<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article article-type="research-article" dtd-version="2.3" xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Phys.</journal-id>
<journal-title>Frontiers in Physics</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Phys.</abbrev-journal-title>
<issn pub-type="epub">2296-424X</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">733224</article-id>
<article-id pub-id-type="doi">10.3389/fphy.2021.733224</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Physics</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Assessing the Structural Vulnerability of Online Social Networks in Empirical Data</article-title>
<alt-title alt-title-type="left-running-head">Zhang et&#x20;al.</alt-title>
<alt-title alt-title-type="right-running-head">Assessing Vulnerability of OSN</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname>Zhang</surname>
<given-names>Dayong</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<xref ref-type="aff" rid="aff2">
<sup>2</sup>
</xref>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Guo</surname>
<given-names>Changyong</given-names>
</name>
<xref ref-type="aff" rid="aff3">
<sup>3</sup>
</xref>
<xref ref-type="corresp" rid="c001">&#x2a;</xref>
<uri xlink:href="https://loop.frontiersin.org/people/1390473/overview"/>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Zhang</surname>
<given-names>Zhaoxin</given-names>
</name>
<xref ref-type="aff" rid="aff3">
<sup>3</sup>
</xref>
<xref ref-type="corresp" rid="c001">&#x2a;</xref>
<uri xlink:href="https://loop.frontiersin.org/people/884548/overview"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Long</surname>
<given-names>Gang</given-names>
</name>
<xref ref-type="aff" rid="aff3">
<sup>3</sup>
</xref>
<xref ref-type="aff" rid="aff4">
<sup>4</sup>
</xref>
</contrib>
</contrib-group>
<aff id="aff1">
<label>
<sup>1</sup>
</label>State Key Laboratory of Communication Content Cognition, People&#x2019;s Daily Online, <addr-line>Beijing</addr-line>, <country>China</country>
</aff>
<aff id="aff2">
<label>
<sup>2</sup>
</label>Department of New Media and Arts, Harbin Institute of Technology, <addr-line>Harbin</addr-line>, <country>China</country>
</aff>
<aff id="aff3">
<label>
<sup>3</sup>
</label>School of Computer Science and Technology, Harbin Institute of Technology, <addr-line>Harbin</addr-line>, <country>China</country>
</aff>
<aff id="aff4">
<label>
<sup>4</sup>
</label>China Information Technology Security Evaluation Center, <addr-line>Beijing</addr-line>, <country>China</country>
</aff>
<author-notes>
<fn fn-type="edited-by">
<p>
<bold>Edited by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/101109/overview">Chengyi Xia</ext-link>, Tianjin University of Technology, China</p>
</fn>
<fn fn-type="edited-by">
<p>
<bold>Reviewed by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/471110/overview">Michele Bellingeri</ext-link>, University of Parma, Italy</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/942114/overview">Zhen Wang</ext-link>, Hangzhou Dianzi University, China</p>
</fn>
<corresp id="c001">&#x2a;Correspondence: Changyong Guo, <email>guocy@hit.edu.cn</email>; Zhaoxin Zhang, <email>heart@hit.edu.cn</email>
</corresp>
<fn fn-type="other">
<p>This article was submitted to Social Physics, a section of the journal Frontiers in Physics</p>
</fn>
</author-notes>
<pub-date pub-type="epub">
<day>25</day>
<month>10</month>
<year>2021</year>
</pub-date>
<pub-date pub-type="collection">
<year>2021</year>
</pub-date>
<volume>9</volume>
<elocation-id>733224</elocation-id>
<history>
<date date-type="received">
<day>30</day>
<month>06</month>
<year>2021</year>
</date>
<date date-type="accepted">
<day>13</day>
<month>09</month>
<year>2021</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#xa9; 2021 Zhang, Guo, Zhang and Long.</copyright-statement>
<copyright-year>2021</copyright-year>
<copyright-holder>Zhang, Guo, Zhang and Long</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/">
<p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these&#x20;terms.</p>
</license>
</permissions>
<abstract>
<p>Assessing the structural vulnerability of online social networks has been one of the most engaging topics recently, which is quite essential and beneficial to holding the network connectivity and facilitating information flow, but most of the existing vulnerability assessment measures and the corresponding solutions fail to accurately reveal the global damage done to the network. In order to accurately measure the vulnerability of networks, an invulnerability index based on the concept of improved tenacity is proposed in the present study. Compared with existing measurements, the new method does not measure a single property performance, such as giant component size or the number of components after destruction, but pays special attention to the potential equilibrium between the removal cost and the removal effect. Extensive experiments on real-world social networks demonstrate the accuracy and effectiveness of the proposed method. Moreover, compared with results of attacks based on the different centrality indices, we found an individual node&#x2019;s prominence in a network is inherently related to the structural properties of network. In high centralized networks, the nodes with higher eigenvector are more important than the others in maintaining stability and connectivity. But in low centralized networks, the nodes with higher betweenness are more powerful than the others. In addition, the experimental results indicate that low centralized networks can tolerate high intentional attacks and has a better adaptability to attacks than high centralized networks.</p>
</abstract>
<kwd-group>
<kwd>online social network</kwd>
<kwd>vulnerability</kwd>
<kwd>structural property</kwd>
<kwd>centrality index</kwd>
<kwd>vulnerability assessment</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<title>Introduction</title>
<p>With the revolution of the WWW technology, Web 2.0 characterized by social collaborative technologies is emerging and fast-growing. People are increasingly inclined to cultivate their virtual social relations and virtual life on the existing prevalent online social networks [<xref ref-type="bibr" rid="B1">1</xref>], such as Facebook, Blogger, Wiki, and Digg. These online social networks can provide favorable platforms for people to exchange opinions or information with one another [<xref ref-type="bibr" rid="B2">2</xref>]. Specifically, online social networks are creating ties for us with a very wide range of people, which not only are bonded in relationships with acquaintances, as well as maintain close relationships with friends, schoolmates, and family members, but also are embodied in some new relationships in an online virtual&#x20;world.</p>
<p>In order to defend some potential disruptions and facilitate information flow, assessing the vulnerability of online social networks has been one of the most engaging topics [<xref ref-type="bibr" rid="B3">3</xref>, <xref ref-type="bibr" rid="B4">4</xref>]. The concept of vulnerability is generally used to find and characterize a lack of robustness and resilience of a complex system [<xref ref-type="bibr" rid="B5">5</xref>]. The vulnerability of a network structure was analyzed first by Albert et&#x20;al. [<xref ref-type="bibr" rid="B6">6</xref>] and was regarded as a previously overlooked &#x201c;Achilles&#x2019; heel.&#x201d; Initially, vulnerability assessment was focused on some simple and generic models such as the Erd&#xf6;s&#x2013;R&#xe9;nyi (ER) random model and the Barab&#xe1;si&#x2013;Albert (BA) scale free model [<xref ref-type="bibr" rid="B6">6</xref>, <xref ref-type="bibr" rid="B7">7</xref>]. Over the years, some scholars have found that the inherent preferential attachment mechanism and the structural properties of network may be responsible for the vulnerability of network [<xref ref-type="bibr" rid="B8">8</xref>&#x2013;<xref ref-type="bibr" rid="B10">10</xref>]. Especially, a series of numerical simulations were introduced to study tolerance to random removals and intentional attacks in complex networks [<xref ref-type="bibr" rid="B11">11</xref>&#x2013;<xref ref-type="bibr" rid="B13">13</xref>]. Most experimental studies have shown that the Barab&#xe1;si&#x2013;Albert (BA) network and other similar heterogeneous networks are very robust to random removals but are very fragile against intentional attacks based on the degree or betweenness [<xref ref-type="bibr" rid="B6">6</xref>, <xref ref-type="bibr" rid="B14">14</xref>]. For homogeneous networks such as regular networks and random networks, the effect of random removals is equivalent to that of intentional attacks [<xref ref-type="bibr" rid="B6">6</xref>], while for small-world networks, long-range link attacks can cause their collapse directly [<xref ref-type="bibr" rid="B13">13</xref>]. Some achievements have been made in the research of some typical network models, but how the dynamical processes, such as resilience to damage or tolerance to attacks, are influenced by the specific topological structure of a network remains unknown.</p>
<p>In recent years, there has been much effort directed at developing methods for vulnerability assessment [<xref ref-type="bibr" rid="B15">15</xref>&#x2013;<xref ref-type="bibr" rid="B17">17</xref>]. The main results are largely based on two aspects, including critical node identification and removal effect evaluation. The former reflects the nodal prominent position in maintaining the network connectivity or facilitating information flow, while the latter refers to how to quantify the effect caused by the removal of a finite number of nodes. Indeed, the identification of critical individuals is an influence maximization problem [<xref ref-type="bibr" rid="B18">18</xref>], which aims to select a minimal node set to generate a maximal outcome in a given network. The quantification methods can be roughly classified into three categories: centrality-based algorithms, random-walk algorithms, and greedy-based algorithms. Structural connectivity has become the primary test criterion for vulnerability assessment [<xref ref-type="bibr" rid="B19">19</xref>]. In most instances, these evaluation metrics such as the characteristic path length [<xref ref-type="bibr" rid="B6">6</xref>] and the network efficiency [<xref ref-type="bibr" rid="B20">20</xref>, <xref ref-type="bibr" rid="B21">21</xref>] are relatively straightforward and can more clearly characterize the changes in the connectivity of the target network before and after some nodes are removed. However, they only provide a useful topological snapshot for connected networks and are not suitable to assess the network vulnerability in terms of disconnectivity [<xref ref-type="bibr" rid="B15">15</xref>]. In addition, the existing measurements are difficult to reach equilibrium between the removal cost and the removal effect.</p>
<p>The primary purpose of this article is to fill this gap by exploring a new method to effectively quantify the vulnerability of the network structure. The new method focuses on how to identify the importance, or status, of a node in the network, and on further use of available resources to efficiently disrupt network operation, which comprehensively takes account of the cost with which one can disrupt a network and the attack effect. The contributions of this study can be summarized as the following:<list list-type="simple">
<list-item>
<p>1) An invulnerability index based on the concept of improved tenacity is proposed to measure the adaptability to attacks.</p>
</list-item>
<list-item>
<p>2) Low centralized networks can have a better adaptability to attacks than high centralized networks.</p>
</list-item>
<list-item>
<p>3) The experimental results verify the outperformance of the proposed method.</p>
</list-item>
</list>
</p>
<p>The rest of the article is organized as the following: In <italic>Methods</italic>, in order to assess the vulnerability of networks more properly, we present an invulnerability index based on the concept of improved tenacity to examine network adaptability to attacks. Generally, a network with a higher invulnerability index performs better under intentional attacks. In <italic>Network Data,</italic> we will examine the static properties of real online social networks empirically, in order to summarize the generalized differences in the topological structure of various online social networks. Especially, in <italic>Discussion</italic>, we will display the threshold behavior of the aforementioned networks on experimental observation, and further compare the efficiency of node removal with different centrality indices to find the vulnerability of online social networks.</p>
</sec>
<sec sec-type="methods" id="s2">
<title>Methods</title>
<sec id="s2-1">
<title>The Attack Strategies</title>
<p>Inspired by the well-known percolation theory in statistical physics, the robustness and resilience of a network is usually defined as the network structural degradation caused by the removal of some critical nodes [<xref ref-type="bibr" rid="B19">19</xref>]. Tolerance to random removals and intentional attacks is understood as the ability of the network to maintain operations and connectivity under the loss of some nodes or links [<xref ref-type="bibr" rid="B8">8</xref>]. In order to ensure the efficiency of attacks, it is necessary to identify the most vulnerable nodes in a network. Indeed, the identification of critical nodes is an influence maximization problem [<xref ref-type="bibr" rid="B18">18</xref>]. The quantification algorithms can be roughly classified into three categories: centrality-based algorithms, random-walk algorithms, and greedy-based algorithms.</p>
<p>Centrality-based algorithms perform a fundamental quantification by considering geodesics between nodes to evaluate nodal importance. Up to now, many centrality-based algorithms have been proposed, such as degree centrality [<xref ref-type="bibr" rid="B22">22</xref>, <xref ref-type="bibr" rid="B23">23</xref>], betweenness centrality [<xref ref-type="bibr" rid="B22">22</xref>, <xref ref-type="bibr" rid="B24">24</xref>], closeness centrality [<xref ref-type="bibr" rid="B22">22</xref>, <xref ref-type="bibr" rid="B25">25</xref>], eigenvector centrality [<xref ref-type="bibr" rid="B26">26</xref>], and other improved centrality-based algorithms [<xref ref-type="bibr" rid="B27">27</xref>&#x2013;<xref ref-type="bibr" rid="B29">29</xref>]. The random-walk algorithms include the well-known PageRank [<xref ref-type="bibr" rid="B30">30</xref>] and other improved algorithms [<xref ref-type="bibr" rid="B31">31</xref>]. Random-walk algorithms work only well for directed networks. Greedy-based algorithms formulate the influence measurement as a discrete optimization problem, and their elementary strategies are to select the spreaders that contribute the largest incremental influence one by one, according to a specified influence cascade model [<xref ref-type="bibr" rid="B32">32</xref>]. In terms of algorithm construction, although greedy-based algorithms can achieve excellent results, they also have very high computational complexity and are not suitable for large-scale social networks.</p>
<p>Previous studies have shown that the adaptability of networks behaves differently from various attack strategies [<xref ref-type="bibr" rid="B20">20</xref>, <xref ref-type="bibr" rid="B33">33</xref>]. Thus, in this article, we will study tolerance to various attacks in real online social networks and further find a minimized set of nodes triggering the collapse of network. We will consider four straightforward and efficient centrality indices as attack strategies to identify the importance of nodes.<list list-type="simple">
<list-item>
<p>1) Degree centrality: The algorithm measures a node&#x2019;s influence according to the number of edges attached to it, which reflects the ability of a node to connect directly with other&#x20;nodes.</p>
</list-item>
<list-item>
<p>2) Betweenness centrality: The algorithm measures a node&#x2019;s influence through the ratio of the shortest path over the nodes to the number of all paths, which considers the global structure information of a given&#x20;graph.</p>
</list-item>
<list-item>
<p>3) Closeness centrality: The basic idea behind the closeness centrality is that a node is central if it is &#x201c;close&#x201d; to many other nodes [<xref ref-type="bibr" rid="B34">34</xref>]. Thus, the closeness centrality score of node <italic>i</italic> is defined as the reciprocal of the sum of geodesic distances to all other&#x20;nodes.</p>
</list-item>
<list-item>
<p>4) Eigenvector centrality: The algorithm is based on the principle that a node should be viewed as important if it is linked to other nodes which are important themselves. Thus, the eigenvector centrality of node <italic>i</italic> is defined as the proportional to the sum of the eigenvector centralities of the nodes it is connected to&#x20;[<xref ref-type="bibr" rid="B28">28</xref>].</p>
</list-item>
</list>
</p>
<p>Because the removal of nodes under intentional attacks changes the balance of structure and leads to a global redistribution over all the networks, we recalculate the degree centrality, the betweenness centrality, the closeness centrality, and the eigenvector centrality, every time a small fraction of nodes is removed.</p>
</sec>
<sec id="s2-2">
<title>Evaluation Metrics</title>
<p>Numerous empirical results on real networks have revealed that the heterogeneous topology structure may be fit for most real networks [<xref ref-type="bibr" rid="B35">35</xref>&#x2013;<xref ref-type="bibr" rid="B37">37</xref>], where degree distribution significantly deviates from a Poisson and low degree nodes are far more abundant than the nodes with high degrees. Due to the inhomogeneity of general networks, removing some critical nodes will decrease the network connectivity and lead to the loss of the global information-carrying ability of the network [<xref ref-type="bibr" rid="B6">6</xref>, <xref ref-type="bibr" rid="B20">20</xref>]. Generally, when assessing the vulnerability of a network under intentional attacks, three performance criteria should be concerned in the framework of graph theory [<xref ref-type="bibr" rid="B38">38</xref>]:<list list-type="simple">
<list-item>
<p>1) The number of components that are being removed.</p>
</list-item>
<list-item>
<p>2) The number of disconnected subgroups after intentional attacks.</p>
</list-item>
<list-item>
<p>3) The size of the largest remaining group within which mutual communication can still&#x20;occur.</p>
</list-item>
</list>
</p>
<p>Most of the online social networks can be abstracted as a non-complete connected graph <inline-formula id="inf1">
<mml:math id="m1">
<mml:mrow>
<mml:mi>G</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>V</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>E</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, where individual members and personal relationships can be defined by a set of nodes <inline-formula id="inf2">
<mml:math id="m2">
<mml:mi>V</mml:mi>
</mml:math>
</inline-formula>and a set of edges <inline-formula id="inf3">
<mml:math id="m3">
<mml:mi>E</mml:mi>
</mml:math>
</inline-formula>, respectively. In general, a good social network should have short distance between nodes, average distance, and high connectivity. In fact, there has been much effort directed at developing methods for evaluating network adaptability to attacks. In most instances, the characteristic path length and the network efficiency as evaluation metrics can only provide a useful topological snapshot for connected networks [<xref ref-type="bibr" rid="B39">39</xref>]. But for disconnected networks, the geodesic distance between any two nodes belonging to two disconnected subgroups is identically zero or infinity, which will directly affect the accuracy of evaluation results. In graph theory, some helpful indicators of evaluating network vulnerability have been proposed. These metrics relates to network topology and attributes, such as toughness [<xref ref-type="bibr" rid="B40">40</xref>], integrity [<xref ref-type="bibr" rid="B41">41</xref>], tenacity [<xref ref-type="bibr" rid="B42">42</xref>], and scattering number [<xref ref-type="bibr" rid="B43">43</xref>]. The detailed description of each indicator is shown in <xref ref-type="table" rid="T1">Table&#x20;1</xref>.</p>
<table-wrap id="T1" position="float">
<label>TABLE 1</label>
<caption>
<p>Evaluation metrics based on graph theory.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Name</th>
<th align="center">Acronym</th>
<th align="center">Meaning</th>
<th align="center">References</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">Toughness</td>
<td align="center">T(G)</td>
<td align="left">Focusing on the relationship between the removal cost and the number of components after destruction</td>
<td align="left">Chv&#xe1;tal [<xref ref-type="bibr" rid="B40">40</xref>]</td>
</tr>
<tr>
<td align="left">Integrity</td>
<td align="center">I(G)</td>
<td align="left">Focusing on the relationship between the removal cost and the largest connected component after destruction</td>
<td align="left">Barefoot et&#x20;al. [<xref ref-type="bibr" rid="B41">41</xref>]</td>
</tr>
<tr>
<td align="left">Tenacity</td>
<td align="center">R(G)</td>
<td align="left">Focusing on the relationship among the removal cost, the number of components, and the largest connected component after destruction</td>
<td align="left">Cozzens et&#x20;al. [<xref ref-type="bibr" rid="B42">42</xref>]</td>
</tr>
<tr>
<td align="left">Scattering number</td>
<td align="center">S(G)</td>
<td align="left">Focusing on the relationship between the removal cost and the number of components after destruction</td>
<td align="left">Hendry [<xref ref-type="bibr" rid="B43">43</xref>]</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>As one of the basic concepts of graph theory, connectivity plays a vital role in network performance and is fundamental to vulnerability measures. The concept of connectivity <inline-formula id="inf4">
<mml:math id="m4">
<mml:mrow>
<mml:mi>K</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> of <inline-formula id="inf5">
<mml:math id="m5">
<mml:mi>G</mml:mi>
</mml:math>
</inline-formula> is defined as<disp-formula id="e1">
<mml:math id="m6">
<mml:mrow>
<mml:mi>K</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>min</mml:mtext>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mrow>
<mml:mo>&#x7c;</mml:mo>
<mml:mi>S</mml:mi>
<mml:mo>&#x7c;</mml:mo>
</mml:mrow>
<mml:mo>:</mml:mo>
<mml:mi>S</mml:mi>
<mml:mo>&#x2282;</mml:mo>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mo>}</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(1)</label>
</disp-formula>where <inline-formula id="inf6">
<mml:math id="m7">
<mml:mrow>
<mml:mrow>
<mml:mo>&#x7c;</mml:mo>
<mml:mi>S</mml:mi>
<mml:mo>&#x7c;</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is a cutset of <inline-formula id="inf7">
<mml:math id="m8">
<mml:mrow>
<mml:mi>V</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>. In <xref ref-type="disp-formula" rid="e1">Eq. 1</xref>, the connectivity<inline-formula id="inf8">
<mml:math id="m9">
<mml:mrow>
<mml:mi>K</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> asks for the minimum number of nodes whose removal renders the graph <inline-formula id="inf9">
<mml:math id="m10">
<mml:mi>G</mml:mi>
</mml:math>
</inline-formula>disconnected. As one of the graph theoretical concepts, connectivity deals with the criterion&#x20;(1).</p>
<p>Toughness and integrity are two other graph concepts used in the vulnerability assessment. The notion of the toughness <inline-formula id="inf10">
<mml:math id="m11">
<mml:mrow>
<mml:mi>T</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> of<inline-formula id="inf11">
<mml:math id="m12">
<mml:mi>G</mml:mi>
</mml:math>
</inline-formula>, originally introduced by Chv&#xe1;tal [<xref ref-type="bibr" rid="B40">40</xref>], is defined as follows:<disp-formula id="e2">
<mml:math id="m13">
<mml:mrow>
<mml:mi>T</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>min</mml:mtext>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mrow>
<mml:mo>&#x7c;</mml:mo>
<mml:mi>S</mml:mi>
<mml:mo>&#x7c;</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:mi>w</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>G</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
<mml:mo>:</mml:mo>
<mml:mi>S</mml:mi>
<mml:mo>&#x2282;</mml:mo>
<mml:mi>V</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>w</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>G</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2265;</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mo>}</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(2)</label>
</disp-formula>where <inline-formula id="inf12">
<mml:math id="m14">
<mml:mrow>
<mml:mi>w</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>G</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> stands for the number of components of <inline-formula id="inf13">
<mml:math id="m15">
<mml:mrow>
<mml:mi>G</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>S</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>. Unlike the connectivity <inline-formula id="inf14">
<mml:math id="m16">
<mml:mrow>
<mml:mi>K</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, the toughness <inline-formula id="inf15">
<mml:math id="m17">
<mml:mrow>
<mml:mi>T</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> incorporates the relationship between the size of the cutset and the number of components after destruction and takes into account of the criteria (1) and (2). But the toughness <inline-formula id="inf16">
<mml:math id="m18">
<mml:mrow>
<mml:mi>T</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is still insufficient to measure the network vulnerability. Considering the graphs <inline-formula id="inf17">
<mml:math id="m19">
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> and G<sub>2</sub> (see <xref ref-type="fig" rid="F1">Figure&#x20;1</xref>), two graphs have the same connectivity and toughness, where <inline-formula id="inf18">
<mml:math id="m20">
<mml:mrow>
<mml:mi>K</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>K</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf19">
<mml:math id="m21">
<mml:mrow>
<mml:mi>T</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>T</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mn>1</mml:mn>
<mml:mn>3</mml:mn>
</mml:mfrac>
</mml:mrow>
</mml:math>
</inline-formula>, but they are really different in the vulnerability of graphs. For instance, after the minimum cutset <inline-formula id="inf20">
<mml:math id="m22">
<mml:mrow>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>u</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>}</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is removed, we find that the <inline-formula id="inf21">
<mml:math id="m23">
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>has been divided into three small components, while the vast majority of nodes of <inline-formula id="inf22">
<mml:math id="m24">
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> have been retained in the largest connected component <inline-formula id="inf23">
<mml:math id="m25">
<mml:mrow>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>u</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>u</mml:mi>
<mml:mn>6</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>u</mml:mi>
<mml:mn>5</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>}</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, within which mutual communication among the remaining nodes can still occur. It implies that the connectivity <inline-formula id="inf24">
<mml:math id="m26">
<mml:mrow>
<mml:mi>K</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> and toughness <inline-formula id="inf25">
<mml:math id="m27">
<mml:mrow>
<mml:mi>T</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> cannot accurately reveal the global damage done to the network.</p>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption>
<p>Non-complete connected graphs G<sub>1</sub> <bold>(A)</bold> and G<sub>2</sub> <bold>(B)</bold>.</p>
</caption>
<graphic xlink:href="fphy-09-733224-g001.tif"/>
</fig>
<p>The notion of integrity introduced as another vulnerability parameter of graphs [<xref ref-type="bibr" rid="B41">41</xref>] focuses on the criteria (1) and (3). For a non-complete connected graph <inline-formula id="inf26">
<mml:math id="m28">
<mml:mi>G</mml:mi>
</mml:math>
</inline-formula>, its integrity <inline-formula id="inf27">
<mml:math id="m29">
<mml:mrow>
<mml:mi>I</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is defined as follows:<disp-formula id="e3">
<mml:math id="m30">
<mml:mrow>
<mml:mi>I</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>min</mml:mtext>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mrow>
<mml:mo>&#x7c;</mml:mo>
<mml:mi>S</mml:mi>
<mml:mo>&#x7c;</mml:mo>
</mml:mrow>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>m</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>G</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>:</mml:mo>
<mml:mi>S</mml:mi>
<mml:mo>&#x2282;</mml:mo>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mo>}</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(3)</label>
</disp-formula>where <inline-formula id="inf28">
<mml:math id="m31">
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>G</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> denotes the giant component size after destruction.</p>
<p>Obviously, the disruption is more successful if the disconnected network contains more components and is much more successful if, in addition, the components are small. Unfortunately, connectivity and toughness give the minimum cost to disrupt a network but fail to&#x20;indicate accurately what remains after the disruption. Although Barefoot&#x2019;s integrity has taken the size of the largest remaining component after destruction into account, it cannot indicate the extent of the damage.</p>
<p>The notion of tenacity was originally proposed in Ref. [<xref ref-type="bibr" rid="B42">42</xref>], where they introduced the mix-tenacity to measure the vulnerability of Harary graphs. The precise definition of tenacity is defined as follows:<disp-formula id="e4">
<mml:math id="m32">
<mml:mrow>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>min</mml:mtext>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mrow>
<mml:mo>&#x7c;</mml:mo>
<mml:mi>S</mml:mi>
<mml:mo>&#x7c;</mml:mo>
</mml:mrow>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>m</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>G</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:mi>w</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>G</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
<mml:mo>:</mml:mo>
<mml:mi>S</mml:mi>
<mml:mo>&#x2282;</mml:mo>
<mml:mi>V</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>w</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>G</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2265;</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mo>}</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(4)</label>
</disp-formula>The tenacity <inline-formula id="inf29">
<mml:math id="m33">
<mml:mrow>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> of graphs directly integrates all three criteria, such as the cost of network breakage, the number of components, and the giant component size, and is considered to be a reasonable measure for the vulnerability of graphs. As shown in <xref ref-type="fig" rid="F2">Figures 2A,B</xref>, it is easy to know that <inline-formula id="inf30">
<mml:math id="m34">
<mml:mrow>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>min</mml:mtext>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mn>3</mml:mn>
</mml:mfrac>
</mml:mrow>
<mml:mo>}</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula> and<inline-formula id="inf31">
<mml:math id="m35">
<mml:mrow>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>min</mml:mtext>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mn>4</mml:mn>
</mml:mfrac>
</mml:mrow>
<mml:mo>}</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mn>3</mml:mn>
<mml:mn>4</mml:mn>
</mml:mfrac>
</mml:mrow>
</mml:math>
</inline-formula>, <inline-formula id="inf32">
<mml:math id="m36">
<mml:mrow>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3e;</mml:mo>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, which indicates the adaptability to attacks for <inline-formula id="inf33">
<mml:math id="m37">
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>is better than <inline-formula id="inf34">
<mml:math id="m38">
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
<fig id="F2" position="float">
<label>FIGURE 2</label>
<caption>
<p>Dividing processes of the graphs G<sub>1</sub> <bold>(A)</bold> and G<sub>2</sub> <bold>(B)</bold>.</p>
</caption>
<graphic xlink:href="fphy-09-733224-g002.tif"/>
</fig>
<p>In general, if the network remains more disconnected subgroups and smaller connected component size after destruction, the disruption is more successful. As shown in <xref ref-type="fig" rid="F3">Figures 3A,B</xref>, <inline-formula id="inf35">
<mml:math id="m39">
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>3</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf36">
<mml:math id="m40">
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>4</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> all have the same number of nodes and edges. After <inline-formula id="inf37">
<mml:math id="m41">
<mml:mrow>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>u</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>u</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>}</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf38">
<mml:math id="m42">
<mml:mrow>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>u</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>u</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>u</mml:mi>
<mml:mn>4</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>}</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> are removed respectively, the minimum toughness and the minimum tenacity can be obtained, which are <inline-formula id="inf39">
<mml:math id="m43">
<mml:mrow>
<mml:mi>T</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>3</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>T</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>4</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mn>1</mml:mn>
<mml:mn>2</mml:mn>
</mml:mfrac>
</mml:mrow>
</mml:math>
</inline-formula> and<inline-formula id="inf40">
<mml:math id="m44">
<mml:mrow>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>3</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>4</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mn>4</mml:mn>
<mml:mn>3</mml:mn>
</mml:mfrac>
</mml:mrow>
</mml:math>
</inline-formula>. The cutsets <inline-formula id="inf41">
<mml:math id="m45">
<mml:mrow>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>u</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>u</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>}</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf42">
<mml:math id="m46">
<mml:mrow>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>u</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>u</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>u</mml:mi>
<mml:mn>4</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>}</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> are the minimum removal costs of the graph <inline-formula id="inf43">
<mml:math id="m47">
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>3</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> and the graph <inline-formula id="inf44">
<mml:math id="m48">
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>4</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, respectively. But we find that there are differences both in the attack efficacy in the graph <inline-formula id="inf45">
<mml:math id="m49">
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>3</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> and graph <inline-formula id="inf46">
<mml:math id="m50">
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>4</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, where for the graph <inline-formula id="inf47">
<mml:math id="m51">
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>3</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, the minimum removal cost is 2 and the giant component size also is 2; while for the graph <inline-formula id="inf48">
<mml:math id="m52">
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>4</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, the minimum removal cost is 3 and the giant component size is 1. As discussed earlier, the tenacity <inline-formula id="inf49">
<mml:math id="m53">
<mml:mrow>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>is still an imperfect criterion to assess network vulnerability.</p>
<fig id="F3" position="float">
<label>FIGURE 3</label>
<caption>
<p>Dividing processes of the graphs G<sub>3</sub> <bold>(A)</bold> and G<sub>4</sub> <bold>(B)</bold>.</p>
</caption>
<graphic xlink:href="fphy-09-733224-g003.tif"/>
</fig>
<p>In Ref. [<xref ref-type="bibr" rid="B43">43</xref>], Hendry used the concept of scattering number to measure the vulnerability of extremal non-Hamiltonian graphs and found that it was more efficient for measuring the degree of global destruction. The scattering number <inline-formula id="inf50">
<mml:math id="m54">
<mml:mrow>
<mml:mi>S</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> of <inline-formula id="inf51">
<mml:math id="m55">
<mml:mi>G</mml:mi>
</mml:math>
</inline-formula>is defined as follows:<disp-formula id="e5">
<mml:math id="m56">
<mml:mrow>
<mml:mi>S</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>max</mml:mi>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mi>w</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>G</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mrow>
<mml:mo>&#x7c;</mml:mo>
<mml:mi>S</mml:mi>
<mml:mo>&#x7c;</mml:mo>
</mml:mrow>
<mml:mo>:</mml:mo>
<mml:mi>S</mml:mi>
<mml:mo>&#x2282;</mml:mo>
<mml:mi>V</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>w</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>G</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2265;</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mo>}</mml:mo>
</mml:mrow>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:math>
<label>(5)</label>
</disp-formula>So we think that it is necessary to add the criterion to reveal the global damage done to networks under attacks, and keep its priority in assessing the vulnerability of networks. Therefore, we propose an improved tenacity based on the concepts of scattering number and tenacity, which is named <inline-formula id="inf52">
<mml:math id="m57">
<mml:mrow>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mi>s</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>a</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> and defined as follows:<disp-formula id="e6">
<mml:math id="m58">
<mml:mrow>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mi>s</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>a</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>min</mml:mtext>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>G</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:mrow>
<mml:mo>&#x7c;</mml:mo>
<mml:mrow>
<mml:mi>w</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>G</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mrow>
<mml:mo>&#x7c;</mml:mo>
<mml:mi>S</mml:mi>
<mml:mo>&#x7c;</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mo>&#x7c;</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
<mml:mo>:</mml:mo>
<mml:mi>S</mml:mi>
<mml:mo>&#x2282;</mml:mo>
<mml:mi>V</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>w</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>G</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2265;</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mo>}</mml:mo>
</mml:mrow>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:math>
<label>(6)</label>
</disp-formula>As shown in <xref ref-type="fig" rid="F3">Figures 3A,B</xref>, <inline-formula id="inf53">
<mml:math id="m59">
<mml:mrow>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mi>s</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>a</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>3</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>min</mml:mtext>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mn>3</mml:mn>
</mml:mfrac>
</mml:mrow>
<mml:mo>}</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf54">
<mml:math id="m60">
<mml:mrow>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mi>s</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>a</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>4</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>min</mml:mi>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mn>4</mml:mn>
</mml:mfrac>
</mml:mrow>
<mml:mo>}</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mn>3</mml:mn>
<mml:mn>4</mml:mn>
</mml:mfrac>
</mml:mrow>
</mml:math>
</inline-formula>, <inline-formula id="inf55">
<mml:math id="m61">
<mml:mrow>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mi>s</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>a</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>3</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3e;</mml:mo>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mi>s</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>a</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>4</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, which indicates the anti-interference capability of <inline-formula id="inf56">
<mml:math id="m62">
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>3</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>is better than <inline-formula id="inf57">
<mml:math id="m63">
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>4</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
<p>Compared with existing evaluation metrics [<xref ref-type="bibr" rid="B6">6</xref>, <xref ref-type="bibr" rid="B20">20</xref>, <xref ref-type="bibr" rid="B21">21</xref>, <xref ref-type="bibr" rid="B39">39</xref>&#x2013;<xref ref-type="bibr" rid="B42">42</xref>], our notion of improved tenacity is not to measure a single property performance such as giant component size or the number of components after destruction, which is insufficient to evaluate the network vulnerability by only considering whether or not it is a disconnected network, and how fragmental the network becomes, but to pay special attention to the potential equilibrium between the giant component size and the number of components under intentional attacks. As shown in definition (6), the number of components<inline-formula id="inf58">
<mml:math id="m64">
<mml:mrow>
<mml:mi>w</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>G</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>and the size of the largest connected component<inline-formula id="inf59">
<mml:math id="m65">
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>G</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>are re-calculated after each iteration, so the whole computational complexity of the proposed method is<inline-formula id="inf60">
<mml:math id="m66">
<mml:mrow>
<mml:mi>O</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msup>
<mml:mi>n</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>. The result demonstrates that the proposed algorithm has relatively less computational burden in evaluating the vulnerability of networks and can be applicable to large-scale networks.</p>
</sec>
</sec>
<sec id="s3">
<title>Network Data</title>
<sec id="s3-1">
<title>Data Description</title>
<p>Because online social networks serve as much social function as other kinds of social interaction, including e-mail exchanging, text messaging, instant messaging, digital video sharing, and so on, each edge meaning a connection in online social networks is complex and changeable, whereas each node meaning an individual of online social networks is constant. To measure the vulnerability of networks more properly, our method will pay more attention to the importance of nodes, rather than edges. Our data set is composed of six undirected and unweighted networks, that is, networks that have a binary nature, where the edges between nodes are either present or not, and each edge has no directional character. <xref ref-type="table" rid="T2">Table&#x20;2</xref> indicates that the six real social network include the following: OClinks is a representative online community network, where users are from the University of California, Irvine, which is from Panzarasa et&#x20;al.&#x2019;s [<xref ref-type="bibr" rid="B44">44</xref>]; Twitter, Wiki-Vote, and Facebook can be downloaded from the Stanford network dataset (<ext-link ext-link-type="uri" xlink:href="http://snap.stanford.edu/data/index.html">http://snap.stanford.edu/data/index.html</ext-link>); and Lilac and RenRen are collected from the online social networks by&#x20;us.</p>
<table-wrap id="T2" position="float">
<label>TABLE 2</label>
<caption>
<p>The basic topological properties of the six online social networks.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Network</th>
<th align="center">
<italic>N</italic>
</th>
<th align="center">
<italic>E</italic>
</th>
<th align="center">
<italic>&#x3c;k&#x3e;</italic>
</th>
<th align="center">
<italic>L</italic>
</th>
<th align="center">
<italic>D</italic>
</th>
<th align="center">
<italic>C</italic>
</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">Lilac</td>
<td align="center">3,414</td>
<td align="center">10,353</td>
<td align="char" char=".">6.065</td>
<td align="char" char=".">4.055</td>
<td align="center">10</td>
<td align="char" char=".">0.042</td>
</tr>
<tr>
<td align="left">OClinks</td>
<td align="center">1,893</td>
<td align="center">13,835</td>
<td align="char" char=".">14.617</td>
<td align="char" char=".">3.055</td>
<td align="center">8</td>
<td align="char" char=".">0.138</td>
</tr>
<tr>
<td align="left">Wiki-Vote</td>
<td align="center">7,115</td>
<td align="center">103,689</td>
<td align="char" char=".">14.573</td>
<td align="char" char=".">3.341</td>
<td align="center">7</td>
<td align="char" char=".">0.141</td>
</tr>
<tr>
<td align="left">Twitter</td>
<td align="center">3,656</td>
<td align="center">154,824</td>
<td align="char" char=".">84.696</td>
<td align="char" char=".">2.506</td>
<td align="center">6</td>
<td align="char" char=".">0.279</td>
</tr>
<tr>
<td align="left">RenRen</td>
<td align="center">1,130</td>
<td align="center">14,332</td>
<td align="char" char=".">25.366</td>
<td align="char" char=".">3.241</td>
<td align="center">8</td>
<td align="char" char=".">0.263</td>
</tr>
<tr>
<td align="left">Facebook</td>
<td align="center">4,039</td>
<td align="center">88,234</td>
<td align="char" char=".">43.691</td>
<td align="char" char=".">3.693</td>
<td align="center">8</td>
<td align="char" char=".">0.606</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn>
<p>Note: N, number of nodes; E, number of edges; &#x3c;k&#x3e;, average degree; L, characteristic path length; D, diameter; and C, clustering coefficient.</p>
</fn>
</table-wrap-foot>
</table-wrap>
<p>In <xref ref-type="table" rid="T1">Table&#x20;1</xref>, we show the main topological properties of a series of online social networks, belonging to two different types: the online community service based on group-centered service and the social network service based on individual-centered service. The first three networks, Lilac, OClinks, and Wiki-vote, are three examples of online community services,&#x20;where the users have a common interest and purpose and can exchange information or seek help. In these networks, the nodes are the registered users, and the links represent a relationship between two users existing message exchange. In the latter part of <xref ref-type="table" rid="T1">Table&#x20;1</xref>, we show three examples of social network services. Twitter is a social news website, where users may mention other people or follow other people to make his/her posts, so the links imply communication between users existing mention or comment. RenRen is a real-name social networking internet platform in China, where users can connect and communicate with each other or enjoy a wide range of other features and services, so the links reflect different kinds of social relationships between the users. Facebook is an ego network consisting of friends lists from Facebook.</p>
</sec>
<sec id="s3-2">
<title>Structure of Networks</title>
<p>The most basic topological characterization of networks can&#x20;be&#x20;obtained in terms of the degree distribution <inline-formula id="inf61">
<mml:math id="m67">
<mml:mrow>
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>k</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, defined as&#x20;the probability that a node is chosen uniformly at random has degree <italic>k</italic> or, equivalently, as the fraction of nodes in the graph having degree <italic>k</italic> [<xref ref-type="bibr" rid="B19">19</xref>]. In recent years, scientists approached the&#x20;study of real networks from the available databases and found most of the real networks having inhomogeneous structure, where the connections within nodes of the highest degree are rather sparse, and a large number of nodes just have a few connections. Moreover, most of real networks exhibit power law&#x2013;shaped degree distribution<inline-formula id="inf62">
<mml:math id="m68">
<mml:mrow>
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>k</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x223c;</mml:mo>
<mml:msup>
<mml:mi>k</mml:mi>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b3;</mml:mi>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula>, with exponents varying in the range <inline-formula id="inf63">
<mml:math id="m69">
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mo>&#x3c;</mml:mo>
<mml:mi>&#x3b3;</mml:mi>
<mml:mo>&#x3c;</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>[<xref ref-type="bibr" rid="B35">35</xref>, <xref ref-type="bibr" rid="B36">36</xref>], and a little of them follow shifted power law distribution, stretched exponential distribution, or more complicated distributions&#x20;[<xref ref-type="bibr" rid="B37">37</xref>].</p>
<p>The empirical results demonstrate that the degree distributions <inline-formula id="inf64">
<mml:math id="m70">
<mml:mrow>
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>k</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>of aforementioned networks are subjected to two types: the segmented power law distribution (Lilac, OClinks, and Wiki-Vote) and the stretched exponential distribution (Twitter, RenRen, and Facebook). The insets in <xref ref-type="fig" rid="F4">Figures 4A&#x2013;C</xref> show the degree distributions <inline-formula id="inf65">
<mml:math id="m71">
<mml:mrow>
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>k</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> of Lilac, OClinks, and Wiki-Vote are heavy-tailed, and approximately follow the power law distribution, where <inline-formula id="inf66">
<mml:math id="m72">
<mml:mrow>
<mml:mi>&#x3b3;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1.72</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, <inline-formula id="inf67">
<mml:math id="m73">
<mml:mrow>
<mml:mi>&#x3b3;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.99</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, and <inline-formula id="inf68">
<mml:math id="m74">
<mml:mrow>
<mml:mi>&#x3b3;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1.31</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, respectively. However, when the size of data set is small, it may happen that the data have a rather strong intrinsic noise due to the finiteness of the sampling. In order to avoid the statistical fluctuations, one better possibility is to measure the cumulative degree distributions<inline-formula id="inf69">
<mml:math id="m75">
<mml:mrow>
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x2265;</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>. The cumulative degree distributions <inline-formula id="inf70">
<mml:math id="m76">
<mml:mrow>
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x2265;</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>of Lilac, OClinks, and Wiki-Vote show two different scaling regions: a slow region and a rapid decaying region, and are well-approximated by the segmented power law distribution. The crossover takes place between k &#x3d; 10 and k &#x3d; 100, and the cumulative degree distributions <inline-formula id="inf71">
<mml:math id="m77">
<mml:mrow>
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x2265;</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> of Lilac network can be defined by the following equation:<disp-formula id="equ1">
<mml:math id="m78">
<mml:mrow>
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x2265;</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x223c;</mml:mo>
<mml:msup>
<mml:mi>k</mml:mi>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>r</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:msup>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mtable>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi>r</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.89</mml:mn>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:mtext>if</mml:mtext>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mi>k</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mn>16</mml:mn>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi>r</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>2.11</mml:mn>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:mtext>if</mml:mtext>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mi>k</mml:mi>
<mml:mo>&#x3e;</mml:mo>
<mml:mn>16</mml:mn>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mrow>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:math>
</disp-formula>The similar trend is shown in <xref ref-type="fig" rid="F4">Figure&#x20;4B</xref>, where the probability <inline-formula id="inf72">
<mml:math id="m79">
<mml:mrow>
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x2265;</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> of the OClinks network can be fitted by the following equation:<disp-formula id="equ2">
<mml:math id="m80">
<mml:mrow>
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x2265;</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x223c;</mml:mo>
<mml:msup>
<mml:mi>k</mml:mi>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>r</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:msup>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mtable>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi>r</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.51</mml:mn>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:mtext>if</mml:mtext>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mi>k</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mn>20</mml:mn>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi>r</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>2.02</mml:mn>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:mtext>if</mml:mtext>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mi>k</mml:mi>
<mml:mo>&#x3e;</mml:mo>
<mml:mn>20</mml:mn>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mrow>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:math>
</disp-formula>As shown in <xref ref-type="fig" rid="F4">Figure&#x20;4C</xref>, the probability <inline-formula id="inf73">
<mml:math id="m81">
<mml:mrow>
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x2265;</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> of the Wiki-Vote network can be fitted by the following equation:<disp-formula id="equ3">
<mml:math id="m82">
<mml:mrow>
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x2265;</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x223c;</mml:mo>
<mml:msup>
<mml:mi>k</mml:mi>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>r</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:msup>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mtable>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi>r</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.45</mml:mn>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:mtext>if</mml:mtext>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mi>k</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mn>63</mml:mn>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi>r</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>2.26</mml:mn>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:mtext>if</mml:mtext>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mi>k</mml:mi>
<mml:mo>&#x3e;</mml:mo>
<mml:mn>63</mml:mn>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mrow>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:math>
</disp-formula>Otherwise, the insets in <xref ref-type="fig" rid="F5">Figures 5A&#x2013;C</xref> show the degree distributions of Twitter, RenRen, and Facebook, where <inline-formula id="inf74">
<mml:math id="m83">
<mml:mrow>
<mml:msup>
<mml:mi>R</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.815</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>,<inline-formula id="inf75">
<mml:math id="m84">
<mml:mrow>
<mml:msup>
<mml:mi>R</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.811</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, and <inline-formula id="inf76">
<mml:math id="m85">
<mml:mrow>
<mml:msup>
<mml:mi>R</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.809</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, respectively, and the curves of the degree distributions are not well-approximated by a power law distribution. <xref ref-type="fig" rid="F5">Figures 5A&#x2013;C</xref> indicate that the degree distributions of Twitter, RenRen, and Facebook obey the stretched exponential distribution<inline-formula id="inf77">
<mml:math id="m86">
<mml:mrow>
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x2265;</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:msup>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mi>k</mml:mi>
<mml:mrow>
<mml:msub>
<mml:mi>k</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mi>c</mml:mi>
</mml:msup>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula>, where the graph of <inline-formula id="inf78">
<mml:math id="m87">
<mml:mrow>
<mml:mtext>log</mml:mtext>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x2265;</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> versus <inline-formula id="inf79">
<mml:math id="m88">
<mml:mrow>
<mml:mfrac>
<mml:mi>k</mml:mi>
<mml:mrow>
<mml:msub>
<mml:mi>k</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:math>
</inline-formula> is characteristically stretched, and a stretching exponent <italic>c</italic> takes a value between 0 and 1. The stretching exponent <italic>c</italic> can be obtained from<inline-formula id="inf80">
<mml:math id="m89">
<mml:mrow>
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x2265;</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, as we add the slope of <inline-formula id="inf81">
<mml:math id="m90">
<mml:mrow>
<mml:mtext>log</mml:mtext>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x2265;</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> in a log&#x2013;log plot. As shown in <xref ref-type="fig" rid="F5">Figure&#x20;5</xref>, the distribution functions of Twitter, RenRen, and Facebook can be defined by<inline-formula id="inf82">
<mml:math id="m91">
<mml:mrow>
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x2265;</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:msup>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mi>k</mml:mi>
<mml:mrow>
<mml:msub>
<mml:mi>k</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:mn>0.79</mml:mn>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula>, <inline-formula id="inf83">
<mml:math id="m92">
<mml:mrow>
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x2265;</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:msup>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mi>k</mml:mi>
<mml:mrow>
<mml:msub>
<mml:mi>k</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:mn>0.89</mml:mn>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula>, and <inline-formula id="inf84">
<mml:math id="m93">
<mml:mrow>
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x2265;</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:msup>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mi>k</mml:mi>
<mml:mrow>
<mml:msub>
<mml:mi>k</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:mn>0.94</mml:mn>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula>, respectively.</p>
<fig id="F4" position="float">
<label>FIGURE 4</label>
<caption>
<p>Cumulative degree distribution <inline-formula id="inf85">
<mml:math id="m94">
<mml:mrow>
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x2265;</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>in Lilac network <bold>(A)</bold>, OClinks network <bold>(B),</bold> and Wiki-Vote <bold>(C)</bold>. The insets show the degree distributions <inline-formula id="inf86">
<mml:math id="m95">
<mml:mrow>
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>k</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>of Lilac, OClinks, and Wiki-Vote are heavy-tailed.</p>
</caption>
<graphic xlink:href="fphy-09-733224-g004.tif"/>
</fig>
<fig id="F5" position="float">
<label>FIGURE 5</label>
<caption>
<p>Stretched exponential distributions of Twitter <bold>(A)</bold>, RenRen <bold>(B),</bold> and Facebook <bold>(C)</bold> are clear. The insets exhibit the degree distribution <inline-formula id="inf87">
<mml:math id="m96">
<mml:mrow>
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>k</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>of Twitter network, RenRen, and Facebook network.</p>
</caption>
<graphic xlink:href="fphy-09-733224-g005.tif"/>
</fig>
<p>The stretched exponential distribution is obtained by inserting a fractional power law distribution into the exponential distribution: as<inline-formula id="inf88">
<mml:math id="m97">
<mml:mrow>
<mml:mi>c</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, the usual exponential function is recovered; as<inline-formula id="inf89">
<mml:math id="m98">
<mml:mrow>
<mml:mi>c</mml:mi>
<mml:mo>&#x2192;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, the distribution follows the power law distribution. In general, the power&#x20;law distribution is characterized by a slower than exponentially decaying probability tail. In contrast with Twitter, RenRen, and Facebook, where<inline-formula id="inf90">
<mml:math id="m99">
<mml:mrow>
<mml:mi>c</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.79</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, <inline-formula id="inf91">
<mml:math id="m100">
<mml:mrow>
<mml:mi>c</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.89</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, and <inline-formula id="inf92">
<mml:math id="m101">
<mml:mrow>
<mml:mi>c</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.94</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula> approaching<inline-formula id="inf93">
<mml:math id="m102">
<mml:mrow>
<mml:mi>c</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, some extremum nodes in Lilac, OClinks, or Wiki-Vote can occur with a more non-negligible probability.</p>
<p>In this section, we have examined the static properties of a variety of online social networks empirically and found that two types of networks, the online community service and the social network service, have completely different structural properties. As shown in <xref ref-type="fig" rid="F4">Figures 4A&#x2013;C</xref>, Lilac network, OClinks network, and Wiki-Vote network exhibit a highly inhomogeneous degree distribution, where the simultaneous presence of a few nodes tending to link many other nodes, and a large number of poorly connected nodes. But in <xref ref-type="fig" rid="F5">Figures 5A&#x2013;C</xref>, the curves of degree distributions have witnessed that the nodes in Twitter, RenRen, and Facebook networks are more evenly distributed than those in Lilac, OClinks, and Wiki-Vote networks, where extreme value still runs at a relatively low level. As it&#x20;can be noticed, Twitter, RenRen, and Facebook as social network services are mainly based on an individual-centered online platform for organizing feature and technical feature themselves and have lower centralization than the Lilac, OClinks, and Wiki-Vote network based on group-centered service.</p>
</sec>
</sec>
<sec sec-type="discussion" id="s4">
<title>Discussion</title>
<p>When the vast majority of real networks, especially online social networks, are fragmented into relatively tiny isolated components, these networks will lose transmission capacities between individual components, indicating the collapse of network is approaching. So, we only find an optimal threshold that can trigger the collapse of the network. In general, the problem can be analytically treated by using percolation theory, where one defines a critical probability <italic>f</italic>
<sub>
<italic>c</italic>
</sub> below which the network percolates, and a set of critical exponents can characterize the phase transition. In Ref. [<xref ref-type="bibr" rid="B6">6</xref>], Albert et&#x20;al. have studied how the properties of some networks with given order and size change when a fraction <italic>f</italic> of the nodes are removed, where the average characteristic path length as an order parameter displays for both errors and attacks a threshold-like behavior. In this section, we first study the changes in the improved tenacity <inline-formula id="inf94">
<mml:math id="m103">
<mml:mrow>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mi>s</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>a</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> when a small fraction <italic>f</italic> of the nodes is removed gradually, and use the new criterion characterizing the phase transition to obtain the critical probability <italic>f</italic>
<sub>
<italic>c</italic>
</sub>. Then, we compare four attack strategies, that is, degree centrality, betweenness centrality, closeness centrality, and eigenvector centrality (the algorithms defined as in <italic>The Attack Strategies</italic>), to estimate which solution is the most effective and also to determine the most important nodes for online social networks.</p>
<p>As shown by the curved lines in <xref ref-type="fig" rid="F6">Figure&#x20;6</xref>, the performance of improved tenacity <inline-formula id="inf95">
<mml:math id="m104">
<mml:mrow>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mi>s</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>a</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> in the aforementioned networks displays a threshold-like behavior: first, <inline-formula id="inf96">
<mml:math id="m105">
<mml:mrow>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mi>s</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>a</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> drops with the fraction of removed nodes <italic>f</italic> increasing, indicating the ability of the network to maintain its connectivity properties is sensitive to intentional attacks, and the size of fragments is increasing significantly. Especially, the insets of <xref ref-type="fig" rid="F6">Figure&#x20;6</xref> show the giant component size <inline-formula id="inf97">
<mml:math id="m106">
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>G</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> rapidly decreases with <italic>f</italic> increasing. Second, we find that the curve of improved tenacity <inline-formula id="inf98">
<mml:math id="m107">
<mml:mrow>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mi>s</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>a</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> abruptly decays at the critical value <italic>f</italic>
<sub>
<italic>c</italic>
</sub>, the same trend as the giant component size <inline-formula id="inf99">
<mml:math id="m108">
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>G</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>(see the inset of <xref ref-type="fig" rid="F6">Figure&#x20;6</xref>, where the slope of curve is sharply downward), implying <italic>f</italic>
<sub>
<italic>c</italic>
</sub> is precisely the threshold triggering the collapse of network. In addition, it is worth noticing that the critical value <italic>f</italic>
<sub>
<italic>c</italic>
</sub> can be obtained&#x20;fast by using the definition (6). As<inline-formula id="inf100">
<mml:math id="m109">
<mml:mrow>
<mml:mtext>log</mml:mtext>
<mml:mtext>&#x2009;</mml:mtext>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mi>s</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>a</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2248;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, from Lilac network to Facebook network, the critical value <inline-formula id="inf101">
<mml:math id="m110">
<mml:mrow>
<mml:msub>
<mml:mi>f</mml:mi>
<mml:mi>c</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mn>0.17</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>0.23</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>0.21</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>0.31</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>0.32</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>017</mml:mn>
</mml:mrow>
<mml:mo>}</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>. Although the largest component of the remaining nodes still is larger, where the giant component size<inline-formula id="inf102">
<mml:math id="m111">
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>G</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> runs from 233 to 1864 (shown in <xref ref-type="table" rid="T3">Table&#x20;3</xref>), accounting for 16.93&#x2013;26.2% of the total, intentional attacks have led to the breakdown of the overall connectivity.</p>
<fig id="F6" position="float">
<label>FIGURE 6</label>
<caption>
<p>From <bold>(A&#x2013;F)</bold>, indicating the performance of improved tenacity <inline-formula id="inf103">
<mml:math id="m112">
<mml:mrow>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mi>s</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>a</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> in six online social networks (from Lilac to Facebook) when a fraction <italic>f</italic> of the nodes is removed. &#x25cb;, preferential removal of the most connected nodes; &#x25b3;, preferential removal of the nodes with maximum betweenness; &#x2a;, preferential removal of the nodes with maximum eigenvector; and &#x25a1;, preferential removal of the nodes with minimum closeness. Degree, betweenness, eigenvector, and closeness are recomputed each time the nodes are removed. Inset refers to the performance of the giant component&#x20;size.</p>
</caption>
<graphic xlink:href="fphy-09-733224-g006.tif"/>
</fig>
<table-wrap id="T3" position="float">
<label>TABLE 3</label>
<caption>
<p>Tenacity level of selected online social networks</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Network</th>
<th align="center">
<italic>N</italic>
</th>
<th align="center">
<italic>f</italic>
<sub>
<italic>c</italic>
</sub>
</th>
<th align="center">
<inline-formula id="inf104">
<mml:math id="m113">
<mml:msup>
<mml:mi>S</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msup>
</mml:math>
</inline-formula>
</th>
<th align="center">
<inline-formula id="inf105">
<mml:math id="m114">
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>S</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>
</th>
<th align="center">
<inline-formula id="inf106">
<mml:math id="m115">
<mml:mrow>
<mml:mi>w</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>S</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>
</th>
<th align="center">
<inline-formula id="inf107">
<mml:math id="m116">
<mml:mrow>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mi>s</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>a</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>
</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">Lilac</td>
<td align="center">3414</td>
<td align="char" char=".">0.17</td>
<td align="center">580</td>
<td align="center">641</td>
<td align="center">1179</td>
<td align="char" char=".">1.07</td>
</tr>
<tr>
<td align="left">OClinks</td>
<td align="center">1893</td>
<td align="char" char=".">0.23</td>
<td align="center">435</td>
<td align="center">465</td>
<td align="center">870</td>
<td align="char" char=".">1.07</td>
</tr>
<tr>
<td align="left">Wiki-Vote</td>
<td align="center">7115</td>
<td align="char" char=".">0.21</td>
<td align="center">1483</td>
<td align="center">1864</td>
<td align="center">3258</td>
<td align="char" char=".">1.05</td>
</tr>
<tr>
<td align="left">Twitter</td>
<td align="center">3656</td>
<td align="char" char=".">0.31</td>
<td align="center">1133</td>
<td align="center">667</td>
<td align="center">537</td>
<td align="char" char=".">1.12</td>
</tr>
<tr>
<td align="left">RenRen</td>
<td align="center">1130</td>
<td align="char" char=".">0.32</td>
<td align="center">362</td>
<td align="center">233</td>
<td align="center">144</td>
<td align="char" char=".">1.07</td>
</tr>
<tr>
<td align="left">Facebook</td>
<td align="center">4039</td>
<td align="char" char=".">0.17</td>
<td align="center">686</td>
<td align="center">684</td>
<td align="center">108</td>
<td align="char" char=".">1.18</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The centrality concept seeks to quantify an individual node&#x2019;s prominence within a network by summarizing structural relations among the nodes. A node&#x2019;s prominence reflects its greater visibility to the other network nodes. In online social networks, central nodes are likely to be more influential and have greater access to information and can communicate their opinions to others more efficiently. Further research indicates that the various roles of the same node based on different centrality indices show the striking difference in maintaining network connectivity. Looking at the changes in the critical fraction <italic>f</italic>
<sub>
<italic>c</italic>
</sub>, from <xref ref-type="fig" rid="F6">Figures 6A&#x2013;F</xref>, <inline-formula id="inf108">
<mml:math id="m117">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="italic">f</mml:mi>
<mml:mrow>
<mml:mi mathvariant="italic">cd</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>{0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>17</mml:mn>
<mml:mtext>,0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>24</mml:mn>
<mml:mtext>,0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>23</mml:mn>
<mml:mtext>,0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>37</mml:mn>
<mml:mtext>,0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>44</mml:mn>
<mml:mtext>,0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>48</mml:mn>
<mml:mtext>}</mml:mtext>
</mml:mrow>
</mml:math>
</inline-formula> relating to the degree-based attacks, <inline-formula id="inf109">
<mml:math id="m118">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="italic">f</mml:mi>
<mml:mrow>
<mml:mi mathvariant="italic">cb&#xa0;</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>&#xa0;{0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>18</mml:mn>
<mml:mtext>,0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>25</mml:mn>
<mml:mtext>,0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>27</mml:mn>
<mml:mtext>,0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>31</mml:mn>
<mml:mtext>,0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>32</mml:mn>
<mml:mtext>,0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>17</mml:mn>
<mml:mtext>}</mml:mtext>
</mml:mrow>
</mml:math>
</inline-formula> relating to the betweenness-based attacks, <inline-formula id="inf110">
<mml:math id="m119">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="italic">f</mml:mi>
<mml:mrow>
<mml:mi mathvariant="italic">cc</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mtext>&#xa0;</mml:mtext>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>&#xa0;{0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>2</mml:mn>
<mml:mtext>,0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>26</mml:mn>
<mml:mtext>,0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>3</mml:mn>
<mml:mtext>,0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>32</mml:mn>
<mml:mtext>,0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>35</mml:mn>
<mml:mtext>,0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>18</mml:mn>
<mml:mtext>}</mml:mtext>
</mml:mrow>
</mml:math>
</inline-formula> related to the closeness-based attacks, while <inline-formula id="inf111">
<mml:math id="m120">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="italic">f</mml:mi>
<mml:mrow>
<mml:mi mathvariant="italic">ce</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mtext>&#xa0;</mml:mtext>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>&#xa0;{0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>17</mml:mn>
<mml:mtext>,0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>23</mml:mn>
<mml:mtext>,0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>21</mml:mn>
<mml:mtext>,0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>37</mml:mn>
<mml:mtext>,0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>43</mml:mn>
<mml:mtext>,0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>37</mml:mn>
<mml:mtext>}</mml:mtext>
</mml:mrow>
</mml:math>
</inline-formula> related to the eigenvector-based attacks. Obviously, in the cases of Lilac, OClinks, and Wiki-Vote, the attacks based on the eigenvector centrality actually have a better performance than the attacks based on other indices, rooting in the critical fraction<inline-formula id="inf112">
<mml:math id="m121">
<mml:mrow>
<mml:msub>
<mml:mi>f</mml:mi>
<mml:mrow>
<mml:mi>c</mml:mi>
<mml:mi>e</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3c;</mml:mo>
<mml:msub>
<mml:mi>f</mml:mi>
<mml:mrow>
<mml:mi>c</mml:mi>
<mml:mi>d</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3c;</mml:mo>
<mml:msub>
<mml:mi>f</mml:mi>
<mml:mrow>
<mml:mi>c</mml:mi>
<mml:mi>b</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3c;</mml:mo>
<mml:msub>
<mml:mi>f</mml:mi>
<mml:mrow>
<mml:mi>c</mml:mi>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>. Although in Lilac <italic>f</italic>
<sub>
<italic>ce</italic>
</sub> &#x3d; <italic>f</italic>
<sub>
<italic>cd</italic>
</sub>, the giant component size<inline-formula id="inf113">
<mml:math id="m122">
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>G</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>under the attacks based on the eigenvector centrality is significantly smaller than the result based on the degree centrality. The conclusion described before indicates the role of the nodes with high eigenvector is the most important than the others in maintaining connectivity of the network. In the diffusion of information, especially in online social networks, a user with high eigenvector centrality has connections to many other users that are themselves highly connected and central within the network, thus multiplying his or her capabilities in maintaining communication of network. But in the cases of Twitter, RenRen, and Facebook, the attacks based on the betweenness centrality <italic>f</italic>
<sub>
<italic>cb</italic>
</sub> cause a greater amount of damage than the others, where <inline-formula id="inf114">
<mml:math id="m123">
<mml:mrow>
<mml:msub>
<mml:mi>f</mml:mi>
<mml:mrow>
<mml:mi>c</mml:mi>
<mml:mi>b</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3c;</mml:mo>
<mml:msub>
<mml:mi>f</mml:mi>
<mml:mrow>
<mml:mi>c</mml:mi>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3c;</mml:mo>
<mml:msub>
<mml:mi>f</mml:mi>
<mml:mrow>
<mml:mi>c</mml:mi>
<mml:mi>e</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2264;</mml:mo>
<mml:msub>
<mml:mi>f</mml:mi>
<mml:mrow>
<mml:mi>c</mml:mi>
<mml:mi>d</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>. The main reason for the differentiation from various networks may closely relate with their organizing features and technical features, which are characterized by their topological structures.</p>
<p>Another important conclusion that can be drawn from the results presented is that the performance of improved tenacity <inline-formula id="inf115">
<mml:math id="m124">
<mml:mrow>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mi>s</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>a</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> in Twitter, RenRen, or Facebook is better than that in Lilac, OClinks, or Wiki-Vote, which implies the former has higher anti-interference capability than the latter. In general, a low centralized network can improve network resilience by reorganizing network to increase local control and the execution of a service. Analogously, for the lack of obvious centralization and a strict inhomogeneous topology structure, social network services, like Twitter, RenRen, or Facebook, can tolerate higher intentional attacks based on some critical individuals than high centralized networks. In addition, as shown in <xref ref-type="table" rid="T3">Table&#x20;3</xref>, although the critical probability <italic>f</italic>
<sub>
<italic>c</italic>
</sub> of Twitter&#x20;or RenRen is much larger than the threshold <italic>f</italic>
<sub>
<italic>c</italic>
</sub> of Lilac, OClinks, or Wiki-Vote, the corresponding proportion of the giant component size of the former is alsways lower than that of the latter. Therefore, it is difficult to judge which network has higher adaptability facing intentional attacks from the attack cost or the giant component size scale. Compared with the single criterion, such as removal cost, the giant component size, and the number of components, our proposed method can comprehensively consider the attack effect and attack&#x20;cost.</p>
</sec>
<sec sec-type="conclusion" id="s5">
<title>Conclusion</title>
<p>In this article, we synthetically take account of the cost with which one can disrupt a network and the effect of, and a new evaluation method based on the concepts of scattering number and tenacity. Compared with existing evaluation metrics, our method focuses on the potential equilibrium between the attack effect and the attack cost. For this purpose, we first examined empirically the static properties of six online social networks, including three online community services and three social network services, that is, Lilac, OClinks, Wiki-Vote, Twitter, RenRen, and Facebook, and found that there are wide differences in the topological structure of networks.</p>
<p>Second, we studied the changes in the improved tenacity <inline-formula id="inf116">
<mml:math id="m125">
<mml:mrow>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mi>s</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>a</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> when a small fraction <italic>f</italic> of the nodes is removed gradually and found the curve of improved tenacity displays a threshold-like behavior, when the minimum of tenacity approaches zero. Then, we compared the four solutions of intentional attacks based on the different indices, that is, degree centrality, betweenness centrality, closeness centrality, and eigenvector centrality, and found that an individual node&#x2019;s prominence in a network is inherently related to structural properties: the role of the nodes with higher eigenvector is more important than the others in maintaining stability and connectivity of high centralized networks, such as Lilac, OClinks, and Wiki-Vote, but the nodes with higher betweenness are more powerful than the others in low centralized networks, such as Twitter, RenRen, and Facebook. Moreover, the empirical study revealed that low centralized networks can tolerate high intentional attacks and have higher anti-interference capabilities than high centralized networks.</p>
</sec>
</body>
<back>
<sec id="s6">
<title>Data Availability Statement</title>
<p>The original contributions presented in the study are included in the article/<xref ref-type="sec" rid="s10">Supplementary Material</xref>; further inquiries can be directed to the corresponding authors.</p>
</sec>
<sec id="s7">
<title>Author Contributions</title>
<p>Conceptualization, DZ and CG; methodology, DZ and ZZ; validation, DZ and GL; formal analysis, DZ, ZZ, and CG; resources, DZ and GL; data curation, DZ; original draft preparation, DZ; revise and editing, DZ, ZZ, and CG; project administration, CG; funding acquisition, DZ and ZZ. All authors have read and agreed to the published version of the manuscript.</p>
</sec>
<sec sec-type="COI-statement" id="s8">
<title>Conflict of Interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="disclaimer" id="s9">
<title>Publisher&#x2019;s Note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors, and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ack>
<p>This work was partly supported by State Key Laboratory of Communication Content Cognition, People&#x2019;s Daily Online (No. A12001) and Natural Science Foundation of Heilongjiang Province of China (No. LC2018031).</p>
</ack>
<sec id="s10">
<title>Supplementary Material</title>
<p>The Supplementary Material for this article can be found online at: <ext-link ext-link-type="uri" xlink:href="https://www.frontiersin.org/articles/10.3389/fphy.2021.733224/full#supplementary-material">https://www.frontiersin.org/articles/10.3389/fphy.2021.733224/full&#x23;supplementary-material</ext-link>
</p>
<supplementary-material xlink:href="DataSheet1.CSV" id="SM1" mimetype="application/CSV" xmlns:xlink="http://www.w3.org/1999/xlink"/>
<supplementary-material xlink:href="DataSheet2.CSV" id="SM2" mimetype="application/CSV" xmlns:xlink="http://www.w3.org/1999/xlink"/>
</sec>
<ref-list>
<title>References</title>
<ref id="B1">
<label>1.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Leimeister</surname>
<given-names>J.&#x20;M.</given-names>
</name>
<name>
<surname>Sidiras</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Krcmar</surname>
<given-names>H.</given-names>
</name>
</person-group> <article-title>Exploring Success Factors of Virtual&#x20;Communities: the Perspectives of Members and Operators</article-title>. <source>J&#x20;Organizational Comput Electron commerce</source> (<year>2006</year>) <volume>16</volume>:<fpage>279</fpage>&#x2013;<lpage>300</lpage>. <pub-id pub-id-type="doi">10.1207/s15327744joce1603&#x26;4_7</pub-id> </citation>
</ref>
<ref id="B2">
<label>2.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Liu</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Hu</surname>
<given-names>B.</given-names>
</name>
</person-group> <article-title>Epidemic Spreading in Community Networks</article-title>. <source>Europhys Lett</source> (<year>2005</year>) <volume>72</volume>:<fpage>315</fpage>&#x2013;<lpage>21</lpage>. <pub-id pub-id-type="doi">10.1209/epl/i2004-10550-5</pub-id> </citation>
</ref>
<ref id="B3">
<label>3.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Deng</surname>
<given-names>X. L</given-names>
</name>
<name>
<surname>Ding</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Lv</surname>
<given-names>TJ.</given-names>
</name>
</person-group> <article-title>Novel Node Centrality-Based&#x20;Efficient Empirical Robustness Assessment for Directed Network</article-title>. <source>Complexity</source> (<year>2020</year>) <volume>2020</volume>. <fpage>1</fpage>-<lpage>14</lpage>. <pub-id pub-id-type="doi">10.1155/2020/8715619</pub-id> </citation>
</ref>
<ref id="B4">
<label>4.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zeng</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Xiao</surname>
<given-names>R.</given-names>
</name>
</person-group> <article-title>A Networked Approach to Dynamic Analysis of Social System Vulnerability</article-title>. <source>J&#x20;Intell Fuzzy Syst</source> (<year>2015</year>) <volume>28</volume>:<fpage>189</fpage>&#x2013;<lpage>97</lpage>. <pub-id pub-id-type="doi">10.3233/IFS-141289</pub-id> </citation>
</ref>
<ref id="B5">
<label>5.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kuhnle</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Nguyen</surname>
<given-names>N. P.</given-names>
</name>
<name>
<surname>Dinh</surname>
<given-names>T. N.</given-names>
</name>
<name>
<surname>Thai</surname>
<given-names>M. T.</given-names>
</name>
</person-group> <article-title>Vulnerability of Clustering under Node Failure in Complex Networks</article-title>. <source>Soc Netw Anal Min</source> (<year>2017</year>) <volume>7</volume>:<fpage>8</fpage>. <pub-id pub-id-type="doi">10.1007/s13278-017-0426-5</pub-id> </citation>
</ref>
<ref id="B6">
<label>6.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Albert</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Jeong</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Barab&#xe1;si</surname>
<given-names>A.-L.</given-names>
</name>
</person-group> <article-title>Error and Attack Tolerance of Complex&#x20;Networks</article-title>. <source>Nature</source> (<year>2000</year>) <volume>406</volume>:<fpage>378</fpage>&#x2013;<lpage>82</lpage>. <pub-id pub-id-type="doi">10.1038/35019019</pub-id> </citation>
</ref>
<ref id="B7">
<label>7.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Holmgren</surname>
<given-names>A. J.</given-names>
</name>
</person-group> <article-title>Using Graph Models to Analyze the Vulnerability of Electric Power Networks</article-title>. <source>Risk Anal</source> (<year>2006</year>) <volume>26</volume>:<fpage>955</fpage>&#x2013;<lpage>69</lpage>. <pub-id pub-id-type="doi">10.1111/j.1539-6924.2006.00791.x</pub-id> </citation>
</ref>
<ref id="B8">
<label>8.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Callaway</surname>
<given-names>D. S.</given-names>
</name>
<name>
<surname>Newman</surname>
<given-names>M. E. J.</given-names>
</name>
<name>
<surname>Strogatz</surname>
<given-names>S. H.</given-names>
</name>
<name>
<surname>Watts</surname>
<given-names>D. J.</given-names>
</name>
</person-group> <article-title>Network Robustness and Fragility: Percolation on Random Graphs</article-title>. <source>Phys Rev Lett</source> (<year>2000</year>) <volume>85</volume>:<fpage>5468</fpage>&#x2013;<lpage>71</lpage>. <pub-id pub-id-type="doi">10.1515/9781400841356.510</pub-id> </citation>
</ref>
<ref id="B9">
<label>9.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Buldyrev</surname>
<given-names>S. V.</given-names>
</name>
<name>
<surname>Parshani</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Paul</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Stanley</surname>
<given-names>H. E.</given-names>
</name>
<name>
<surname>Havlin</surname>
<given-names>S.</given-names>
</name>
</person-group> <article-title>Catastrophic Cascade of Failures in Interdependent Networks</article-title>. <source>Nature</source> (<year>2010</year>) <volume>464</volume>:<fpage>1025</fpage>&#x2013;<lpage>8</lpage>. <pub-id pub-id-type="doi">10.1038/nature08932</pub-id> </citation>
</ref>
<ref id="B10">
<label>10.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Gao</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Buldyrev</surname>
<given-names>S. V.</given-names>
</name>
<name>
<surname>Havlin</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Stanley</surname>
<given-names>H. E.</given-names>
</name>
</person-group> <article-title>Robustness of A Network of Networks</article-title>. <source>Phys Rev Lett</source> (<year>2011</year>) <volume>107</volume>:<fpage>195701</fpage>. <pub-id pub-id-type="doi">10.1103/PhysRevLett.107.195701</pub-id> </citation>
</ref>
<ref id="B11">
<label>11.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Cohen</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Ben-Avraham</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Havlin</surname>
<given-names>S.</given-names>
</name>
</person-group> <article-title>Percolation Critical Exponents in Scale-free Networks</article-title>. <source>Phys Rev E</source> (<year>2002</year>) <volume>66</volume>:<fpage>36113</fpage>. <pub-id pub-id-type="doi">10.1103/PhysRevE.66.036113</pub-id> </citation>
</ref>
<ref id="B12">
<label>12.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>V&#xe1;zquez</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Moreno</surname>
<given-names>Y.</given-names>
</name>
</person-group> <article-title>Resilience to Damage of Graphs with Degree Correlations</article-title>. <source>Phys Rev E</source> (<year>2003</year>) <volume>67</volume>:<fpage>015101</fpage>. <pub-id pub-id-type="doi">10.1103/PhysRevE.67.015101</pub-id> </citation>
</ref>
<ref id="B13">
<label>13.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Jalili</surname>
<given-names>M.</given-names>
</name>
</person-group> <article-title>Error and Attack Tolerance of Small-Worldness in Complex Networks</article-title>. <source>J&#x20;Informetrics</source> (<year>2011</year>) <volume>5</volume>:<fpage>422</fpage>&#x2013;<lpage>30</lpage>. <pub-id pub-id-type="doi">10.1016/j.joi.2011.03.002</pub-id> </citation>
</ref>
<ref id="B14">
<label>14.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wu</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Tan</surname>
<given-names>S-Y.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Tan</surname>
<given-names>Y-J.</given-names>
</name>
<name>
<surname>Lu</surname>
<given-names>X.</given-names>
</name>
</person-group> <article-title>Enhancing Structural Robustness of Scale-free Networks by Information Disturbance</article-title>. <source>Sci Rep</source> (<year>2017</year>) <volume>7</volume>:<fpage>7559</fpage>. <pub-id pub-id-type="doi">10.1038/s41598-017-07878-2</pub-id> </citation>
</ref>
<ref id="B15">
<label>15.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Grubesic</surname>
<given-names>T. H.</given-names>
</name>
<name>
<surname>Matisziw</surname>
<given-names>T. C.</given-names>
</name>
<name>
<surname>Murray</surname>
<given-names>A. T.</given-names>
</name>
<name>
<surname>Snediker</surname>
<given-names>D.</given-names>
</name>
</person-group> <article-title>Comparative Approaches for Assessing Network Vulnerability</article-title>. <source>Int Reg Sci Rev</source> (<year>2008</year>) <volume>31</volume>:<fpage>88</fpage>&#x2013;<lpage>112</lpage>. <pub-id pub-id-type="doi">10.1177/0160017607308679</pub-id> </citation>
</ref>
<ref id="B16">
<label>16.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Estrada</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Hatano</surname>
<given-names>N.</given-names>
</name>
</person-group> <article-title>A Vibrational Approach to Node Centrality and Vulnerability in Complex Networks</article-title>. <source>Physica A: Stat Mech its Appl</source> (<year>2010</year>) <volume>389</volume>:<fpage>3648</fpage>&#x2013;<lpage>60</lpage>. <pub-id pub-id-type="doi">10.1016/j.physa.2010.03.030</pub-id> </citation>
</ref>
<ref id="B17">
<label>17.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Chen</surname>
<given-names>B. Y.</given-names>
</name>
<name>
<surname>Lam</surname>
<given-names>W. H. K.</given-names>
</name>
<name>
<surname>Sumalee</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>Z.-C.</given-names>
</name>
</person-group> <article-title>Vulnerability Analysis for Large-Scale and Congested Road Networks with Demand Uncertainty</article-title>. <source>Transportation Res A</source> (<year>2012</year>) <volume>46</volume>:<fpage>501</fpage>&#x2013;<lpage>16</lpage>. <pub-id pub-id-type="doi">10.1016/j.tra.2011.11.018</pub-id> </citation>
</ref>
<ref id="B18">
<label>18.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Morone</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Makse</surname>
<given-names>H. A.</given-names>
</name>
</person-group> <article-title>Influence Maximization in Complex Networks through Optimal Percolation</article-title>. <source>Nature</source> (<year>2015</year>) <volume>524</volume>:<fpage>65</fpage>&#x2013;<lpage>8</lpage>. <pub-id pub-id-type="doi">10.1038/nature14604</pub-id> </citation>
</ref>
<ref id="B19">
<label>19.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Boccaletti</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Latora</surname>
<given-names>V.</given-names>
</name>
<name>
<surname>Moreno</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Chavez</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Hwang</surname>
<given-names>D.</given-names>
</name>
</person-group> <article-title>Complex Networks: Structure and Dynamics</article-title>. <source>Phys Rep</source> (<year>2006</year>) <volume>424</volume>:<fpage>175</fpage>&#x2013;<lpage>308</lpage>. <pub-id pub-id-type="doi">10.1016/j.physrep.2005.10.009</pub-id> </citation>
</ref>
<ref id="B20">
<label>20.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Latora</surname>
<given-names>V.</given-names>
</name>
<name>
<surname>Marchiori</surname>
<given-names>M.</given-names>
</name>
</person-group> <article-title>Efficient Behavior of Small-World Networks</article-title>. <source>Phys&#x20;Rev Lett</source> (<year>2001</year>) <volume>87</volume>:<fpage>198701</fpage>. <pub-id pub-id-type="doi">10.1103/PhysRevLett.87.198701</pub-id> </citation>
</ref>
<ref id="B21">
<label>21.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Crucitti</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Latora</surname>
<given-names>V.</given-names>
</name>
<name>
<surname>Marchiori</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Rapisarda</surname>
<given-names>A.</given-names>
</name>
</person-group> <article-title>Error and Attack Tolerance of Complex Networks</article-title>. <source>Physica A: Stat Mech its Appl</source> (<year>2004</year>) <volume>340</volume>:<fpage>388</fpage>&#x2013;<lpage>94</lpage>. <pub-id pub-id-type="doi">10.1016/j.physa.2004.04.031</pub-id> </citation>
</ref>
<ref id="B22">
<label>22.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Freeman</surname>
<given-names>L. C.</given-names>
</name>
</person-group> <article-title>Centrality in Social Networks: Conceptual Clarification</article-title>. <source>Social Networks</source> (<year>1979</year>) <volume>1</volume>:<fpage>215</fpage>&#x2013;<lpage>39</lpage>. <pub-id pub-id-type="doi">10.1016/0378-8733(78)90021-7</pub-id> </citation>
</ref>
<ref id="B23">
<label>23.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Uddin</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Hossain</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Wigand</surname>
<given-names>R. T.</given-names>
</name>
</person-group> <article-title>New Direction in Degree Centrality Measure: Towards a Time-Variant Approach</article-title>. <source>Int J&#x20;Info Tech Dec Mak</source> (<year>2014</year>) <volume>13</volume>:<fpage>865</fpage>&#x2013;<lpage>78</lpage>. <pub-id pub-id-type="doi">10.1142/S0219622014500217</pub-id> </citation>
</ref>
<ref id="B24">
<label>24.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Newman</surname>
<given-names>M. E. J.</given-names>
</name>
</person-group> <article-title>A Measure of Betweenness Centrality Based on Random Walks</article-title>. <source>Soc Networks</source> (<year>2005</year>) <volume>27</volume>:<fpage>39</fpage>&#x2013;<lpage>54</lpage>. <pub-id pub-id-type="doi">10.1016/j.socnet.2004.11.009</pub-id> </citation>
</ref>
<ref id="B25">
<label>25.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wehmuth</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Ziviani</surname>
<given-names>A.</given-names>
</name>
</person-group> <article-title>DACCER: Distributed Assessment of the Closeness Centrality Ranking in Complex Networks</article-title>. <source>Computer Networks</source> (<year>2013</year>) <volume>57</volume>:<fpage>2536</fpage>&#x2013;<lpage>48</lpage>. <pub-id pub-id-type="doi">10.1016/j.comnet.2013.05.001</pub-id> </citation>
</ref>
<ref id="B26">
<label>26.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>X. J.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>Y .Z.</given-names>
</name>
<name>
<surname>Jiang</surname>
<given-names>Y. C.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>X.</given-names>
</name>
</person-group> <article-title>Identifying Social Influence in Complex Networks: A Novel Conductance Eigenvector Centrality Model</article-title>. <source>Neurocomputing</source> (<year>2015</year>) <volume>210</volume>:<fpage>141</fpage>&#x2013;<lpage>54</lpage>. <pub-id pub-id-type="doi">10.1016/j.neucom.2015.11.123</pub-id> </citation>
</ref>
<ref id="B27">
<label>27.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Chen</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>L&#xfc;</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Shang</surname>
<given-names>M.-S.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>Y.-C.</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>T.</given-names>
</name>
</person-group> <article-title>Identifying Influential Nodes in Complex Networks</article-title>. <source>Physica A: Stat Mech its Appl</source> (<year>2012</year>) <volume>391</volume>:<fpage>1777</fpage>&#x2013;<lpage>87</lpage>. <pub-id pub-id-type="doi">10.1016/j.physa.2011.09.017</pub-id> </citation>
</ref>
<ref id="B28">
<label>28.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Iyer</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Killingback</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Sundaram</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>Z.</given-names>
</name>
</person-group> <article-title>Attack Robustness and Centrality of Complex Networks</article-title>. <source>Plos One</source> (<year>2013</year>) <volume>8</volume>:<fpage>e59613</fpage>. <pub-id pub-id-type="doi">10.1371/journal.pone.0059613</pub-id> </citation>
</ref>
<ref id="B29">
<label>29.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Nguyen</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>Pham</surname>
<given-names>H. D.</given-names>
</name>
<name>
<surname>Cassi</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Bellingeri</surname>
<given-names>M.</given-names>
</name>
</person-group> <article-title>Conditional Attack Strategy for Real-World Complex Networks</article-title>. <source>Physica A: Stat Mech its Appl</source> (<year>2019</year>) <volume>530</volume>:<fpage>121561</fpage>. <pub-id pub-id-type="doi">10.1016/j.physa.2019.121561</pub-id> </citation>
</ref>
<ref id="B30">
<label>30.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Brin</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Page</surname>
<given-names>L.</given-names>
</name>
</person-group> <article-title>The Anatomy of A Large-Scale Hypertextual Web Search Engine</article-title>. <source>Comp Networks ISDN Syst</source> (<year>1998</year>) <volume>30</volume>:<fpage>107</fpage>&#x2013;<lpage>17</lpage>. <pub-id pub-id-type="doi">10.1016/S0169-7552(98)00110-X</pub-id> </citation>
</ref>
<ref id="B31">
<label>31.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zengin Alp</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>G&#xfc;nd&#xfc;z &#xd6;&#x11f;&#xfc;d&#xfc;c&#xfc;</surname>
<given-names>&#x15e;.</given-names>
</name>
</person-group> <article-title>Identifying Topical Influencers on Twitter Based on User Behavior and Network Topology</article-title>. <source>Knowledge-Based Syst</source> (<year>2018</year>) <volume>141</volume>:<fpage>211</fpage>&#x2013;<lpage>21</lpage>. <pub-id pub-id-type="doi">10.1016/j.knosys.2017.11.021</pub-id> </citation>
</ref>
<ref id="B32">
<label>32.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Erkol</surname>
<given-names>&#x15e;.</given-names>
</name>
<name>
<surname>Castellano</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Radicchi</surname>
<given-names>F.</given-names>
</name>
</person-group> <article-title>Systematic Comparison between Methods for the Detection of Influential Spreaders in Complex Networks</article-title>. <source>Sci Rep</source> (<year>2019</year>) <volume>9</volume>:<fpage>15095</fpage>. <pub-id pub-id-type="doi">10.1038/s41598-019-51209-6</pub-id> </citation>
</ref>
<ref id="B33">
<label>33.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Nie</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Guo</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Zhao</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Lu</surname>
<given-names>Z.-M.</given-names>
</name>
</person-group> <article-title>New Attack Strategies for Complex Networks</article-title>. <source>Physica A: Stat Mech its Appl</source> (<year>2015</year>) <volume>424</volume>:<fpage>248</fpage>&#x2013;<lpage>53</lpage>. <pub-id pub-id-type="doi">10.1016/j.physa.2015.01.004</pub-id> </citation>
</ref>
<ref id="B34">
<label>34.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Liao</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Mariani</surname>
<given-names>M. S.</given-names>
</name>
<name>
<surname>Medo</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>Y.-C.</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>M.-Y.</given-names>
</name>
</person-group> <article-title>Ranking in Evolving Complex Networks</article-title>. <source>Phys Rep</source> (<year>2017</year>) <volume>689</volume>:<fpage>1</fpage>&#x2013;<lpage>54</lpage>. <pub-id pub-id-type="doi">10.1016/j.physrep.2017.05.001</pub-id> </citation>
</ref>
<ref id="B35">
<label>35.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Eom</surname>
<given-names>Y. H.</given-names>
</name>
<name>
<surname>Jeon</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Jeong</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Kahng</surname>
<given-names>B.</given-names>
</name>
</person-group> <article-title>Evolution of Weighted Scale-free Networks in Empirical Data</article-title>. <source>Phys Rev E Stat Nonlin Soft Matter Phys</source> (<year>2008</year>) <volume>77</volume>:<fpage>056105</fpage>. <pub-id pub-id-type="doi">10.1103/PhysRevE.77.056105</pub-id> </citation>
</ref>
<ref id="B36">
<label>36.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kujawski</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Ho&#x142;yst</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Rodgers</surname>
<given-names>G. J.</given-names>
</name>
</person-group> <article-title>Growing Trees in Internet News Groups and Forums</article-title>. <source>Phys Rev E Stat Nonlin Soft Matter Phys</source> (<year>2007</year>) <volume>76</volume>:<fpage>036103</fpage>. <pub-id pub-id-type="doi">10.1103/PhysRevE.76.036103</pub-id> </citation>
</ref>
<ref id="B37">
<label>37.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Slanina</surname>
<given-names>F.</given-names>
</name>
</person-group> <article-title>Dynamics of User Networks in On-Line Electronic Auctions</article-title>. <source>Advs Complex Syst</source> (<year>2014</year>) <volume>17</volume>. <fpage>1</fpage>&#x2013;<lpage>14</lpage>. <pub-id pub-id-type="doi">10.1142/S0219525914500027</pub-id> </citation>
</ref>
<ref id="B38">
<label>38.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kirlangic</surname>
<given-names>A</given-names>
</name>
</person-group>. <article-title>The Rupture Degree and Gear Graphs</article-title>. <source>Bull Malaysian Math Sci Soc</source> (<year>2009</year>) <volume>32</volume>:<fpage>31</fpage>&#x2013;<lpage>6</lpage>. </citation>
</ref>
<ref id="B39">
<label>39.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Bellingeri</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Bevacqua</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Scotognella</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Alfieri</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Nguyen</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>Montepietra</surname>
<given-names>D</given-names>
</name>
<etal/>
</person-group> <article-title>Link and Node Removal in Real Social Networks: A Review</article-title>. <source>Front Phys</source> (<year>2020</year>) <volume>8</volume>:<fpage>228</fpage>. <pub-id pub-id-type="doi">10.3389/fphy.2020.00228</pub-id> </citation>
</ref>
<ref id="B40">
<label>40.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Chv&#xe1;tal</surname>
<given-names>V.</given-names>
</name>
</person-group> <article-title>Tough Graphs and Hamiltonian Circuits</article-title>. <source>Discrete Maths</source> (<year>1973</year>) <volume>5</volume>:<fpage>215</fpage>&#x2013;<lpage>28</lpage>. <pub-id pub-id-type="doi">10.1016/0012-365x(73)90138-6</pub-id> </citation>
</ref>
<ref id="B41">
<label>41.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Barefoot</surname>
<given-names>C. A.</given-names>
</name>
<name>
<surname>Entringer</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Swart</surname>
<given-names>H.</given-names>
</name>
</person-group> <article-title>Vulnerability in Graphs&#x2014;A Comparative Survey</article-title>. <source>J&#x20;Combin Math Combin Comput</source> (<year>1987</year>) <volume>1</volume>:<fpage>13</fpage>&#x2013;<lpage>22</lpage>. </citation>
</ref>
<ref id="B42">
<label>42.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Cozzens</surname>
<given-names>M. B.</given-names>
</name>
<name>
<surname>Moazzami</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Stueckle</surname>
<given-names>S.</given-names>
</name>
</person-group> <article-title>Tenacity of Harary Graphs</article-title>. <source>J&#x20;Combin Math Combin Comput</source> (<year>1994</year>) <volume>16</volume>:<fpage>33</fpage>&#x2013;<lpage>56</lpage>. </citation>
</ref>
<ref id="B43">
<label>43.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hendry</surname>
<given-names>G. R. T.</given-names>
</name>
</person-group> <article-title>Scattering Number and Extremal Non-hamiltonian Graphs</article-title>. <source>Discrete Maths</source> (<year>1988</year>) <volume>71</volume>:<fpage>165</fpage>&#x2013;<lpage>75</lpage>. <pub-id pub-id-type="doi">10.1016/0012-365x(88)90069-6</pub-id> </citation>
</ref>
<ref id="B44">
<label>44.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Panzarasa</surname>
<given-names>P</given-names>
</name>
<name>
<surname>OpsahlCarley</surname>
<given-names>T. K. M.</given-names>
</name>
<name>
<surname>Carley</surname>
<given-names>K. M.</given-names>
</name>
</person-group> <article-title>Patterns and Dynamics of Users&#x27; Behavior and Interaction: Network Analysis of an Online Community</article-title>. <source>J&#x20;Am Soc Inf Sci</source> (<year>2009</year>) <volume>60</volume>:<fpage>911</fpage>&#x2013;<lpage>32</lpage>. <pub-id pub-id-type="doi">10.1002/asi.21015</pub-id> </citation>
</ref>
</ref-list>
</back>
</article>