These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

31 related articles for article (PubMed ID: 37443331)

  • 1. Avalanche-size distribution of Cayley tree.
    Patron A
    Sci Rep; 2023 Jul; 13(1):11311. PubMed ID: 37443331
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Robustness of network of networks under targeted attack.
    Dong G; Gao J; Du R; Tian L; Stanley HE; Havlin S
    Phys Rev E Stat Nonlin Soft Matter Phys; 2013 May; 87(5):052804. PubMed ID: 23767581
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Dependency-based targeted attacks in interdependent networks.
    Zhou D; Bashan A
    Phys Rev E; 2020 Aug; 102(2-1):022301. PubMed ID: 32942423
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Percolation of attack with tunable limited knowledge.
    Shang Y
    Phys Rev E; 2021 Apr; 103(4-1):042316. PubMed ID: 34005897
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Statistical properties of avalanches in networks.
    Larremore DB; Carpenter MY; Ott E; Restrepo JG
    Phys Rev E Stat Nonlin Soft Matter Phys; 2012 Jun; 85(6 Pt 2):066131. PubMed ID: 23005186
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Efficient network immunization under limited knowledge.
    Liu Y; Sanhedrai H; Dong G; Shekhtman LM; Wang F; Buldyrev SV; Havlin S
    Natl Sci Rev; 2021 Jan; 8(1):nwaa229. PubMed ID: 34676088
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Mitigation of malicious attacks on networks.
    Schneider CM; Moreira AA; Andrade JS; Havlin S; Herrmann HJ
    Proc Natl Acad Sci U S A; 2011 Mar; 108(10):3838-41. PubMed ID: 21368159
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Invasion percolation on a tree and queueing models.
    Gabrielli A; Caldarelli G
    Phys Rev E Stat Nonlin Soft Matter Phys; 2009 Apr; 79(4 Pt 1):041133. PubMed ID: 19518199
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Exploring the assortativity-clustering space of a network's degree sequence.
    Holme P; Zhao J
    Phys Rev E Stat Nonlin Soft Matter Phys; 2007 Apr; 75(4 Pt 2):046111. PubMed ID: 17500965
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Structural vulnerability of the North American power grid.
    Albert R; Albert I; Nakarado GL
    Phys Rev E Stat Nonlin Soft Matter Phys; 2004 Feb; 69(2 Pt 2):025103. PubMed ID: 14995510
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Probabilistic prediction in scale-free networks: diameter changes.
    Kim JH; Goh KI; Kahng B; Kim D
    Phys Rev Lett; 2003 Aug; 91(5):058701. PubMed ID: 12906643
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Optimization of robustness and connectivity in complex networks.
    Shargel B; Sayama H; Epstein IR; Bar-Yam Y
    Phys Rev Lett; 2003 Feb; 90(6):068701. PubMed ID: 12633338
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Cascade-based attacks on complex networks.
    Motter AE; Lai YC
    Phys Rev E Stat Nonlin Soft Matter Phys; 2002 Dec; 66(6 Pt 2):065102. PubMed ID: 12513335
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Attack vulnerability of complex networks.
    Holme P; Kim BJ; Yoon CN; Han SK
    Phys Rev E Stat Nonlin Soft Matter Phys; 2002 May; 65(5 Pt 2):056109. PubMed ID: 12059649
    [TBL] [Abstract][Full Text] [Related]  

  • 15.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

  • 16.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

  • 17.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

  • 18.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

  • 19.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

  • 20.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 2.