Fig. 14: Performance of different recognition methods in network destructive experiments.

a Network destructive experiment at 1‰ attack ratio. b Network destructive experiment at 2‰ attack ratio. c Network destructive experiment at 5‰ attack ratio. All the network destructive experiments show the experimental results of six algorithms in four periods. The six algorithms are CI, forwarding volume, degree centrality, K-shell, multidimensional similarity, classification and recognition. The four periods are gestational period, explosion period, duration period and recovery period.