Destruction perfected

Authors: I. A. Kovács, A.-L. Barabási

Publication Date: January 1, 2015

Journal: Nature (News & Views) 524, 38-39 (2015)

Pinpointing the nodes whose removal most effectively disrupts a network has become a lot easier with the development of an efficient algorithm. Potential applications might include cybersecurity and disease control. See Letter p.65, by F. Morone and H. A. Makse (Supplementary 1).

ezgif.com-webp-to-png (10).png