Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tolerance of scale-free networks: from friendly to intentional attack strategies, , , , and . Physica A: Statistical Mechanics and its Applications, 344 (3-4): 504--509 (Dec 15, 2004)Scaling theory of transport in complex biological networks, , , and . (May 2007)Identification of influential spreaders in complex networks, , , , , , and . Nature Physics, (2010)A small world of weak ties provides optimal global integration of self-similar modules in functional brain networks., , and . Proceedings of the National Academy of Sciences of the United States of America, 109 (8): 2825--2830 (Feb 21, 2012)Revealing effective classifiers through network comparison, and . EPL (Europhysics Letters), 108 (3): 38001+ (Nov 1, 2014)Fractal and Transfractal Scale-Free Networks., , , and . Encyclopedia of Complexity and Systems Science, Springer, (2009)Simple and efficient self-healing strategy for damaged complex networks., and . CoRR, (2015)Collective behavior and critical fluctuations in the spatial spreading of obesity, diabetes and cancer, , , , and . CoRR, (2012)Random walk and trapping processes on scale-free networks. Physical Review E, 70 (4): 046116 (2004)A Case Study in Tailoring a Bio-Inspired Cyber-Security Algorithm: Designing Anomaly Detection for Multilayer Networks., , and . IEEE Symposium on Security and Privacy Workshops, page 281-286. IEEE Computer Society, (2018)