Skip to main content
. 2020 Sep 2;10:14445. doi: 10.1038/s41598-020-71483-z

Figure 1.

Figure 1

A simulation of a targeted attack, where the removal of the most connected nodes renders the network completely disconnected in 3 steps.