These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

335 related articles for article (PubMed ID: 23005185)

  • 1. Enhancing network robustness against malicious attacks.
    Zeng A; Liu W
    Phys Rev E Stat Nonlin Soft Matter Phys; 2012 Jun; 85(6 Pt 2):066130. PubMed ID: 23005185
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Onion structure and network robustness.
    Wu ZX; Holme P
    Phys Rev E Stat Nonlin Soft Matter Phys; 2011 Aug; 84(2 Pt 2):026106. PubMed ID: 21929063
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Robustness of onionlike correlated networks against targeted attacks.
    Tanizawa T; Havlin S; Stanley HE
    Phys Rev E Stat Nonlin Soft Matter Phys; 2012 Apr; 85(4 Pt 2):046109. PubMed ID: 22680540
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Robustness of network of networks under targeted attack.
    Dong G; Gao J; Du R; Tian L; Stanley HE; Havlin S
    Phys Rev E Stat Nonlin Soft Matter Phys; 2013 May; 87(5):052804. PubMed ID: 23767581
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Enhancing community integrity of networks against multilevel targeted attacks.
    Ma L; Gong M; Cai Q; Jiao L
    Phys Rev E Stat Nonlin Soft Matter Phys; 2013 Aug; 88(2):022810. PubMed ID: 24032886
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Attack and flee: game-theory-based analysis on interactions among nodes in MANETs.
    Li F; Yang Y; Wu J
    IEEE Trans Syst Man Cybern B Cybern; 2010 Jun; 40(3):612-22. PubMed ID: 20031501
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Error and attack vulnerability of temporal networks.
    Trajanovski S; Scellato S; Leontiadis I
    Phys Rev E Stat Nonlin Soft Matter Phys; 2012 Jun; 85(6 Pt 2):066105. PubMed ID: 23005160
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Game-theoretic approach for improving cooperation in wireless multihop networks.
    Ng SK; Seah WK
    IEEE Trans Syst Man Cybern B Cybern; 2010 Jun; 40(3):559-74. PubMed ID: 20211801
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Correlations in complex networks under attack.
    Srivastava A; Mitra B; Ganguly N; Peruani F
    Phys Rev E Stat Nonlin Soft Matter Phys; 2012 Sep; 86(3 Pt 2):036106. PubMed ID: 23030979
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Robust multiple frequency multiple power localization schemes in the presence of multiple jamming attacks.
    Hussein AA; Leow CY; Rahman TA
    PLoS One; 2017; 12(5):e0177326. PubMed ID: 28493977
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Attack Vulnerability of Network Controllability.
    Lu ZM; Li XF
    PLoS One; 2016; 11(9):e0162289. PubMed ID: 27588941
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A game-theoretic response strategy for coordinator attack in wireless sensor networks.
    Liu J; Yue G; Shen S; Shang H; Li H
    ScientificWorldJournal; 2014; 2014():950618. PubMed ID: 25105171
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Multiscale vulnerability of complex networks.
    Boccaletti S; Buldú J; Criado R; Flores J; Latora V; Pello J; Romance M
    Chaos; 2007 Dec; 17(4):043110. PubMed ID: 18163774
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Adding links on minimum degree and longest distance strategies for improving network robustness and efficiency.
    Chujyo M; Hayashi Y
    PLoS One; 2022; 17(10):e0276733. PubMed ID: 36288333
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A decentralized mechanism for improving the functional robustness of distribution networks.
    Shi B; Liu J
    IEEE Trans Syst Man Cybern B Cybern; 2012 Oct; 42(5):1369-82. PubMed ID: 22547458
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Onion-like networks are both robust and resilient.
    Hayashi Y; Uchiyama N
    Sci Rep; 2018 Jul; 8(1):11241. PubMed ID: 30050045
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A Two-Phase Multiobjective Evolutionary Algorithm for Enhancing the Robustness of Scale-Free Networks Against Multiple Malicious Attacks.
    Zhou M; Liu J
    IEEE Trans Cybern; 2017 Feb; 47(2):539-552. PubMed ID: 27337729
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Robustness of network attack strategies against node sampling and link errors.
    Otsuka M; Tsugawa S
    PLoS One; 2019; 14(9):e0221885. PubMed ID: 31483819
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Unveiling robustness and heterogeneity through percolation triggered by random-link breakdown.
    Shang Y
    Phys Rev E Stat Nonlin Soft Matter Phys; 2014 Sep; 90(3):032820. PubMed ID: 25314494
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Characterizing contract-based multiagent resource allocation in networks.
    An B; Lesser V
    IEEE Trans Syst Man Cybern B Cybern; 2010 Jun; 40(3):575-86. PubMed ID: 19955040
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 17.