System vulnerability assessment and critical nodes identification

作者:

Highlights:

• Three metrics are designed to assess system vulnerability.

• A CNI algorithm is applied to identify critical nodes in complex systems using the three metrics.

• Performance of the CNI algorithm is compared to other widely used CNI algorithms.

摘要

•Three metrics are designed to assess system vulnerability.•A CNI algorithm is applied to identify critical nodes in complex systems using the three metrics.•Performance of the CNI algorithm is compared to other widely used CNI algorithms.

论文关键词:Complex system,Identification for control,Graph theory

论文评审过程:Received 11 July 2015, Revised 15 August 2016, Available online 17 August 2016, Version of Record 22 August 2016.

论文官网地址:https://doi.org/10.1016/j.eswa.2016.08.051