic>NODES</topic><topic>OBSERVATION</topic><topic>OBSERVATION ERRORS</topic><topic>RANDOM ATTACKS</topic><topic>RANDOM NODE REMOVAL</topic><topic>REMOVAL</topic><topic>ROBUSTNESS</topic><topic>SOCIAL NETWORKS</topic><topic>Sociology and Law</topic><topic>TARGETED ATTACKS</topic><topic>TARGETING</topic><topic>VULNERABILITY</topic><toplevel>online_resources</toplevel><creatorcontrib>Booker, Lashon B</creatorcontrib><creatorcontrib>MITRE CORP MCLEAN VA</creatorcontrib><collection>DTIC Technical Reports</collection><collection>DTIC STINET</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Booker, Lashon B</au><aucorp>MITRE CORP MCLEAN VA</aucorp><format>book</format><genre>unknown</genre><ristype>RPRT</ristype><btitle>The Effects of Observation Errors on the Attack Vulnerability of Complex Networks</btitle><date>2012-11</date><risdate>2012</risdate><abstract>Identifying the key nodes to target in a social network is an important problem in several application areas, including the disruption of terrorist networks and the crafting of effective immunization strategies. One important issue that has received limited attention is how such targeting strategies are affected by erroneous data about network structure. This paper describes simulation experiments that investigate this issue.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_dtic_stinet_ADA576235
source DTIC Technical Reports
subjects ATTACK
CENTRALITY MEASURES
COMMUNICATIONS NETWORKS
Computer Systems
COMPUTERIZED SIMULATION
CRITICAL NODE IDENTIFICATION
DELIBERATE NODE REMOVAL
EDGE ADDITION ERRORS
EDGE DELETION ERRORS
ERRORS
GRAPHS
INTENTIONAL ATTACKS
INTERPERSONAL RELATIONS
KEY NODE IDENTIFICATION
MEASURES OF EFFECTIVENESS
NETWORK ATTACK MODELING
NETWORK TOPOLOGY
NODE ADDITION ERRORS
NODE DELETION ERRORS
NODES
OBSERVATION
OBSERVATION ERRORS
RANDOM ATTACKS
RANDOM NODE REMOVAL
REMOVAL
ROBUSTNESS
SOCIAL NETWORKS
Sociology and Law
TARGETED ATTACKS
TARGETING
VULNERABILITY
title The Effects of Observation Errors on the Attack Vulnerability of Complex Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-03T16%3A57%3A25IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-dtic_1RU&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=unknown&rft.btitle=The%20Effects%20of%20Observation%20Errors%20on%20the%20Attack%20Vulnerability%20of%20Complex%20Networks&rft.au=Booker,%20Lashon%20B&rft.aucorp=MITRE%20CORP%20MCLEAN%20VA&rft.date=2012-11&rft_id=info:doi/&rft_dat=%3Cdtic_1RU%3EADA576235%3C/dtic_1RU%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true