
Identification of network vulnerability is one of the important means of cyberspace operation, management and security. As a typical case of network vulnerability, network cascading failures are often found in infrastructure networks such as the power grid system, communication network and road traffic, where the failure of a few nodes may cause devastating disasters to the whole complex system. Therefore, it is very important to identify the critical nodes in the network cascading failure and understand the internal laws of cascading failure in complex systems so as to fully grasp the vulnerability of complex systems and develop a network management strategy. The existing models for cascading failure analysis mainly evaluate the criticality of nodes by quantifying their importance in the network structure. However, they ignore the important load, node capacity and other attributes in the cascading failure model. In order to address those limitations, this paper proposes a novel critical node identification method in the load network from the perspective of a network adversarial attack. On the basis of obtaining a relatively complete topology, first, the network attack can be modeled as a cascading failure problem for the load network. Then, the concept of load percolation is proposed according to the percolation theory, which is used to construct the load percolation model in the cascading failure problem. After that, the identification method of critical nodes is developed based on the load percolation, which accurately identifies the vulnerable nodes. The experimental results show that the load percolation parameter can discover the affected nodes more accurately, and the final effect is better than those of the existing methods.
Citation: Hangyu Hu, Fan Wu, Xiaowei Xie, Qiang Wei, Xuemeng Zhai, Guangmin Hu. Critical node identification in network cascading failure based on load percolation[J]. Electronic Research Archive, 2023, 31(3): 1524-1542. doi: 10.3934/era.2023077
[1] | Antonio N. Bojanic, Alejandro Jordán . Modeling the COVID-19 epidemic in Bolivia. Big Data and Information Analytics, 2020, 5(1): 47-57. doi: 10.3934/bdia.2020004 |
[2] | Ugo Avila-Ponce de León, Ángel G. C. Pérez, Eric Avila-Vales . A data driven analysis and forecast of an SEIARD epidemic model for COVID-19 in Mexico. Big Data and Information Analytics, 2020, 5(1): 14-28. doi: 10.3934/bdia.2020002 |
[3] | Nickson Golooba, Woldegebriel Assefa Woldegerima, Huaiping Zhu . Deep neural networks with application in predicting the spread of avian influenza through disease-informed neural networks. Big Data and Information Analytics, 2025, 9(0): 1-28. doi: 10.3934/bdia.2025001 |
[4] | Antonio N. Bojanic . Accounting for the Trump factor in modeling the COVID-19 epidemic: the case of Louisiana. Big Data and Information Analytics, 2021, 6(0): 74-85. doi: 10.3934/bdia.2021006 |
[5] | Jiaqi Ma, Hui Chang, Xiaoqing Zhong, Yueli Chen . Risk stratification of sepsis death based on machine learning algorithm. Big Data and Information Analytics, 2024, 8(0): 26-42. doi: 10.3934/bdia.2024002 |
[6] | Yiwen Tao, Zhenqiang Zhang, Bengbeng Wang, Jingli Ren . Motality prediction of ICU rheumatic heart disease with imbalanced data based on machine learning. Big Data and Information Analytics, 2024, 8(0): 43-64. doi: 10.3934/bdia.2024003 |
[7] | Bill Huajian Yang . Modeling path-dependent state transitions by a recurrent neural network. Big Data and Information Analytics, 2022, 7(0): 1-12. doi: 10.3934/bdia.2022001 |
[8] | Bill Huajian Yang . Resolutions to flip-over credit risk and beyond-least squares estimates and maximum likelihood estimates with monotonic constraints. Big Data and Information Analytics, 2018, 3(2): 54-67. doi: 10.3934/bdia.2018007 |
[9] | Anupama N, Sudarson Jena . A novel approach using incremental under sampling for data stream mining. Big Data and Information Analytics, 2018, 3(1): 1-13. doi: 10.3934/bdia.2017017 |
[10] | Amanda Working, Mohammed Alqawba, Norou Diawara, Ling Li . TIME DEPENDENT ATTRIBUTE-LEVEL BEST WORST DISCRETE CHOICE MODELLING. Big Data and Information Analytics, 2018, 3(1): 55-72. doi: 10.3934/bdia.2018010 |
Identification of network vulnerability is one of the important means of cyberspace operation, management and security. As a typical case of network vulnerability, network cascading failures are often found in infrastructure networks such as the power grid system, communication network and road traffic, where the failure of a few nodes may cause devastating disasters to the whole complex system. Therefore, it is very important to identify the critical nodes in the network cascading failure and understand the internal laws of cascading failure in complex systems so as to fully grasp the vulnerability of complex systems and develop a network management strategy. The existing models for cascading failure analysis mainly evaluate the criticality of nodes by quantifying their importance in the network structure. However, they ignore the important load, node capacity and other attributes in the cascading failure model. In order to address those limitations, this paper proposes a novel critical node identification method in the load network from the perspective of a network adversarial attack. On the basis of obtaining a relatively complete topology, first, the network attack can be modeled as a cascading failure problem for the load network. Then, the concept of load percolation is proposed according to the percolation theory, which is used to construct the load percolation model in the cascading failure problem. After that, the identification method of critical nodes is developed based on the load percolation, which accurately identifies the vulnerable nodes. The experimental results show that the load percolation parameter can discover the affected nodes more accurately, and the final effect is better than those of the existing methods.
An outbreak of pneumonia initially took place in Wuhan, China, which turned out to be coronavirus disease 2019 (COVID-19), caused by a novel coronavirus (SARS-CoV-2). The pandemic has brought about devastating public health, economic, and political crises. The outbreak has spread to 222 countries and territories, inflicted more than 116.17 million confirmed cases, and claimed more than 2.58 million lives, as reported on March 7th, 2021 [1]. People residing in the United States (US) have paid a high price; the pandemic has caused more than 29.05 million confirmed cases and claimed 527,726 lives, as reported on March 11th, 2021 [2,3]. The emergence of COVID-19 pandemic demonstrates the importance of research on accurately understanding and modeling the transmission and spread of the COVID-19 and SARS-CoV-2 [4,5,6]. It is essential to understand the mathematical mechanism and dynamics of COVID-19 to predict the pandemic better and evaluate the effects of intervention strategies and offer effective policies [7]. This paper is motivated by the need for in-depth investigations.
The COVID-19 is a communicable disease. An exposed person may interact with and transmit the virus to a susceptible individual. An interaction between the exposed person and the susceptible individual may result in the susceptible individual becoming exposed. An exposed individual may experience an incubation period before becoming ill, i.e., infected. Thus, an exposed person is infectious but not yet infected. An infected individual may be lucky enough to recover, at least to some extent, after a period of time. Alternatively, they will die. This process can be described by a dynamical system of susceptible-exposed-infected-recovered-deceased (SEIRD) differential equations, which can connect the numbers of susceptible, exposed, infected, recovered, and deceased individuals. Figure 1 shows the SEIRD model flow diagram of the transmission of COVID-19.
In the Figure 1, α(t) is the contact rate between susceptible and exposed people, β(t) is the incidence rate of the exposed people becoming infected, μ(t) is the recovery rate of the infected individuals, and δ(t) is the mortality rate of the infected individuals. In the literature, a system of susceptible-exposed-infected-recovered (SEIR) differential equations was developed to describe diseases like chickenpox and vector-borne diseases such as dengue hemorrhagic fever [8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32]. These diseases have a long incubation period, during which time the exposed individual cannot yet transmit the pathogen to others. The SEIR assumes that only an infected individual is infectious and can transmit the virus to a susceptible person and an exposed person is not infectious, as with susceptible-infected-recovered (SIR) models. For the very dangerous COVID-19, an exposed individual is infectious and can transmit the virus to susceptible people rapidly. An infected person is infectious but may be sent to hospitals quickly and separated from the susceptible people, making them unlikely to transmit the virus to susceptible people. Therefore, the existing SEIR and SIR systems cannot be used to analyze the COVID-19, and we need to build new models to fill the gap.
To get an intuitive idea of these rates for the COVID-19 transmission process, we obtain population data from US Census Bureau and COVID-19 daily reports from the Johns Hopkins University website through a GitHub repository [4,5,6]. The data are then combined for a unified analysis. We then calculate the empirical incidence, mortality, and recovered rates. Figure 2 provides trajectories of total numbers of people tested, confirmed cases, deaths, and recovered as well as related linear regression lines for COVID-19 in the US from April 16th to June 30th, 2020.
In Figures 3 and S1, we show trajectories of empirical testing rate, incidence rate, mortality rate, and recovery rate as well as related quadratic and linear regression lines for COVID-19 based on the results of Figure 2, respectively. It can be seen from the Figures 3 and S1 that both the testing rate and recovery rate increase, the incidence rate decreases, and the mortality rate increases at the beginning and then remains relatively stable before decreasing. The features of these rate may be due to people's being inexperienced at the beginning of the pandemic but gradually becoming more experienced at dealing with it and getting better prepared.
The empirical results shown in Figures 1, 3 and S1 provide us with a rationale for building the models. One noticeable feature is that these rates are not constants but time-dependent. Figures 1, 3 and S1 are based on COVID-19 data in the US from April 16th to June 30th, 2020, in which the sample size is large, and the deterministic SEIRD system is appropriate. The results of Figures 1, 3 and S1 provide a good estimate of the incidence, mortality, and recovery rates of COVID-19. Based on the empirical results, we can consider a few cases of contact, incidence, recovery, and mortality rates to model dynamics of COVID-19.
In this article, we build a system of SEIRD ordinary differential equations to describe relationship among the numbers of susceptible, exposed, infected, recovered, and deceased individuals in a town, state or country based on the empirical rates. The organization of the paper is as follows. In section 2, we build SEIRD models in details. We perform empirical analysis for the SEIRD models in section 3. In section 4, we provide some discussion about the property of the SEIRD models and some thoughts about future research direction.
Consider an independent time variable t which is measured in days. At time t, let s(t) be the number of susceptible individuals in a town, state or country; e(t), the number of exposed individuals that have transmitted the virus; i(t), the number of exposed individuals that are infected; r(t), the number of infected individuals that have recovered; and d(t), the number of infected individuals that have died. To describe the transmission process of COVID-19, consider a SEIRD system of ordinary differential equations
ds(t)dt=−α(t)s(t)e(t),de(t)dt=α(t)s(t)e(t)−β(t)e(t),di(t)dt=β(t)e(t)−μ(t)i(t)−δ(t)i(t),dr(t)dt=μ(t)i(t),dd(t)dt=δ(t)i(t), | (2.1) |
with initial conditions s(0)=S0,e(0)=E0,i(0)=I0,r(0)=0, and d(0)=0. In the system (2.1), α(t) is contact rate, β(t) is incidence rate, μ(t) is recovery rate, and δ(t) is mortality rate displayed in the Figure 1. Note all these rates are non-negative. The first equation in the system (2.1) is called susceptible equation, the second equation in the system (2.1) is called exposed equation, the third is called infected equation, the fourth is called recovery equation, and the fifth is called deceased equation, respectively. The system (2.1) is different from those in the literature of SEIR system as the susceptible and exposed equations are different. In the SEIR models, it is assumed that only an infected individual can transmit the virus to a susceptible person like SIR models and so the first two SEIR equations are
ds(t)dt=−α(t)s(t)i(t),de(t)dt=α(t)s(t)i(t)−β(t)e(t). |
For COVID-19, however, an exposed individual is infectious and may interact with a susceptible individual, thus transmitting the virus. This transmission is described by the susceptible equation in system (2.1). The exposed equation in system (2.1) implies that an exposed individual may contract coronavirus and experience an incubation period before becoming ill, i.e., infected. Once contracting the virus, an exposed person can transmit the virus to a susceptible individual. The infected can either recover with a recovery rate μ(t) or die with a mortality rate δ(t).
Let us denote N=S0+E0+I0. Note
ds(t)dt+de(t)dt+di(t)dt+dr(t)dt+dd(t)dt=0. |
It follows that s(t)+e(t)+i(t)+r(t)+d(t)=N is a constant. Since ds(t)dt=−α(t)s(t)e(t)≤0, the susceptible function s(t) is a decreasing function. Similarly, the recovery function r(t) and deceased function d(t) are increasing functions since dr(t)dt=μ(t)i(t)≥0 and dd(t)dt=δ(t)i(t)≥0, respectively. In the following, we impose conditions on incidence rate β(t), recovery rate μ(t), and mortality rate δ(t) based on the empirical results of the Figures 3 and S1 as follows
Quadratic decline of incidence rate: β(t)=β0−β1t+β2t2≥0,β0>0,β1>0,β2>0,Linear decline of incidence rate: β(t)=β0−β1t≥0,β0>0,β1>0,Linear increase of recovery rate: μ(t)=μ0+μ1t,μ0≥0,μ1≥0,Quadratic mortality rate: δ(t)=δ0+δ1t+δ2t2≥0,δ0≥0,δ1≥0,δ2<0. | (2.2) |
As shown in Figure 3, a declining incidence rate implies that the proportion of infected people is high at the beginning but decreases as time goes by. The empirical mortality rate is assumed to be a quadratic curve. It implies that the mortality rate increases initially, after which it remains stable and eventually decreases. One possible reason for this is that the virus is strongly virulent at the beginning but gradually weakens. Also, healthcare for infected people improves, and this contributes to an eventual decline in mortality. On the other hand, an increasing recovery rate is most likely due to improving healthcare and the fact that people are more experienced at handling the disease as time progresses. We assume that the recovery rate is linearly increasing from the empirical result of COVID-19 in the US, as shown in Figure 3.
For the contact rate α(t), we consider an exponential declining rate: α(t)=α0exp(−α1t),α0>0,α1>0. The rationale for a declining contact rate is that people may contact each other as normal at the beginning stage of the pandemic but reduce contact quickly as time moves on. The exponential decline means that the contact reduces to a minimum fast.
From the susceptible equation and the exposed equation in the system (2.1), we have
de(t)ds(t)=−1+β(t)α(t)s(t). |
Integrating the above equation gives
e(t)=E0+S0−s(t)+∫t0β(u)α(u)s(u)ds(u). |
If α(t)=α0 and β(t)=β0 are constants, the above equation provides an exact solution
e(t)=E0+S0−s(t)+1qln(s(t)/S0),q=α0β0. | (2.3) |
In addition, de(t)ds(t)=−1+β0α0s(t)=0 implies that e(t) reaches its maximum when s(t)=1/q. Hence, the maximal number of exposed individual is given by
emax=E0+S0−1q(1+ln(qS0)), if α(t)=α0 and β(t)=β0. | (2.4) |
Under an assumption of constant contacting rate α(t)=α0 and constant incidence rate β(t)=β0, we obtain the exposed function e(t) and the maximal number of exposed individual emax in relations (2.3) and (2.4). In general, the contact rates, incidence rates, recovery rates, and mortality rates are functions of time variable t. An exact solutions of SEIRD system (2.1) is not possible. Instead, a numerical approximation procedure can provide us a solution via Euler's method [33,34,35]. Taking a small time interval Δt and increment Δs(t)=s(t+Δt)−s(t), we may make an approximation ds(t)dt=Δs(t)Δt. Similarly, we may approximate di(t)dt=Δi(t)Δt, where Δi(t)=i(t+Δt)−i(t), etc. Then, we may obtain a system of recurrence equations as follows to approximate the numbers of susceptible, exposed, infected, recovered, and deceased
s(t+Δt)=s(t)−α(t)s(t)e(t)Δt,e(t+Δt)=e(t)+[α(t)s(t)e(t)−β(t)e(t)]Δt,i(t+Δt)=i(t)+[β(t)e(t)−μ(t)i(t)−δ(t)i(t)]Δt,r(t+Δt)=r(t)+μ(t)i(t)Δt,d(t+Δt)=d(t)+δ(t)i(t)Δt. | (3.1) |
Using the recurrence system (3.1) and initial conditions s(0)=S0,e(0)=E0,i(0)=I0,r(0)=0, and d(0)=0, we perform numerical approximations for a few cases of the rates defined in relations (2.2).
By using the rate functions provided in the Figure 3, we perform numerical calculation for approximate numbers of susceptible, exposed, infected, and deceased. The incidence, recovery, and mortality rates are from Figure 3: β(t)=0.01(21.0−0.30t+0.0018t2), μ(t)=0.01(14.65+0.188t), and δ(t)=0.01(5.25+0.045t−0.00067t2). The initial conditions are given by S0=106,E0=10, and I0=2. We consider four exponential decline contact functions α(t)=1.2×10−6exp(α1t): (a) α1=−0.01, (b) α1=−0.025, (c) α1=−0.05, and (d) α1=−0.065, respectively. Thus, the exponential declining rates of the four contact functions decrease from −0.01 to −0.065. The results are plotted in Figure 4.
It can be seen from Figure 4(a), (b) that the number of susceptible individuals rapidly decreases to zero when α1=−0.01 and α1=−0.025. If α1=−0.05, the number of susceptible individuals decreases and stabilizes around 100,000 when the time t is about 30 days (Figure 4 (c)); if α1=−0.065, the number of susceptible individuals decreases and stabilizes around 500,000 when the time t is about 30 days (Figure 4 (d)). For each plot, the numbers of exposed and infected start low and then increase. Once they reach their peak, they decrease to low numbers again. When α1=−0.01 and α1=−0.025, both the numbers of exposed and infected reach high levels when the time t is about 15 days, while fewer people are exposed and infected when α1=−0.05 and α1=−0.065, respectively. The numbers of recovered and deceased individuals increase. The numbers of recovered and deceased decrease as the exponential declining rate decreases exponentially from –0.01 to –0.065, e.g., the curve of recovered in Figure 4(a) is higher than that in Figure 4(d).
In the supplementary materials, we consider another set of incidence, recovery, and mortality rates from Figure S1: β(t)=0.01(19.25−0.17t),μ(t)=0.01(14.65+0.20t), and δ(t)=0.01(5.25+0.045t−0.001t2). In this set of rates, the incidence rate is fitted by linear regression, instead of a quadratic regression in Figure 3. Again, the initial conditions are given by S0=106,E0=10, and I0=2. Using the rates, approximate numbers of susceptible, exposed, infected, and deceased are given in Figure S2, which provides similar results as Figure 4.
In Figure 5, we use another set of rates to calculate approximate numbers of susceptible, exposed, infected, and deceased: β(t)=0.01(14.5−0.25t),μ(t)=0.01(8.5+0.30t), and δ(t)=0.01(4.5−0.05t−0.001t2). The features of the numbers of susceptible, recovered, and deceased are similar to that of Figure 4. However, the number of exposed is still high and does no reach a low level when time t is around 50 days, and the number of infected does not stabilize when time t is around 50 days. Hence, this set of rate functions leads to a good fit for the transmissions and progressions of US COVID-19 pandemic.
In this article, we build SEIRD differential equations to describe relationships among the numbers of susceptible, exposed, infected, recovered, and deceased individuals. Based on the empirical rates, empirical analyses for the SEIRD models are carried out to explore the applications and implications of the models. For COVID-19, a susceptible individual may interact with an exposed person and contract the virus. Hence, an exposed individual is infectious and can transmit the virus to susceptible people rapidly. The SEIRD system differs from SEIR and SIR differential equations in the literature. In these literature models, only an infected individual is infectious and can transmit the virus to a susceptible person. The proposed SEIRD system can directly describe the transmission of COVID-19 in a susceptible population.
Using the US empirical incidence, mortality, and recovery rate functions of COVID-19, we calculate approximate numbers of susceptible, exposed, infected, recovered, and deceased. The incidence, recovery, and mortality rate functions are functions of time in days and are not constant. We consider four exponential decline contact functions to investigate the impact of contact rate on the transmission of COVID-19. An exponential declining contact rate implies that people have contact with each other as usual at the beginning, with a reduction in contact quickly later on. Our empirical results show that a very rapid decline in contact significantly reduces the numbers of exposed, infected, and deceased. Therefore, it makes sense to wear masks and reduce social activities during the pandemic.
In the literature, the SEIR models were extended to be a susceptible-exposed-infected-recovered-susceptible (SEIRS) models, where recovered people may become susceptible again, i.e., recovery does not confer lifelong immunity [25]. For example, rotavirus and malaria are diseases with long incubation periods, and recovery only confers temporary immunity. In the SEIRD system (2.1), we assume immunity for COVID-19 and that recovery confers lifelong immunity. The models can be extended to remove this assumption. As time progresses, we may have empirical data supporting the fact that recovery does not confer lifelong immunity for COVID-19; SEIRD system (2.1) can then be extended to accommodate the finding. Another extension of SEIRD system (2.1) allows for immunity by vaccination. Because vaccine rollout began in December 2020, its effectiveness and influence can be evaluated and provide us with data to help us develop an extension of the SEIRD system that will accommodate immunity by vaccination.
In this article, we only consider a deterministic system of SEIRD differential equations which can not capture random fluctuations of the numbers of susceptible, exposed, infected, recovered, and deceased individuals. The deterministic models can be extended to include stochastic components to describe random fluctuations of the virus transmissions of COVID-19 and viral phylodynamics of SARS-CoV-2 [36,37,38,39,40,41,42,43,44,45]. More research is needed for further investigations.
This study was supported by U.S. National Science Foundation grant DMS-1915904 (Ruzong Fan). One anonymous reviewer and Dr. Jianhong Wu, provided very good and insightful comments for us to improve the manuscript. Mr. Marion L. Hartley helped us to edit the paper. Ruzong Fan conceives the project; Shuqi Wang, Wen Tang, Liyan Xiong, Menyu Fang, and Chi-Yang Chiu provide technical support for the project.
All authors declare no conflicts of interest in this paper.
In the supplementary materials, we consider another set of incidence, recovery, and mortality rates from Figure S1: β(t)=0.01(19.25−0.17t),μ(t)=0.01(14.65+0.20t), and δ(t)=0.01(5.25+0.045t−0.001t2). In this set of rates, the incidence rate is fitted by linear regression, instead of a quadratic regression in Figure 3. Again, the initial conditions are given by S0=106,E0=10, and I0=2. Using the rates, approximate numbers of susceptible, exposed, infected, and deceased are given in Figure S2, which provides similar results as Figure 4.
[1] |
D. J. Watts, A simple model of global cascades on random networks, Proc. Natl. Acad. Sci. U.S.A., 99 (2002), 5766–5771. https://doi.org/10.1073/pnas.082090499 doi: 10.1073/pnas.082090499
![]() |
[2] |
A. E. Motter, Y. C. Lai, Cascade-based attacks on complex networks, Phys. Rev. E: Stat. Phys. Plasmas Fluids Relat. Interdiscip. Top., 66 (2002), 065102. https://doi.org/10.1103/PhysRevE.66.065102 doi: 10.1103/PhysRevE.66.065102
![]() |
[3] |
L. Lü, D. Chen, X. L. Ren, Q. M. Zhang, Y. C. Zhang, T. Zhou, Vital nodes identification in complex networks, Phys. Rep., 650 (2016), 1–63. https://doi.org/10.1016/j.physrep.2016.06.007 doi: 10.1016/j.physrep.2016.06.007
![]() |
[4] |
R. Albert, H. Jeong, A. L. Barabási, Error and attack tolerance of complex networks, Nature, 406 (2000), 378–382. https://doi.org/10.1038/35019019 doi: 10.1038/35019019
![]() |
[5] |
L. D. F. Costa, F. A. Rodrigues, G. Travieso, P. R. Villas Boas, Characterization of complex networks: A survey of measurements, Adv. Phys., 56 (2007), 167–242. https://doi.org/10.1080/00018730601170527 doi: 10.1080/00018730601170527
![]() |
[6] |
H. W. Corley, D. Y. Sha, Most vital links and nodes in weighted networks, Oper. Res. Lett., 1 (1982), 157–160. https://doi.org/10.1016/0167-6377(82)90020-7 doi: 10.1016/0167-6377(82)90020-7
![]() |
[7] | D. Kempe, J. Kleinberg, É. Tardos, Maximizing the spread of influence through a social network, in Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (2003), 137–146. https://doi.org/10.1145/956750.956769 |
[8] |
Y. Chen, G. Paul, S. Havlin, F. Liljeros, H. E. Stanley, Finding a better immunization strategy, Phys. Rev. Lett., 101 (2008), 058701. https://doi.org/10.1103/PhysRevLett.101.058701 doi: 10.1103/PhysRevLett.101.058701
![]() |
[9] |
X. Y. Zhao, B. Huang, M. Tang, H. F. Zhang, D. B. Chen, Identifying effective multiple spreaders by coloring complex networks, Europhys. Lett., 108 (2014), 68005. https://doi.org/10.1209/0295-5075/108/68005 doi: 10.1209/0295-5075/108/68005
![]() |
[10] |
X. Zhang, J. Zhu, Q. Wang, H. Zhao, Identifying influential nodes in complex networks with community structure, Knowledge-Based Syst., 42 (2013), 74–84. https://doi.org/10.1016/j.knosys.2013.01.017 doi: 10.1016/j.knosys.2013.01.017
![]() |
[11] |
F. Morone, H. A. Makse, Influence maximization in complex networks through optimal percolation, Nature, 524 (2015), 65–68. https://doi.org/10.1038/nature14604 doi: 10.1038/nature14604
![]() |
[12] |
P. Panigrahi, S. Maity, Structural vulnerability analysis in small-world power grid networks based on weighted topological model, Int. Trans. Electr. Energy Syst., 30 (2020), e12401. https://doi.org/10.1002/2050-7038.12401 doi: 10.1002/2050-7038.12401
![]() |
[13] |
J. Beyza, J. M. Yusta, G. J. Correa, H. F. Ruiz, Vulnerability assessment of a large electrical grid by new graph theory approach, IEEE Lat. Am. Trans., 16 (2018), 527–535. https://doi.org/10.1109/TLA.2018.8327409 doi: 10.1109/TLA.2018.8327409
![]() |
[14] |
J. Fang, C. Su, Z. Chen, H. Sun, P. Lund, Power system structural vulnerability assessment based on an improved maximum flow approach, IEEE Trans. Smart Grid, 9 (2018), 777–785. https://doi.org/10.1109/TSG.2016.2565619 doi: 10.1109/TSG.2016.2565619
![]() |
[15] |
J. Zhang, F. Hu, S. Wang, Y. Dai, Y. Wang, Structural vulnerability and intervention of high speed railway networks, Physica A, 462 (2016), 743–751. https://doi.org/10.1016/j.physa.2016.06.132 doi: 10.1016/j.physa.2016.06.132
![]() |
[16] |
J. J. Wu, H. J. Sun, Z. Y. Gao, Cascading failures on weighted urban traffic equilibrium networks, Physica A, 386 (2007), 407–413. https://doi.org/10.1016/j.physa.2007.08.034 doi: 10.1016/j.physa.2007.08.034
![]() |
[17] |
J. Wang, L. Rong, L. Zhang, Z. Zhang, Attack vulnerability of scale-free networks due to cascading failures, Physica A, 387 (2008), 6671–6678. https://doi.org/10.1016/j.physa.2008.08.037 doi: 10.1016/j.physa.2008.08.037
![]() |
[18] |
Y. Yang, T. Nishikawa, A. E. Motter, Small vulnerable sets determine large network cascades in power grids, Science, 358 (2017), eaan3184. https://doi.org/10.1126/science.aan3184 doi: 10.1126/science.aan3184
![]() |
[19] |
P. Holme, B. J. Kim, C. N. Yoon, S. K. Han, Attack vulnerability of complex networks, Phys. Rev. E, 65 (2002), 056109. https://doi.org/10.1103/PhysRevE.65.056109 doi: 10.1103/PhysRevE.65.056109
![]() |
[20] |
P. Holme, Edge overload breakdown in evolving networks, Phys. Rev. E, 66 (2002), 036119. https://doi.org/10.1103/PhysRevE.66.036119 doi: 10.1103/PhysRevE.66.036119
![]() |
[21] |
L. Huang, L. Yang, K. Q. Yang, Geographical effects on cascading breakdowns of scale-free networks, Phys. Rev. E, 73 (2006), 036102. https://doi.org/10.1103/PhysRevE.73.036102 doi: 10.1103/PhysRevE.73.036102
![]() |
[22] | L. Dobson, B. A. Carreras, V. E. Lynch, D. E. Newman, An initial model for complex dynamics in electric power system blackouts, in 34th Hawaii International Conference on System Sciences (HICSS), IEEE, Maui, USA, (2001), 710–718. https://doi.org/10.1109/HICSS.2001.926274 |
[23] | I. Dobson, B. A. Carreras, D. E. Newman, A probabilistic loading-dependent model of cascading failure and possible implications for blackouts, in 36th Hawaii International Conference on System Sciences (HICSS), IEEE, Big Island, USA, (2003), 10. https://doi.org/10.1109/HICSS.2003.1173909 |
[24] |
L. D. Valdez, L. Shekhtman, C. E. L. Rocca, X. Zhang, S. V. Buldyrev, P. A. Trunfio, et al., Cascading failures in complex networks, J. Complex Networks, 8 (2020), cnaa013. https://doi.org/10.1093/comnet/cnaa022 doi: 10.1093/comnet/cnaa022
![]() |
[25] |
R. Parshani, S. V. Buldyrev, S. Havlin, Critical effect of dependency groups on the function of networks, Proc. Natl. Acad. Sci. U.S.A., 108 (2011), 1007–1010. https://doi.org/10.1073/pnas.10084041 doi: 10.1073/pnas.10084041
![]() |
[26] |
B. A. Carreras, D. E. Newman, I. Dobson, North American blackout time series statistics and implications for blackout risk, IEEE Trans. Power Syst., 31 (2016), 4406–4414. https://doi.org/10.1109/TPWRS.2015.2510627 doi: 10.1109/TPWRS.2015.2510627
![]() |
[27] | J. W. Wang, L. L. Rong, D. Wang, Model for cascading failures on complex networks based on local characteristics of nodes, J. Manage. Sci. China, 13 (2010), 42–50. |
[28] |
D. H. Kim, A. E. Motter, Resource allocation pattern in infrastructure networks, J. Phys. A: Math. Theor., 41 (2008), 224019. https://doi.org/10.1088/1751-8113/41/22/224019 doi: 10.1088/1751-8113/41/22/224019
![]() |
[29] |
M. Li, R. R. Liu, L. Lü, M. B. Hu, S. Xu, Y. C. Zhang, Percolation on complex networks: theory and application, Phys. Rep., 907 (2021), 1–68. https://doi.org/10.1016/j.physrep.2020.12.003 doi: 10.1016/j.physrep.2020.12.003
![]() |
[30] |
S. Boccaletti, G. Bianconi, R. Criado, C. I. Del Genio, J. Gómez-Gardenes, M. Romance, et al., The structure and dynamics of multilayer networks, Phys. Rep., 544 (2014), 1–122. https://doi.org/10.1016/j.physrep.2014.07.001 doi: 10.1016/j.physrep.2014.07.001
![]() |
[31] |
Y. Y. Cao, R. R. Liu, C. X. Jia, B. H. Wang, Percolation in multilayer complex networks with connectivity and interdependency topological structures, Commun. Nonlinear Sci., 92 (2021), 105492. https://doi.org/10.1016/j.cnsns.2020.105492 doi: 10.1016/j.cnsns.2020.105492
![]() |
[32] |
R. R. Liu, D. A. Eisenberg, T. P. Seager, Y. C. Lai, The "weak" interdependence of infrastructure systems produces mixed percolation transitions in multilayer networks, Sci. Rep., 8 (2018), 1–13. https://doi.org/10.1038/s41598-018-20019-7 doi: 10.1038/s41598-018-20019-7
![]() |
[33] |
L. Zhang, J. Ren, Inhomogeneous percolation on multilayer networks, J. Stat. Mech: Theory Exp., 3 (2019), 033204. https://doi.org/10.1088/1742-5468/ab02ea doi: 10.1088/1742-5468/ab02ea
![]() |
[34] | C. Yang, Z. Chen, Percolation on multi-layer network with joint storage and processing capacities, in 13th International Conference on Computer Modeling and Simulation (ICCMS), ACM, Melbourne, Australia, (2021), 114–120. https://doi.org/10.1145/3474963.3474979 |
[35] |
B. Mirzasoleiman, M. Babaei, M. Jalili, M. Safari, Cascaded failures in weighted networks, Phys. Rev. E, 84 (2011), 046114. https://doi.org/10.1103/PhysRevE.84.046114 doi: 10.1103/PhysRevE.84.046114
![]() |
[36] | T. Xu, A. B. Birchfield, K. M. Gegner, K. S. Shetye, T. J. Overbye, Application of large-scale synthetic power system models for energy economic studies, in 50th Hawaii International Conference on System Sciences (HICSS), IEEE, Waikoloa Village, USA, (2017), 3123–3129. |
[37] |
J. Quirós-Tortós, R. Sánchez-García, J. Brodzki, J. Bialek, V. Terzija, Constrained spectral clustering-based methodology for intentional controlled islanding of large-scale power systems, IET. Gener. Transm. Distrib., 9 (2015), 31–42. https://doi.org/10.1049/iet-gtd.2014.0228 doi: 10.1049/iet-gtd.2014.0228
![]() |
[38] |
V. Latora, M. Marchiori, Efficient behavior of small-world networks, Phys. Rev. Lett., 87 (2001), 198701. https://doi.org/10.1103/PhysRevLett.87.198701 doi: 10.1103/PhysRevLett.87.198701
![]() |
1. | Marius‐F. Danca, Controlling the dynamics of a COVID‐19 mathematical model using a parameter switching algorithm, 2023, 0170-4214, 10.1002/mma.9014 | |
2. | Mohammad Masum, M.A. Masud, Muhaiminul Islam Adnan, Hossain Shahriar, Sangil Kim, Comparative study of a mathematical epidemic model, statistical modeling, and deep learning for COVID-19 forecasting and management, 2022, 80, 00380121, 101249, 10.1016/j.seps.2022.101249 | |
3. | Javaid Ali, Ali Raza, Nauman Ahmed, Ali Ahmadian, Muhammad Rafiq, Massimiliano Ferrara, Evolutionary optimized Padé approximation scheme for analysis of covid-19 model with crowding effect, 2021, 8, 22147160, 100207, 10.1016/j.orp.2021.100207 | |
4. | N. Raza, A. Bakar, A. Khan, C. Tunç, Numerical Simulations of the Fractional-Order SIQ Mathematical Model of Corona Virus Disease Using the Nonstandard Finite Difference Scheme, 2022, 16, 1823-8343, 391, 10.47836/mjms.16.3.01 | |
5. | Shimelis Bekele Zerefe, Tigabu Kasie Ayele, Surafel Luleseged Tilahun, Mehmet Ünver, Mathematical Modeling of COVID‐19 Disease Dynamics With Contact Tracing: A Case Study in Ethiopia, 2024, 2024, 1110-757X, 10.1155/2024/5556734 | |
6. | Anuradha Bhattacharjee, Kshama Jain, 2024, 3139, 0094-243X, 120002, 10.1063/5.0224325 |