Skip to main content
. 2017 Aug 8;7:7559. doi: 10.1038/s41598-017-07878-2

Figure 3.

Figure 3

The relative sizes of the largest component S versus f for various attack information perfection parameter α. The original network is the same as the one we used in Fig. 2. The simulation results are averaged over 100 independent realizations of imperfect attack information.