- document
-
Sun, P. (author), He, Z. (author), Kooij, Robert (author), Van Mieghem, P.F.A. (author)Optical networks are vulnerable to failures due to targeted attacks or large-scale disasters. The recoverability of optical networks refers to the ability of an optical network to return to a desired performance level after suffering topological perturbations such as link failures. This paper proposes a general topological approach and...journal article 2021
- document
-
Sun, P. (author), Kooij, Robert (author), Van Mieghem, P.F.A. (author)In this paper, we propose closed-form analytic approximations for the number of controllable nodes in sparse communication networks from the aspect of network controllability, considering link-based random attack, targeted attack, as well as random attack under the protection of critical links. We compare our approximations with simulation...journal article 2021
- document
-
Chen, Anqi (author), Sun, P. (author), Kooij, Robert (author)Network recoverability refers to the ability of a network to recover to a desired performance level after suffering topological perturbations such as link failures. The minimum number of driver nodes is a typical metric to denote the network controllability. In this paper, we propose closed-form analytic approximations for the minimum number of...conference paper 2021
- document
-
Dhiman, Ashish (author), Sun, P. (author), Kooij, Robert (author)This paper presents machine learning based approximations for the minimum number of driver nodes needed for structural controllability of networks under link-based random and targeted attacks. We compare our approximations with existing analytical approximations and show that our machine learning based approximations significantly outperform...conference paper 2021
- document
-
Sun, P. (author), Van Mieghem, P.F.A. (author), Kooij, Robert (author), He, Z. (author), Van Mieghem, Piet (author)In this paper, we propose closed-form analytic approximations for the minimum number of driver nodes needed to fully control networks, where links are removed according to both random and targeted attacks. Our approximations rely on the concept of critical links. A link is called critical if its removal increases the required number of driver...conference paper 2019