Nalazite se na CroRIS probnoj okolini. Ovdje evidentirani podaci neće biti pohranjeni u Informacijskom sustavu znanosti RH. Ako je ovo greška, CroRIS produkcijskoj okolini moguće je pristupi putem poveznice www.croris.hr
izvor podataka: crosbi

The cost of attack in competing networks (CROSBI ID 222953)

Prilog u časopisu | izvorni znanstveni rad | međunarodna recenzija

Podobnik, Boris ; Horvatić, Davor ; Lipić, Tomislav ; Perc, Matjaž ; Buldu, Javier Martin ; Stanley, H. Eugene The cost of attack in competing networks // Journal of the royal society interface, 12 (2015), 112; 20150770-1-20150770-8. doi: 10.1098/rsif.2015.0770

Podaci o odgovornosti

Podobnik, Boris ; Horvatić, Davor ; Lipić, Tomislav ; Perc, Matjaž ; Buldu, Javier Martin ; Stanley, H. Eugene

engleski

The cost of attack in competing networks

Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator–prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor's nodes after their long inactivity. However, owing to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilience dynamics for two competing networks. Within this formalism, we determine the cost and optimal duration of an attack, allowing a network to evaluate the risk of initiating hostilities.

complex networks; interactive networks; socioeconomic systems; network vulnerability; robustness; attacks

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

Podaci o izdanju

12 (112)

2015.

20150770-1-20150770-8

objavljeno

1742-5689

10.1098/rsif.2015.0770

Povezanost rada

Fizika, Računarstvo

Poveznice
Indeksiranost