The Effects of Observation Errors on the Attack Vulnerability of Complex Networks
Identifying the key nodes to target in a social network is an important problem in several application areas, including the disruption of terrorist networks and the crafting of effective immunization strategies. One important issue that has received limited attention is how such targeting strategies...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Report |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Booker, Lashon B |
description | Identifying the key nodes to target in a social network is an important problem in several application areas, including the disruption of terrorist networks and the crafting of effective immunization strategies. One important issue that has received limited attention is how such targeting strategies are affected by erroneous data about network structure. This paper describes simulation experiments that investigate this issue. |
format | Report |
fullrecord | <record><control><sourceid>dtic_1RU</sourceid><recordid>TN_cdi_dtic_stinet_ADA576235</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>ADA576235</sourcerecordid><originalsourceid>FETCH-dtic_stinet_ADA5762353</originalsourceid><addsrcrecordid>eNrjZAgMyUhVcE1LS00uKVbIT1PwTypOLSpLLMnMz1NwLSrKLwKK5imUABU5lpQkJmcrhJXm5KUWJSZl5mSWVIJ0OOfnFuSkVij4pZaU5xdlF_MwsKYl5hSn8kJpbgYZN9cQZw_dlJLM5Pjiksy81JJ4RxdHU3MzI2NTYwLSAGniNHU</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>report</recordtype></control><display><type>report</type><title>The Effects of Observation Errors on the Attack Vulnerability of Complex Networks</title><source>DTIC Technical Reports</source><creator>Booker, Lashon B</creator><creatorcontrib>Booker, Lashon B ; MITRE CORP MCLEAN VA</creatorcontrib><description>Identifying the key nodes to target in a social network is an important problem in several application areas, including the disruption of terrorist networks and the crafting of effective immunization strategies. One important issue that has received limited attention is how such targeting strategies are affected by erroneous data about network structure. This paper describes simulation experiments that investigate this issue.</description><language>eng</language><subject>ATTACK ; CENTRALITY MEASURES ; COMMUNICATIONS NETWORKS ; Computer Systems ; COMPUTERIZED SIMULATION ; CRITICAL NODE IDENTIFICATION ; DELIBERATE NODE REMOVAL ; EDGE ADDITION ERRORS ; EDGE DELETION ERRORS ; ERRORS ; GRAPHS ; INTENTIONAL ATTACKS ; INTERPERSONAL RELATIONS ; KEY NODE IDENTIFICATION ; MEASURES OF EFFECTIVENESS ; NETWORK ATTACK MODELING ; NETWORK TOPOLOGY ; NODE ADDITION ERRORS ; NODE DELETION ERRORS ; NODES ; OBSERVATION ; OBSERVATION ERRORS ; RANDOM ATTACKS ; RANDOM NODE REMOVAL ; REMOVAL ; ROBUSTNESS ; SOCIAL NETWORKS ; Sociology and Law ; TARGETED ATTACKS ; TARGETING ; VULNERABILITY</subject><creationdate>2012</creationdate><rights>Approved for public release; distribution is unlimited.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,776,881,27544,27545</link.rule.ids><linktorsrc>$$Uhttps://apps.dtic.mil/sti/citations/ADA576235$$EView_record_in_DTIC$$FView_record_in_$$GDTIC$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Booker, Lashon B</creatorcontrib><creatorcontrib>MITRE CORP MCLEAN VA</creatorcontrib><title>The Effects of Observation Errors on the Attack Vulnerability of Complex Networks</title><description>Identifying the key nodes to target in a social network is an important problem in several application areas, including the disruption of terrorist networks and the crafting of effective immunization strategies. One important issue that has received limited attention is how such targeting strategies are affected by erroneous data about network structure. This paper describes simulation experiments that investigate this issue.</description><subject>ATTACK</subject><subject>CENTRALITY MEASURES</subject><subject>COMMUNICATIONS NETWORKS</subject><subject>Computer Systems</subject><subject>COMPUTERIZED SIMULATION</subject><subject>CRITICAL NODE IDENTIFICATION</subject><subject>DELIBERATE NODE REMOVAL</subject><subject>EDGE ADDITION ERRORS</subject><subject>EDGE DELETION ERRORS</subject><subject>ERRORS</subject><subject>GRAPHS</subject><subject>INTENTIONAL ATTACKS</subject><subject>INTERPERSONAL RELATIONS</subject><subject>KEY NODE IDENTIFICATION</subject><subject>MEASURES OF EFFECTIVENESS</subject><subject>NETWORK ATTACK MODELING</subject><subject>NETWORK TOPOLOGY</subject><subject>NODE ADDITION ERRORS</subject><subject>NODE DELETION ERRORS</subject><subject>NODES</subject><subject>OBSERVATION</subject><subject>OBSERVATION ERRORS</subject><subject>RANDOM ATTACKS</subject><subject>RANDOM NODE REMOVAL</subject><subject>REMOVAL</subject><subject>ROBUSTNESS</subject><subject>SOCIAL NETWORKS</subject><subject>Sociology and Law</subject><subject>TARGETED ATTACKS</subject><subject>TARGETING</subject><subject>VULNERABILITY</subject><fulltext>true</fulltext><rsrctype>report</rsrctype><creationdate>2012</creationdate><recordtype>report</recordtype><sourceid>1RU</sourceid><recordid>eNrjZAgMyUhVcE1LS00uKVbIT1PwTypOLSpLLMnMz1NwLSrKLwKK5imUABU5lpQkJmcrhJXm5KUWJSZl5mSWVIJ0OOfnFuSkVij4pZaU5xdlF_MwsKYl5hSn8kJpbgYZN9cQZw_dlJLM5Pjiksy81JJ4RxdHU3MzI2NTYwLSAGniNHU</recordid><startdate>201211</startdate><enddate>201211</enddate><creator>Booker, Lashon B</creator><scope>1RU</scope><scope>BHM</scope></search><sort><creationdate>201211</creationdate><title>The Effects of Observation Errors on the Attack Vulnerability of Complex Networks</title><author>Booker, Lashon B</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-dtic_stinet_ADA5762353</frbrgroupid><rsrctype>reports</rsrctype><prefilter>reports</prefilter><language>eng</language><creationdate>2012</creationdate><topic>ATTACK</topic><topic>CENTRALITY MEASURES</topic><topic>COMMUNICATIONS NETWORKS</topic><topic>Computer Systems</topic><topic>COMPUTERIZED SIMULATION</topic><topic>CRITICAL NODE IDENTIFICATION</topic><topic>DELIBERATE NODE REMOVAL</topic><topic>EDGE ADDITION ERRORS</topic><topic>EDGE DELETION ERRORS</topic><topic>ERRORS</topic><topic>GRAPHS</topic><topic>INTENTIONAL ATTACKS</topic><topic>INTERPERSONAL RELATIONS</topic><topic>KEY NODE IDENTIFICATION</topic><topic>MEASURES OF EFFECTIVENESS</topic><topic>NETWORK ATTACK MODELING</topic><topic>NETWORK TOPOLOGY</topic><topic>NODE ADDITION ERRORS</topic><topic>NODE DELETION ERRORS</topic><topic>NODES</topic><topic>OBSERVATION</topic><topic>OBSERVATION ERRORS</topic><topic>RANDOM ATTACKS</topic><topic>RANDOM NODE REMOVAL</topic><topic>REMOVAL</topic><topic>ROBUSTNESS</topic><topic>SOCIAL NETWORKS</topic><topic>Sociology and Law</topic><topic>TARGETED ATTACKS</topic><topic>TARGETING</topic><topic>VULNERABILITY</topic><toplevel>online_resources</toplevel><creatorcontrib>Booker, Lashon B</creatorcontrib><creatorcontrib>MITRE CORP MCLEAN VA</creatorcontrib><collection>DTIC Technical Reports</collection><collection>DTIC STINET</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Booker, Lashon B</au><aucorp>MITRE CORP MCLEAN VA</aucorp><format>book</format><genre>unknown</genre><ristype>RPRT</ristype><btitle>The Effects of Observation Errors on the Attack Vulnerability of Complex Networks</btitle><date>2012-11</date><risdate>2012</risdate><abstract>Identifying the key nodes to target in a social network is an important problem in several application areas, including the disruption of terrorist networks and the crafting of effective immunization strategies. One important issue that has received limited attention is how such targeting strategies are affected by erroneous data about network structure. This paper describes simulation experiments that investigate this issue.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_dtic_stinet_ADA576235 |
source | DTIC Technical Reports |
subjects | ATTACK CENTRALITY MEASURES COMMUNICATIONS NETWORKS Computer Systems COMPUTERIZED SIMULATION CRITICAL NODE IDENTIFICATION DELIBERATE NODE REMOVAL EDGE ADDITION ERRORS EDGE DELETION ERRORS ERRORS GRAPHS INTENTIONAL ATTACKS INTERPERSONAL RELATIONS KEY NODE IDENTIFICATION MEASURES OF EFFECTIVENESS NETWORK ATTACK MODELING NETWORK TOPOLOGY NODE ADDITION ERRORS NODE DELETION ERRORS NODES OBSERVATION OBSERVATION ERRORS RANDOM ATTACKS RANDOM NODE REMOVAL REMOVAL ROBUSTNESS SOCIAL NETWORKS Sociology and Law TARGETED ATTACKS TARGETING VULNERABILITY |
title | The Effects of Observation Errors on the Attack Vulnerability of Complex Networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-03T16%3A57%3A25IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-dtic_1RU&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=unknown&rft.btitle=The%20Effects%20of%20Observation%20Errors%20on%20the%20Attack%20Vulnerability%20of%20Complex%20Networks&rft.au=Booker,%20Lashon%20B&rft.aucorp=MITRE%20CORP%20MCLEAN%20VA&rft.date=2012-11&rft_id=info:doi/&rft_dat=%3Cdtic_1RU%3EADA576235%3C/dtic_1RU%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |