Bound and exact methods for assessing link vulnerability in complex networks
Crossref DOI link: https://doi.org/10.1007/s10878-014-9742-0
Published Online: 2014-04-29
Published Print: 2014-07
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Dinh, T. N.
Thai, M. T.
Nguyen, H. T.
Text and Data Mining valid from 2014-04-29