Core identification and attack strategies against regenerative complex networks

Core identification and attack strategies against regenerative complex networks

For access to this article, please select a purchase option:

Buy article PDF
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Electronics Letters — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Modelling enemy networks in a way that reveals their key entities and links is important when disrupting complex networks with high redundancy. How best to attack such networks under a limited ground intelligence constraint is examined. The key modelling contribution is to include both the heterogeneity of the node functions and the dynamics of recuperation after destruction. Through identifying the core nodes, the results show that ground intelligence should focus on locating and attacking high degree nodes, yielding a 41% reduction in conflict length over random opportunistic targeting and a 23% reduction over specialist targeting. Even when difficult to replace specialists are considered, targeting high degree nodes that can recuperate quickly, remains the most effective method of attack. The impact is to allow military forces to more effectively target enemy nodes that will cause functional paralysis and create further collapses.


    1. 1)
      • 1. Krebs, V.: ‘Mapping networks of terrorist cells’, Connections, 2002, 24, 4352.
    2. 2)
      • 2. Chen, G., Wang, X., Li, X.: ‘Fundamentals of complex networks: models, structures and dynamics’ (Wiley, 2005).
    3. 3)
    4. 4)
    5. 5)
    6. 6)
    7. 7)
    8. 8)
    9. 9)
      • 9. Klerks, P.: ‘The network paradigm applied to criminal organisations’, Connections, 2001, 24, 5365.
    10. 10)
    11. 11)
      • 11. Ma, A., Mondragon, R.: ‘Rich-cores in networks’, PLOS One, 2015, 10.
    12. 12)
      • 12. Kean, T., Hamilton, L.: ‘9/11 Commission Report (Chapter 5)’. National Commission on Terrorist Attacks upon the United States, Technical Report, 2004.

Related content

This is a required field
Please enter a valid email address