{"title":"Full command of a network by a new node: some results and examples","authors":"Clara Grácio, Sara Fernandes, Luís Mário Lopes","doi":"10.1186/s40649-019-0074-1","DOIUrl":null,"url":null,"abstract":"We consider that a network of chaotic identical dynamical systems is connected to a new node. Depending on some properties of the network and on the way that connection is made, the new node may control the network. We consider a full-command connection and analyze the possibility of the network being full-commandable by the new node. For full-commandable networks, we define the full-command-window, a set that includes some of the values that the coupling strength of the new node may assume. We present several results and examples that enlight us how a network can become more vulnerable or resistant to full-command.","PeriodicalId":52145,"journal":{"name":"Computational Social Networks","volume":"86 3 1","pages":"1-9"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computational Social Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1186/s40649-019-0074-1","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Mathematics","Score":null,"Total":0}
引用次数: 0
Abstract
We consider that a network of chaotic identical dynamical systems is connected to a new node. Depending on some properties of the network and on the way that connection is made, the new node may control the network. We consider a full-command connection and analyze the possibility of the network being full-commandable by the new node. For full-commandable networks, we define the full-command-window, a set that includes some of the values that the coupling strength of the new node may assume. We present several results and examples that enlight us how a network can become more vulnerable or resistant to full-command.
期刊介绍:
Computational Social Networks showcases refereed papers dealing with all mathematical, computational and applied aspects of social computing. The objective of this journal is to advance and promote the theoretical foundation, mathematical aspects, and applications of social computing. Submissions are welcome which focus on common principles, algorithms and tools that govern network structures/topologies, network functionalities, security and privacy, network behaviors, information diffusions and influence, social recommendation systems which are applicable to all types of social networks and social media. Topics include (but are not limited to) the following: -Social network design and architecture -Mathematical modeling and analysis -Real-world complex networks -Information retrieval in social contexts, political analysts -Network structure analysis -Network dynamics optimization -Complex network robustness and vulnerability -Information diffusion models and analysis -Security and privacy -Searching in complex networks -Efficient algorithms -Network behaviors -Trust and reputation -Social Influence -Social Recommendation -Social media analysis -Big data analysis on online social networks This journal publishes rigorously refereed papers dealing with all mathematical, computational and applied aspects of social computing. The journal also includes reviews of appropriate books as special issues on hot topics.