Publication
Nature
524, 38-39 (2015).
August 5, 2015
Research areas
Pinpointing the nodes whose removal most effectively disrupts a network has become a lot easier with the development of an efficient algorithm. Potential applications might include cybersecurity and disease control.
Share this page: