• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

通过连续批量去除来破坏网络:西西里黑手党的案例。

Network disruption via continuous batch removal: The case of Sicilian Mafia.

机构信息

School of Computer Science, University of Technology Sydney, Sydney, NSW, Australia.

Department of Ancient and Modern Civilizations, University of Messina, Messina, Italy.

出版信息

PLoS One. 2024 Aug 21;19(8):e0308722. doi: 10.1371/journal.pone.0308722. eCollection 2024.

DOI:10.1371/journal.pone.0308722
PMID:39167596
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11338461/
Abstract

Network disruption is pivotal in understanding the robustness and vulnerability of complex networks, which is instrumental in devising strategies for infrastructure protection, epidemic control, cybersecurity, and combating crime. In this paper, with a particular focus on disrupting criminal networks, we proposed to impose a within-the-largest-connected-component constraint in a continuous batch removal disruption process. Through a series of experiments on a recently released Sicilian Mafia network, we revealed that the constraint would enhance degree-based methods while weakening betweenness-based approaches. Moreover, based on the findings from the experiments using various disruption strategies, we propose a structurally-filtered greedy disruption strategy that integrates the effectiveness of greedy-like methods with the efficiency of structural-metric-based approaches. The proposed strategy significantly outperforms the longstanding state-of-the-art method of betweenness centrality while maintaining the same time complexity.

摘要

网络中断在理解复杂网络的鲁棒性和脆弱性方面至关重要,这对于制定基础设施保护、疫情控制、网络安全和打击犯罪的策略具有重要意义。在本文中,我们特别关注中断犯罪网络,提出在连续批量删除中断过程中施加最大连通分量内的约束。通过对最近发布的西西里黑手党网络进行的一系列实验,我们揭示了这种约束将增强基于度数的方法,同时削弱基于介数的方法。此外,基于使用各种中断策略的实验结果,我们提出了一种结构过滤的贪婪中断策略,该策略将贪婪类方法的有效性与基于结构度量的方法的效率相结合。所提出的策略在保持相同时间复杂度的同时,显著优于基于介数中心性的长期以来的最先进方法。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32c9/11338461/bc417d7e22d7/pone.0308722.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32c9/11338461/dc1903cf6c33/pone.0308722.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32c9/11338461/c2f977550d88/pone.0308722.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32c9/11338461/2c98e64c8ea1/pone.0308722.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32c9/11338461/bc417d7e22d7/pone.0308722.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32c9/11338461/dc1903cf6c33/pone.0308722.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32c9/11338461/c2f977550d88/pone.0308722.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32c9/11338461/2c98e64c8ea1/pone.0308722.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32c9/11338461/bc417d7e22d7/pone.0308722.g004.jpg

相似文献

1
Network disruption via continuous batch removal: The case of Sicilian Mafia.通过连续批量去除来破坏网络:西西里黑手党的案例。
PLoS One. 2024 Aug 21;19(8):e0308722. doi: 10.1371/journal.pone.0308722. eCollection 2024.
2
Disrupting resilient criminal networks through data analysis: The case of Sicilian Mafia.通过数据分析瓦解韧性十足的犯罪网络:以西西里黑手党为例。
PLoS One. 2020 Aug 5;15(8):e0236476. doi: 10.1371/journal.pone.0236476. eCollection 2020.
3
Immunization strategy based on the critical node in percolation transition.基于渗流转变关键节点的免疫策略。
Phys Lett A. 2015 Nov 6;379(43):2795-2801. doi: 10.1016/j.physleta.2015.09.017. Epub 2015 Sep 16.
4
Generalized network dismantling.广义网络拆解
Proc Natl Acad Sci U S A. 2019 Apr 2;116(14):6554-6559. doi: 10.1073/pnas.1806108116. Epub 2019 Mar 15.
5
Attack vulnerability of complex networks.复杂网络的攻击脆弱性。
Phys Rev E Stat Nonlin Soft Matter Phys. 2002 May;65(5 Pt 2):056109. doi: 10.1103/PhysRevE.65.056109. Epub 2002 May 7.
6
A comparative analysis of link removal strategies in real complex weighted networks.真实复杂加权网络中链接删除策略的比较分析。
Sci Rep. 2020 Mar 3;10(1):3911. doi: 10.1038/s41598-020-60298-7.
7
Graph-theoretical comparison of normal and tumor networks in identifying BRCA genes.在识别BRCA基因方面正常网络与肿瘤网络的图论比较
BMC Syst Biol. 2017 Nov 22;11(1):110. doi: 10.1186/s12918-017-0495-0.
8
Recovering Power Grids Using Strategies Based on Network Metrics and Greedy Algorithms.基于网络指标和贪心算法的策略恢复电网
Entropy (Basel). 2023 Oct 17;25(10):1455. doi: 10.3390/e25101455.
9
Optimal pinning controllability of complex networks: dependence on network structure.复杂网络的最优钉扎可控性:对网络结构的依赖性。
Phys Rev E Stat Nonlin Soft Matter Phys. 2015 Jan;91(1):012803. doi: 10.1103/PhysRevE.91.012803. Epub 2015 Jan 5.
10
Entropy-Based Node Importance Identification Method for Public Transportation Infrastructure Coupled Networks: A Case Study of Chengdu.基于熵的公共交通基础设施耦合网络节点重要性识别方法:以成都为例
Entropy (Basel). 2024 Feb 11;26(2):159. doi: 10.3390/e26020159.

本文引用的文献

1
Encoding edge type information in graphlets.在图元中编码边缘类型信息。
PLoS One. 2022 Aug 26;17(8):e0273609. doi: 10.1371/journal.pone.0273609. eCollection 2022.
2
Infectious disease in an era of global change.全球变化时代的传染病
Nat Rev Microbiol. 2022 Apr;20(4):193-205. doi: 10.1038/s41579-021-00639-z. Epub 2021 Oct 13.
3
Directed closure coefficient and its patterns.定向闭合系数及其模式。
PLoS One. 2021 Jun 25;16(6):e0253822. doi: 10.1371/journal.pone.0253822. eCollection 2021.
4
Disrupting resilient criminal networks through data analysis: The case of Sicilian Mafia.通过数据分析瓦解韧性十足的犯罪网络:以西西里黑手党为例。
PLoS One. 2020 Aug 5;15(8):e0236476. doi: 10.1371/journal.pone.0236476. eCollection 2020.
5
Generalized network dismantling.广义网络拆解
Proc Natl Acad Sci U S A. 2019 Apr 2;116(14):6554-6559. doi: 10.1073/pnas.1806108116. Epub 2019 Mar 15.
6
A comparative analysis of approaches to network-dismantling.网络拆除方法的比较分析。
Sci Rep. 2018 Sep 10;8(1):13513. doi: 10.1038/s41598-018-31902-8.
7
Articulation points in complex networks.复杂网络中的关节点。
Nat Commun. 2017 Jan 31;8:14223. doi: 10.1038/ncomms14223.
8
Fast and simple decycling and dismantling of networks.快速简便地去环和拆卸网络。
Sci Rep. 2016 Nov 29;6:37954. doi: 10.1038/srep37954.
9
Network dismantling.网络拆解
Proc Natl Acad Sci U S A. 2016 Nov 1;113(44):12368-12373. doi: 10.1073/pnas.1605083113. Epub 2016 Oct 18.
10
Fast Fragmentation of Networks Using Module-Based Attacks.使用基于模块的攻击实现网络的快速碎片化
PLoS One. 2015 Nov 16;10(11):e0142824. doi: 10.1371/journal.pone.0142824. eCollection 2015.