Building Robust Closed-Loop Supply Networks against Malicious Attacks

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protein Interaction Networks are Fragile against Random Attacks and Robust against Malicious Attacks

Christian M. Schneider, ∗ Roberto F.S. Andrade, Troy Shinbrot, and Hans J. Herrmann 4 Computational Physics, IfB, ETH Zurich, Schafmattstrasse 6, 8093 Zurich, Switzerland Instituto de F́ısica, Universidade Federal da Bahia, 40210-210, Salvador, Brazil Biomedical Engineering, Rutgers University, Piscataway, NJ, USA Departamento de F́ısica, Universidade Federal do Ceará, 60451-970 Fortaleza, Ceará,...

متن کامل

EA Optimization of Networks Against Malicious Attacks

The importance of considering the network structure in studying the behavior of many modern infrastructures and naturally occurring complex systems, has become increasingly clear. The topology of many real world networks makes them vulnerable with respect to targeted attacks on their components, and there has been a recent surge of interest in determining how one can optimize the structure of t...

متن کامل

Robust dynamic network traffic partitioning against malicious attacks

The continual growth of network traffic rates leads to heavy packet processing overheads, and a typical solution is to partition traffic into multiple network processors for parallel processing especially in emerging software-defined networks. This paper is thus motivated to propose a robust dynamic network traffic partitioning scheme to defend against malicious attacks. After introducing the c...

متن کامل

robust model for designing a dynamic closed-loop supply chain with adjustable capacity

in this paper, firstly by using a mixed linear programming a new model of locating facilities with limited capacity is presented to design a closed-loop supply chain in a multi-product and multi-period mode. then, using a robust optimization approach, the proposed model decreases in non-deterministic expansion. the results show that the proposed model can handle facility capacity in a closed lo...

متن کامل

Enhancing network robustness against malicious attacks.

In a recent work [Schneider et al., Proc. Natl. Acad. Sci. USA 108, 3838 (2011)], the authors proposed a simple measure for network robustness under malicious attacks on nodes. Using a greedy algorithm, they found that the optimal structure with respect to this quantity is an onion structure in which high-degree nodes form a core surrounded by rings of nodes with decreasing degree. However, in ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Processes

سال: 2020

ISSN: 2227-9717

DOI: 10.3390/pr9010039