These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

201 related articles for article (PubMed ID: 23030979)

  • 1. Correlations in complex networks under attack.
    Srivastava A; Mitra B; Ganguly N; Peruani F
    Phys Rev E Stat Nonlin Soft Matter Phys; 2012 Sep; 86(3 Pt 2):036106. PubMed ID: 23030979
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Robustness of network of networks under targeted attack.
    Dong G; Gao J; Du R; Tian L; Stanley HE; Havlin S
    Phys Rev E Stat Nonlin Soft Matter Phys; 2013 May; 87(5):052804. PubMed ID: 23767581
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Robustness of onionlike correlated networks against targeted attacks.
    Tanizawa T; Havlin S; Stanley HE
    Phys Rev E Stat Nonlin Soft Matter Phys; 2012 Apr; 85(4 Pt 2):046109. PubMed ID: 22680540
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Stability and topology of scale-free networks under attack and defense strategies.
    Gallos LK; Cohen R; Argyrakis P; Bunde A; Havlin S
    Phys Rev Lett; 2005 May; 94(18):188701. PubMed ID: 15904414
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Enhancing network robustness against malicious attacks.
    Zeng A; Liu W
    Phys Rev E Stat Nonlin Soft Matter Phys; 2012 Jun; 85(6 Pt 2):066130. PubMed ID: 23005185
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Towards attack tolerant networks: Concurrent multipath routing and the butterfly network.
    Platt EL; Romero DM
    PLoS One; 2019; 14(4):e0214292. PubMed ID: 30943216
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Robustness of network attack strategies against node sampling and link errors.
    Otsuka M; Tsugawa S
    PLoS One; 2019; 14(9):e0221885. PubMed ID: 31483819
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Assortative mixing in networks.
    Newman ME
    Phys Rev Lett; 2002 Nov; 89(20):208701. PubMed ID: 12443515
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Suppressing traffic-driven epidemic spreading by edge-removal strategies.
    Yang HX; Wu ZX; Wang BH
    Phys Rev E Stat Nonlin Soft Matter Phys; 2013 Jun; 87(6):064801. PubMed ID: 23848813
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Efficient rewirings for enhancing synchronizability of dynamical networks.
    Rad AA; Jalili M; Hasler M
    Chaos; 2008 Sep; 18(3):037104. PubMed ID: 19045478
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Attack Vulnerability of Network Controllability.
    Lu ZM; Li XF
    PLoS One; 2016; 11(9):e0162289. PubMed ID: 27588941
    [TBL] [Abstract][Full Text] [Related]  

  • 12. The dichotomy in degree correlation of biological networks.
    Hao D; Li C
    PLoS One; 2011; 6(12):e28322. PubMed ID: 22164269
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Uncovering disassortativity in large scale-free networks.
    Litvak N; van der Hofstad R
    Phys Rev E Stat Nonlin Soft Matter Phys; 2013 Feb; 87(2):022801. PubMed ID: 23496562
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Concurrency and network disassortativity.
    Khor S
    Artif Life; 2010; 16(3):225-32. PubMed ID: 20586579
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Assortative and modular networks are shaped by adaptive synchronization processes.
    Avalos-Gaytán V; Almendral JA; Papo D; Schaeffer SE; Boccaletti S
    Phys Rev E Stat Nonlin Soft Matter Phys; 2012 Jul; 86(1 Pt 2):015101. PubMed ID: 23005481
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Generalized friendship paradox in networks with tunable degree-attribute correlation.
    Jo HH; Eom YH
    Phys Rev E Stat Nonlin Soft Matter Phys; 2014 Aug; 90(2):022809. PubMed ID: 25215783
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A decoy chain deployment method based on SDN and NFV against penetration attack.
    Zhao Q; Zhang C; Zhao Z
    PLoS One; 2017; 12(12):e0189095. PubMed ID: 29216257
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Error and attack vulnerability of temporal networks.
    Trajanovski S; Scellato S; Leontiadis I
    Phys Rev E Stat Nonlin Soft Matter Phys; 2012 Jun; 85(6 Pt 2):066105. PubMed ID: 23005160
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Assortative and disassortative mixing investigated using the spectra of graphs.
    Jalan S; Yadav A
    Phys Rev E Stat Nonlin Soft Matter Phys; 2015 Jan; 91(1):012813. PubMed ID: 25679663
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Rank-dependent deactivation in network evolution.
    Xu XJ; Zhou MC
    Phys Rev E Stat Nonlin Soft Matter Phys; 2009 Dec; 80(6 Pt 2):066105. PubMed ID: 20365229
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 11.