In this paper, we focus on the critical behaviors of the percolation processes following degree-based attack and CI-based attack on random networks.
確定! 回上一頁