logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Network Robustness Under Largescale Attacks 2013th Edition Qing Zhou

  • SKU: BELL-4539316
Network Robustness Under Largescale Attacks 2013th Edition Qing Zhou
$ 31.00 $ 45.00 (-31%)

5.0

68 reviews

Network Robustness Under Largescale Attacks 2013th Edition Qing Zhou instant download after payment.

Publisher: Springer
File Extension: PDF
File size: 3.24 MB
Pages: 50
Author: Qing Zhou, Long Gao, Ruifang Liu, Shuguang Cui
ISBN: 9781461448594, 146144859X
Language: English
Year: 2012
Edition: 2013

Product desciption

Network Robustness Under Largescale Attacks 2013th Edition Qing Zhou by Qing Zhou, Long Gao, Ruifang Liu, Shuguang Cui 9781461448594, 146144859X instant download after payment.

Network Robustness under Large-Scale Attacks provides the analysis of network robustness under attacks, with a focus on large-scale correlated physical attacks. The book begins with a thorough overview of the latest research and techniques to analyze the network responses to different types of attacks over various network topologies and connection models. It then introduces a new large-scale physical attack model coined as area attack, under which a new network robustness measure is introduced and applied to study the network responses. With this book, readers will learn the necessary tools to evaluate how a complex network responds to random and possibly correlated attacks.

Related Products