复旦大学:《网络科学导论 Introduction to Network Science》教学课件_7- Robustness and fragile

Network science An English introductory course for undergraduate students Lecturer: Dr. Cong LI ee@ Fudan University Adaptive Networks and Control Lab
Network Science Lecturer: Dr. Cong LI EE @ Fudan University —— An English introductory course for undergraduate students Adaptive Networks and Control Lab

Recall: Types of networks Regular graphs Erdos-Renyi (Publ. Math. Inst. Hung. Acd. Sci. 5, 17 (1960) P N nodes, eac rewiring of links pair of nodes are connected with P=02 probability p on or nks Random networks Small world networks Scale-free networks
2 Recall: Types of Networks Regular graphs Random networks Small world networks Scale-free networks

Different roles, different points If you want todestroy a networking system. how to locate your targets? If you want to guard a networking system how to assign your safety measures?
Different roles, different points • If you want to ‘destroy’ a networking system, how to locate your targets? • If you want to ‘guard’ a networking system, how to assign your safety measures? 3

Which players will you pay more FCB attention when you play a football game? 3a如 wa.wa> 【1马 阿网马 阿余地 普健你 c钠永多 卡西啊 旦拿 【2】巴萨 网你比鼻尔 伊 周日4 阿障 7小 马新直你
Which players will you pay more attention when you play a football game?

no one in reality is such a bulletproof super-hero neither is a network CHOW YUN-FAT SEANN WILLIAM SCOTT BULLETPROOF MONK
No one in reality is such a bulletproof super-hero, neither is a network 5

http://www.nytimes.com/2010/03/21/world/asia/21gridhtml New York Times 2010/3/21 L M. Wortzel (usa military strategist Chinese researchers . published a paper on my comment: how to attack a small power-grid sub Take it easy. network in a way that would cause a cascading failure of the entire whole US ELECTRICAL POWERGRID ors transfe dges:transmission lines 6
New York Times, 2010/3/21 • L.M. Wortzel (USA military strategist): Chinese researchers …published a paper on how to attack a small power-grid subnetwork in a way that would cause a cascading failure of the entire whole US. http://www.nytimes.com/2010/03/21/world/asia/21grid.html my comment: Take it easy! 6

Start from simple examples
Start from simple examples……

The assumed victim (a) (b) C Remove which node or edge to destroy?
The assumed victim • Remove which node or edge to destroy? 8

So, which one is vulnerable to destroy [a) (c)
So, which one is vulnerable to destroy? 9

Two categories of“ destroyers” To destroy the connectivity of a network errors and failures(random occurrence) purposely attacks(specific targets)
Two categories of “destroyers” To destroy the connectivity of a network, • errors and failures (random occurrence) • purposely attacks (specific targets) 10
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_6- Scale free networks.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_5- NW+Searching+Pagerank.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_4- Small world model.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_3- Erdos Ranyi random graphs.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_2- Classic Network Concepts & Properties.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_1- Introduction.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学参考文献_Synchronization in complex networks.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学参考文献_谷歌背后的数学.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学参考文献_Virus spread in networks.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学参考文献_The structure and function of complex networks.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学参考文献_Synchronization in complex oscillator networks and smart grids.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学参考文献_Opinion dynamic model-Galam model.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学参考文献_Nonconsensus dynamic opinion model.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学参考文献_Modularity and community structure of networks.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学参考文献_Kleinberg algorithm.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学参考文献_Kleiberg nature.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学参考文献_Heterogeneous virus spreading-pastor2001.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学参考文献_Emergence of scaling in random networks.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学参考文献_Detection and prediction with time serial based on network science.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学参考文献_Community detaction-fast unfolding.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_8- Modelling networks_image.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_9- TimeseriesNetworks and ECG.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_10- Evolutionary game.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_11- Spreading on networks.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_12- Community+Opinion dynamics+consensus.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_13- Collective behaviors+Drone flocking.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_14 - Synchronization.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)01 Classical Encryption Techniques.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)02 Introduction to Cryptography -Classical Encryption Techniques(cont.).pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)03 Modern Block Ciphers.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)04 Public Key Cryptography, RSA.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)05 Message authentication and Hash function.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)06 Stream Cipher.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)07-08 PKI(Public Key Infrastructure)公钥基础设施——公钥技术的应用.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)09-10(1/2)Authentication - 身份认证.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)09-10(2/2)Authentication – Basic protocol constructions – Kerberos.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)11.1 IP Security.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)11.2 Web & EC Security.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)12 Block Chain 区块链 - 密码解决方案集大成者.pdf
- 河南中医药大学:《数据库规划与设计》课程教学资源(Oracle实验指导)实验7 创建及管理Oracle数据表.pdf