Building Robust Closed-Loop Supply Networks against Malicious Attacks
نویسندگان
چکیده
منابع مشابه
Protein Interaction Networks are Fragile against Random Attacks and Robust against Malicious Attacks
Christian M. Schneider, ∗ Roberto F.S. Andrade, Troy Shinbrot, and Hans J. Herrmann 4 Computational Physics, IfB, ETH Zurich, Schafmattstrasse 6, 8093 Zurich, Switzerland Instituto de F́ısica, Universidade Federal da Bahia, 40210-210, Salvador, Brazil Biomedical Engineering, Rutgers University, Piscataway, NJ, USA Departamento de F́ısica, Universidade Federal do Ceará, 60451-970 Fortaleza, Ceará,...
متن کاملEA Optimization of Networks Against Malicious Attacks
The importance of considering the network structure in studying the behavior of many modern infrastructures and naturally occurring complex systems, has become increasingly clear. The topology of many real world networks makes them vulnerable with respect to targeted attacks on their components, and there has been a recent surge of interest in determining how one can optimize the structure of t...
متن کاملRobust dynamic network traffic partitioning against malicious attacks
The continual growth of network traffic rates leads to heavy packet processing overheads, and a typical solution is to partition traffic into multiple network processors for parallel processing especially in emerging software-defined networks. This paper is thus motivated to propose a robust dynamic network traffic partitioning scheme to defend against malicious attacks. After introducing the c...
متن کاملrobust model for designing a dynamic closed-loop supply chain with adjustable capacity
in this paper, firstly by using a mixed linear programming a new model of locating facilities with limited capacity is presented to design a closed-loop supply chain in a multi-product and multi-period mode. then, using a robust optimization approach, the proposed model decreases in non-deterministic expansion. the results show that the proposed model can handle facility capacity in a closed lo...
متن کاملEnhancing network robustness against malicious attacks.
In a recent work [Schneider et al., Proc. Natl. Acad. Sci. USA 108, 3838 (2011)], the authors proposed a simple measure for network robustness under malicious attacks on nodes. Using a greedy algorithm, they found that the optimal structure with respect to this quantity is an onion structure in which high-degree nodes form a core surrounded by rings of nodes with decreasing degree. However, in ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Processes
سال: 2020
ISSN: 2227-9717
DOI: 10.3390/pr9010039