Vulnerability Evaluation of Networks to Multiple Failures Based on Critical Nodes and Links

Author(s):  
Amaro de Sousa ◽  
Dorabella Santos
2008 ◽  
Vol 19 (9) ◽  
pp. 2376-2388 ◽  
Author(s):  
Zhen-Hua LI ◽  
Gui-Hai CHEN ◽  
Tong-Qing QIU

Author(s):  
Brad E. Kelle ◽  
Brent A. Strawn

This brief chapter introduces the Oxford Handbook of the Historical Books of the Hebrew Bible. It notes the secondary and constructed nature of the category “Historical Books” (which is not native to the Hebrew Bible) and how this category might be potentially misleading as to the content and genre of these books, many of which are devoid of historiographic intent in anything like the modern sense. With these caveats entered, the introduction next explains how the essays in the book touch on four critical nodes: context (sources, history, texts), content (themes, concepts, issues), approaches (composition, synthesis, theory), and reception (literature, traditions, figures). Further, each essayist was asked to speak to how the topic/area/issue addressed in the essay relates to the Historical Books, as well as how the topic/area/issue helps one better interpret the Historical Books. In conclusion, this introduction notes the diversity that marks recent research in these books.


2021 ◽  
Vol 37 (1-4) ◽  
pp. 1-30
Author(s):  
Vincenzo Agate ◽  
Alessandra De Paola ◽  
Giuseppe Lo Re ◽  
Marco Morana

Multi-agent distributed systems are characterized by autonomous entities that interact with each other to provide, and/or request, different kinds of services. In several contexts, especially when a reward is offered according to the quality of service, individual agents (or coordinated groups) may act in a selfish way. To prevent such behaviours, distributed Reputation Management Systems (RMSs) provide every agent with the capability of computing the reputation of the others according to direct past interactions, as well as indirect opinions reported by their neighbourhood. This last point introduces a weakness on gossiped information that makes RMSs vulnerable to malicious agents’ intent on disseminating false reputation values. Given the variety of application scenarios in which RMSs can be adopted, as well as the multitude of behaviours that agents can implement, designers need RMS evaluation tools that allow them to predict the robustness of the system to security attacks, before its actual deployment. To this aim, we present a simulation software for the vulnerability evaluation of RMSs and illustrate three case studies in which this tool was effectively used to model and assess state-of-the-art RMSs.


2021 ◽  
Vol 9 (1) ◽  
pp. 430-439
Author(s):  
Meili Wang ◽  
Shengfa Yang ◽  
Jie Zhang ◽  
Xiaoling Li

2021 ◽  
Vol 702 (1) ◽  
pp. 012058
Author(s):  
Wang Wei ◽  
Wang Wenxu ◽  
Zhu Lin ◽  
Cheng Rui ◽  
Meng Lishan ◽  
...  

2018 ◽  
Vol 64 ◽  
pp. 165-174 ◽  
Author(s):  
Fábio Barbosa ◽  
Amaro de Sousa ◽  
Agostinho Agra

Sign in / Sign up

Export Citation Format

Share Document