Efficient network immunization under limited knowledge ====================================================== * Yangyang Liu * Hillel Sanhedrai * GaoGao Dong * Louis M. Shekhtman * Fan Wang * Sergey V. Buldyrev * Shlomo Havlin ## Abstract Targeted immunization or attacks of large-scale networks has attracted significant attention by the scientific community. However, in real-world scenarios, knowledge and observations of the network may be limited thereby precluding a full assessment of the optimal nodes to immunize (or remove) in order to avoid epidemic spreading such as that of current COVID-19 epidemic. Here, we study a novel immunization strategy where only *n* nodes are observed at a time and the most central between these *n* nodes is immunized (or attacked). This process is continued repeatedly until 1 − *p* fraction of nodes are immunized (or attacked). We develop an analytical framework for this approach and determine the critical percolation threshold *p**c* and the size of the giant component *P**∞;* for networks with arbitrary degree distributions *P*(*k*). In the limit of *n* → ∞ we recover prior work on targeted attack, whereas for *n* = 1 we recover the known case of random failure. Between these two extremes, we observe that as *n* increases, *p**c* increases quickly towards its optimal value under targeted immunization (attack) with complete information. In particular, we find a new scaling relationship between |*p**c*(∞) − *p**c*(*n*) | and *n* as |*p**c*(∞) − *p**c*(*n*)| ~ *n*−1 exp(−*αn*). For Scale-free (SF) networks, where *P*(*k*) ~ *k*−*γ*, 2 < *γ* < 3, we find that *p**c* has a transition from zero to non-zero when *n* increases from *n* = 1 to order of log*N* (*N* is the size of network). Thus, for SF networks, knowledge of order of log*N* nodes and immunizing them can reduce dramatically an epidemics. Networks play a crucial role in many diverse systems [1–8]. Connectivity of components is critical for maintaining the functioning of infrastructures like the internet [9] and transportation networks [10], as well as for understanding immunization against epidemics [11] and the spread of information in social systems [12]. Due to this importance, researchers have long focused on how a network can be optimally immunized or fragmented to prevent epidemics or to maintain infrastructure resilience [3, 13–17]. Many approaches have used percolation theory from statistical physics to prevent the spread of virus or assess network resilience under the infection or failure of some fraction of nodes or links [18–28]. Early studies in networks found that immunizing real networks against an epidemic is highly challenging due to the existence of hubs which prevent eradication of the virus even if many nodes are immunized [29–31]. At the same time, if these hub nodes, largest degree nodes, are targeted, the network can reach immunity [29, 31, 32]. However, these previous models of targeted immunization have assumed full knowledge of the network structure which in many cases is not available. Recent research has shown that even those in control of a network often have knowledge only of a small part of the whole network structure [33–35]. This was particularly demonstrated with the current COVID-19 epidemic where the detailed social network of individuals is unknown. In this Letter, we study targeted immunization or removal in networks with limited knowledge. We assume that at each stage, a number *n* nodes are observed and the node with highest degree is immunized and thus unable to continue spreading infection. This procedure is repeated until 1 − *p* fraction of nodes are immunized. In particular, our model could apply to a situation where several cooperative teams are sent to immunize a network and each team has access to information on a small subset (*n* nodes) of the network. We develop a theoretical framework for this model of immunization with limited information using percolation theory for networks with arbitrary degree distribution. In the limit of *n* = *N* we recover prior work on targeted attack [32], whereas for *n* = 1 we recover the case of random failure [30, 31]. We observe excellent agreement between our theoretical and simulation results for the *n* dependence of the critical threshold *p**c* and the size of the giant component *P**∞;* for *p > p**c*. The giant component and *p**c* characterize the efficiency of the immunization. The smaller is the giant component, the immunization strategy is better. The larger is *p**c* the immunization is more efficient since less immunization doses are needed to stop the epidemics. We find an analytical relationship between *n* and *p**c* for both Erdős-Rényi (ER) and Scale-Free (SF) networks. Surprisingly, we also find that *p**c* quickly reaches a plateau even for relatively small *n*, after which increasing *n* has negligible effect on *p**c*. This means that immunization with small *n* (not knowing the whole structure) can dramatically improve the immunization. Let *G*(*V, E*) be a network where *V* and *E* are the set of nodes and edges, respectively. *N* = |*V*| is the number of nodes in the network. We assume that a preventer or attacker has limited knowledge of the overall network structure and instead possesses only limited information on several nodes. Specifically, we randomly select *n* nodes for which the preventer or attacker is assumed to have information on the node degree. The preventer or attacker then targets the node with the highest degree among these *n*. This procedure is then repeated until a 1 − *p* fraction of nodes are immunized or removed from the network. In Fig.1, the limited information immunization (attack) is illustrated together with global targeted immunization on a network. Here a total of *n* = 3 nodes are observed. In panel (a), an individual with global information about the network structure chooses the highest degree node *u* to immunize (or remove). However, in panel (b), the individual only knows at a time the degree of 3 nodes in the network, i.e. *v*1, *v*2, *v*3. Consequently, node *v*3 with the highest degree *k* = 4 (marked in red) is immunized (or removed). Suppose the degree distribution of a network is given by *P* (*k*) and ![Graphic][1] being the cumulative probability that the degree of a randomly chosen node is less than or equal to *k*. Furthermore, at an arbitrary time *t* during the iterative percolation process, assume the distribution of the original degree (including the immunized neighbors) of the remaining nodes is *P* (*k, t*). Then, the degree distribution of the node which is immunized at time *t* is given by ![Formula][2] where *F* (*k, t*) is the cumulative distribution of *P* (*k, t*). This formula can be recognized as being derived from *order statistics* giving the *maximum* of several independent random variables [36]. For *k* = 0, Eq. (1) becomes *P**r*(0, *t*) = *F* (0, *t*)*n*. Hence we define *F* (*k* − 1, *t*) = 0, and then Eq. (1) is valid for *k* ≤ 0. In a limited knowledge immunization or attack, each node’s immunization changes the degree distribution of the remaining nodes in the following way ![Formula][3] where *N* (*k, t*) is the number of nodes with degree *k* at time *t*, and *P**r*(*k, t*) is the likelihood that a node immunized at time *t* has a degree *k*. Then, plugging Eq. (1) into Eq. (2) gives, ![Formula][4] which becomes in the continuous limit, ![Formula][5] Substituting *N* (*k, t*) = (*N* − *t*)*P* (*k, t*), we get ![Formula][6] and using *P* (*k, t*) = Δ*F* (*k, t*), we obtain, ![Formula][7] Note that *F* (*k* = − 1, *t*) = 0, and thus the entire term inside the Δ is 0 for *k* = −1. Similarly, this implies that for *k* = 0 and likewise for any *k* ≤ 0 this term is also 0. Thus, we get the following simple ordinary differential equation, ![Formula][8] with the initial condition *F* (*k, t* = 0) = *F* (*k*). It can be shown (see Sec I in SM) that the solution of this ODE, Eq. (3) is ![Formula][9] or equivalently, ![Formula][10] where *F**p*(*k*) is the cumulative distribution of the degree after immunizing (removing) 1 − *p* fraction of nodes. For *n* = 1, the solution of Eq. (3) is *F**p*(*k*) = *F* (*k*) as expected. Also Eq. (5) converges to *F* (*k*) in the limit *n* → 1. We can now obtain the degree distribution of the occupied nodes after fraction 1 *p* nodes are immunized, which is given by ![Formula][11] The equation for *v*, the probability of a randomly chosen link to lead to a node not in the giant component, is ![Formula][12] where *P* (Θ|*k*) is the probability of a node to be occupied given its degree is *k*. Using Bayes Theorem, we note that *P* (*k*)*P* (Θ|*k*) = *P* (Θ)*P* (*k*|Θ) = *pP**p*(*k*). Hence Eq. (7) becomes ![Formula][13] The giant component *S* can be found by ![Formula][14] where *v* is found from Eq. (8). At criticality, we take the derivative of both sides of Eq. (8) and substitute *v* = 1 representing the location where the first solution with *v* < 1 exists, as opposed to only the *v* = 1 solution. Thus, the critical condition is ![Formula][15] We now study our limited knowledge immunization (attack) strategy, i.e., the general result, Eqs. (8) and (9), on ER networks. First, we analyze the giant component *P**∞;*. For the case *n* = 1, limited knowledge immunization (or attack) reduces to the classical random attack, while for *n* → ∞ (meaning the global network is observed) corresponds to targeted attack [14, 29, 31, 32]. Using Eq. (9), the giant component *P**∞;* can be solved numerically for any given *p*. In Fig. 2(a), simulations and analytic results are shown for the giant component *P**∞;* as a function of 1 − *p* under limited information immunization with different *n*. As the knowledge index *n* increases from 1 to *N*, limited knowledge immunization moves from being like random immunization (attack) to being like targeted immunization (attack). The simulations are in excellent agreement with the theoretical results (lines). ![FIG. 1.](http://medrxiv.org/https://www.medrxiv.org/content/medrxiv/early/2020/04/11/2020.04.07.20056606/F1.medium.gif) [FIG. 1.](http://medrxiv.org/content/early/2020/04/11/2020.04.07.20056606/F1) FIG. 1. Schematic illustration of our limited knowledge immunization or attack strategy. The preventer or attacker is able to observe the degree of nodes that are colored green, while the gray nodes are unknown. (a) For the classical targeted immunization (attack), one has complete information on the global structure of the network and chooses the highest degree node (*u*) to immunize (remove). (b) Here the case of an individual with limited knowledge of the network is demonstrated. In this figure, we set *n* = 3 and only degrees of nodes *v*1, *v*2 and *v*3 are known. Given this limited information, the preventer would choose to immunize *v*3, being unaware that an unobserved higher degree node exists. At the next immunization or attack, only nodes which have not been immunized or removed yet will be observed. ![FIG. 2.](http://medrxiv.org/https://www.medrxiv.org/content/medrxiv/early/2020/04/11/2020.04.07.20056606/F2.medium.gif) [FIG. 2.](http://medrxiv.org/content/early/2020/04/11/2020.04.07.20056606/F2) FIG. 2. Results on ER networks. (a) The giant component *P**∞;* of an ER network with *k* = 4 varies with the fraction of immunized (or removed) nodes 1 − *p* under limited knowledge. As the *n* is increased, limited knowledge immunization tends to have the same immunization effect as targeted immunization. (b) The critical threshold *p**c* of limited knowledge immunization as a function of *n* on ER networks. Note that already for small *n* ~ 10, *p**c* is close to targeted immunization (global knowledge, *n* ~ *N*). (c) Critical threshold *p**c* as a function the mean degree ⟨*k*⟩ of ER networks for limited knowledge immunization. (d) The scaling of |*p**c*(∞) − *p**c*| with *n* on ER networks. Symbols are average results of simulations over 100 independent realizations on ER networks with 106 nodes. All simulation results (symbols) agree well with theoretical results from Eq. (10) (dashed lines). Next, we focus on the critical threshold, *p**c*, of limited knowledge immunization (attack). Overall, we find that one does not need a very large knowledge *n* ~ 10 to achieve nearly the very close effect as targeted immunization (attack) with complete information. This can be seen by observing the critical threshold *p**c* as a function of *n* in Fig. 2(b). In Fig. 2(c) we show the variation of *p**c* with ⟨*k*⟩ for several fixed *n*. Next, the behavior of *p**c* in the limit of large *n* is derived analytically. By examining Eq. (5) we notice that when *n* → ∞ there are two distinct behaviors depending on whether *k* is small, *F* (*k*) < *p*; or *k* is large, *F* (*k*) *> p*. It can be shown (see Sec II in SM) that the leading term behaves as, ![Formula][16] where *α**k* = |log [*p/F* (*k*)]|. In the limit *n* → ∞, we can get the expected result for targeted immunization (attack), *F**p*(*k*) = min {*F* (*k*)*/p*, 1} [31, 32]. Plugging Eq. (11) into Eq. (10), and noting that from a sum of exponentials decaying with *n* only the lowest decay rate contributes to the leading term, we obtain (see Sec II in SM) ![Formula][17] where ![Graphic][18], and the decay rate *α* is now ![Formula][19] The pre-factor ![Graphic][20], where *k*< is the largest degree such that ![Graphic][21] and *k*slow is the degree which gives the lowest rate *α*. (See illustration in SM). It is clear that *k*slow must be *k*< or *k**>* because *F* (*k*) is monotonic. If *F* (*k*slow) = *F* (*k**>*) = 1 then *k*< should be taken as *k*slow, and the corresponding *α* should be taken. It should also be noted that if *k*slow is not unique, it would simply change the pre-factor *A* in Eq. (12). Another special case is where ![Graphic][22], then ![Graphic][23] (see Sec IV in SM). Fig. 2(d) shows ![Graphic][24] as a function of *n*. As expected from the theory, one can see that Δ*p**c* ~ 1*/n* for small *n* and exponential decay for large *n*. When *p**c* → 1 which occurs for ER network when ⟨*k*⟩ → 1, the power law regime becomes much broader as explained in the Sec II of SM. Next, we study SF networks with *P* (*k*) = *Ak*−*γ*, *k* = *m*, …, *K*, where *A* = (*γ* − 1)*m**γ*−1 is the normalization factor, and *m* and *K* are the minimum and maximum degree respectively [30]. Similar to ER networks, the size of the giant component, *P**∞;* can be obtained from Eq. (9). Fig. 3(a), shows *P**∞;* as a function of 1 − *p* for different *n* values. The results demonstrate that SF networks become more immunized/vulnerable compared to ER networks under the immunization/attack as *n* increases. Compared with ER networks, one can observe that slightly higher values of *n* (more knowledge) are needed to reach the near-steady-state region of fully targeted strategy. ![FIG. 3.](http://medrxiv.org/https://www.medrxiv.org/content/medrxiv/early/2020/04/11/2020.04.07.20056606/F3.medium.gif) [FIG. 3.](http://medrxiv.org/content/early/2020/04/11/2020.04.07.20056606/F3) FIG. 3. Results for SF networks. Comparison of theory (lines) and simulation (symbols) for limited knowledge immunization or attack, *n*, for SF networks. (a) The size of the giant component versus *n* for SF network with *γ* = 2.5. (b) Critical threshold *p**c* versus *n* on SF networks. Simulations are obtained for a system with 106 nodes and averaged over 100 independent realizations. The minimum and maximum degree of network are *m* = 2 and *K* = 1000 respectively. For SF networks with 2 < *γ* < 3, under random immunization/attack (*n* = 1), it has been shown that *p**c* = 0 for an infinite system [30], while for high-degree immunization/attack (*n* → *∞;*), *p**c* *>* 0 [31, 32]. Next we wish to find out for which *n, p**c* becomes non-zero, and how it depends on the system size *N*. To this end, we analyze Eqs. (5) and (10) for large *k* (high degrees govern the behavior in SF), small *n* and *p* as follows (elaborated in SM). It can be shown that for large degrees, ![Formula][25] Substituting this into Eq. (5) and assuming (*k/m*)*γ*−1 ≫ *n* for large degrees, it can be concluded that ![Formula][26] In addition, we notice that *P**p*(*k*) has a new natural cut-off, *K**p*, which depends on *p* and *N* as follows (see Sec III in SM), ![Formula][27] This helps us to evaluate the second moment of *P**p*(*k*) ![Formula][28] where *β* = (3 − *γ*)*/*(*γ* − 1). Considering this, and plugging Eq. (13) into Eq. (10), and keeping the leading terms in the limit of large *N*, we obtain (see Sec III in SM for more details) ![Formula][29] where ![Formula][30] From Eq. (14), it is easy to see that if *n* ≪ log*N* then *p**c* → 0, while if *n* ~ log*N* then *p**c* is non-zero. The pre-factor *C*(*n*) depends on *n* but not in *N*. Fig. 4(a) shows *p**c* versus *γ*. It is known that for 2 < *γ* < 3 and *n* = 1, if *N* → ∞ then *p**c* → 0 [30]. Also for *n* = 5, we can see that system size matters and *p**c* decreases as *N* increases. Fig. 4(b) shows that the scaling with *n/* log*N* of Eq. (14) is valid. Furthermore, it is seen in Fig. 4(b) that when *n* is small or *N* is large, such that *n/* log*N* ≪ 1 (in Fig. 4 it is 0.07), *p**c* approaches 0. Fig. 4(c) supports the exponential scaling of *p**c* versus *n*−1 log*N* obtained analytically in Eq. (14). ![FIG. 4.](http://medrxiv.org/https://www.medrxiv.org/content/medrxiv/early/2020/04/11/2020.04.07.20056606/F4.medium.gif) [FIG. 4.](http://medrxiv.org/content/early/2020/04/11/2020.04.07.20056606/F4) FIG. 4. How *p**c* for SF networks depends on *γ* and the system size *N*. (a) *p**c* as a function of *γ* for different values of *n* and *N*. *p**c* decreases with increasing *N*. For *n* = 1 and 2 < *γ* < 3, it is well-known that *p**c* approaches zero for infinite system. (b) *p**c* as a function of *n/* log*N* for SF network with *γ* = 2.1. The enlarged figure for small *n* = 1, …, 5 are shown in the inset, and *p**c* approaches zero for *n/* log*N* ≪1. (c) The scaling of *p**c* with *N* and *n* for large *N* and small *n*. Here *C*(*n*) is the pre-factor. The minimum and maximum degree of nodes are *m* = 2 and *K* = *N* 1*/*(*γ*−1) respectively. This confirms Eq. (14) for *γ* = 2.1, and *δ* = (3 − *γ*)*/*2 = 0.45. In summary, our results provide a framework for understanding and carrying out efficient immunization with limited knowledge. Especially in cases of global pandemics such as e.g., the current COVID-19, it is impossible to know the full interactions of all individuals. Thus an effective way to limit spreading is obtaining information on a few (*n*) individuals and targeting the most central of these. For example, testers could stand at a supermarket and select a group of people entering the store simultaneously. Information on the connections of these people e.g., the number of people they live with, where and how often they meet with other people etc. could be quickly obtained (such as through cell phone tracking) and then the individual with the most connections in the group could be quarantined or immunized. Our results demonstrate that even when this is done in small groups of people (low *n*), it is possible to obtain a significant improvement in global immunization compared to randomly selecting individuals. In our model, this was seen by the reduced size of the giant component and the large critical threshold *p**c*. Overall, these findings could help to develop better ways for immunizing large networks and designing resilient infrastructure. ## Data Availability All the available data and algorithms can be got by contacting the author. * Received April 7, 2020. * Revision received April 7, 2020. * Accepted April 11, 2020. * © 2020, Posted by Cold Spring Harbor Laboratory The copyright holder for this pre-print is the author. All rights reserved. The material may not be redistributed, re-used or adapted without the author's permission. ## References 1. [1]. Mark EJ Newman. The structure and function of complex networks. SIAM review, 45(2):167–256, 2003. [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.1137/s003614450342480&link_type=DOI) 2. [2]. Réka Albert and Albert-László Barabási. Statistical mechanics of complex networks. Reviews of Modern Physics, 74(1):47, 2002. [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.1103/RevModPhys.74.47&link_type=DOI) [Web of Science](http://medrxiv.org/lookup/external-ref?access_num=000174548700003&link_type=ISI) 3. [3]. Reuven Cohen and Shlomo Havlin. Complex networks: structure, robustness and function. Cambridge University Press, 2010. 4. [4]. Reuven Cohen, Shlomo Havlin, and Daniel BenAvraham. Efficient immunization strategies for computer networks and populations. Physical Review Letters, 91(24):247901, 2003. [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.1103/PhysRevLett.91.247901&link_type=DOI) [PubMed](http://medrxiv.org/lookup/external-ref?access_num=14683159&link_type=MED&atom=%2Fmedrxiv%2Fearly%2F2020%2F04%2F11%2F2020.04.07.20056606.atom) 5. [5]. Dirk Brockmann and Dirk Helbing. The hidden geometry of complex, network-driven contagion phenomena. Science, 342(6164):1337–1342, 2013. [Abstract/FREE Full Text](http://medrxiv.org/lookup/ijlink/YTozOntzOjQ6InBhdGgiO3M6MTQ6Ii9sb29rdXAvaWpsaW5rIjtzOjU6InF1ZXJ5IjthOjQ6e3M6ODoibGlua1R5cGUiO3M6NDoiQUJTVCI7czoxMToiam91cm5hbENvZGUiO3M6Mzoic2NpIjtzOjU6InJlc2lkIjtzOjEzOiIzNDIvNjE2NC8xMzM3IjtzOjQ6ImF0b20iO3M6NTA6Ii9tZWRyeGl2L2Vhcmx5LzIwMjAvMDQvMTEvMjAyMC4wNC4wNy4yMDA1NjYwNi5hdG9tIjt9czo4OiJmcmFnbWVudCI7czowOiIiO30=) 6. [6]. Yang-Yu Liu, Endre Csóka, Haijun Zhou, and Márton Pósfai. Core percolation on complex networks. Physical Review Letters, 109(20):205703, 2012. [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.1103/PhysRevLett.109.205703&link_type=DOI) 7. [7]. Yang-Yu Liu, Jean-Jacques Slotine, and Albert-Laszló Barabási. Controllability of complex networks. Nature, 473(7346):167–173, 2011. [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.1038/nature10011&link_type=DOI) [PubMed](http://medrxiv.org/lookup/external-ref?access_num=21562557&link_type=MED&atom=%2Fmedrxiv%2Fearly%2F2020%2F04%2F11%2F2020.04.07.20056606.atom) [Web of Science](http://medrxiv.org/lookup/external-ref?access_num=000290487200029&link_type=ISI) 8. [8]. Duncan J Watts. A simple model of global cascades on random networks. Proceedings of the National Academy of Sciences, 99(9):5766–5771, 2002. [Abstract/FREE Full Text](http://medrxiv.org/lookup/ijlink/YTozOntzOjQ6InBhdGgiO3M6MTQ6Ii9sb29rdXAvaWpsaW5rIjtzOjU6InF1ZXJ5IjthOjQ6e3M6ODoibGlua1R5cGUiO3M6NDoiQUJTVCI7czoxMToiam91cm5hbENvZGUiO3M6NDoicG5hcyI7czo1OiJyZXNpZCI7czo5OiI5OS85LzU3NjYiO3M6NDoiYXRvbSI7czo1MDoiL21lZHJ4aXYvZWFybHkvMjAyMC8wNC8xMS8yMDIwLjA0LjA3LjIwMDU2NjA2LmF0b20iO31zOjg6ImZyYWdtZW50IjtzOjA6IiI7fQ==) 9. [9]. Réka Albert, Hawoong Jeong, and Albert-Laszló Barabási. Internet: Diameter of the world-wide web. Nature, 401(6749):130, 1999. [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.1038/43601&link_type=DOI) [Web of Science](http://medrxiv.org/lookup/external-ref?access_num=000082458800041&link_type=ISI) 10. [10].Zoltán Toroczkai and Kevin E Bassler. Network dynamics: Jamming is limited in scale-free systems. Nature, 428(6984):716, 2004. [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.1038/428716a&link_type=DOI) [PubMed](http://medrxiv.org/lookup/external-ref?access_num=15085122&link_type=MED&atom=%2Fmedrxiv%2Fearly%2F2020%2F04%2F11%2F2020.04.07.20056606.atom) [Web of Science](http://medrxiv.org/lookup/external-ref?access_num=000220823800027&link_type=ISI) 11. [11]. Romualdo Pastor-Satorras and Alessandro Vespignani. Epidemic spreading in scale-free networks. Physical Review Letters, 86(14):3200, 2001. [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.1103/PhysRevLett.86.3200&link_type=DOI) [PubMed](http://medrxiv.org/lookup/external-ref?access_num=11290142&link_type=MED&atom=%2Fmedrxiv%2Fearly%2F2020%2F04%2F11%2F2020.04.07.20056606.atom) [Web of Science](http://medrxiv.org/lookup/external-ref?access_num=000167866300072&link_type=ISI) 12. [12]. Duncan J Watts and Steven H Strogatz. Collective dynamics of “small-world” networks. Nature, 393(6684):440, 1998. [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.1038/30918&link_type=DOI) [PubMed](http://medrxiv.org/lookup/external-ref?access_num=9623998&link_type=MED&atom=%2Fmedrxiv%2Fearly%2F2020%2F04%2F11%2F2020.04.07.20056606.atom) [Web of Science](http://medrxiv.org/lookup/external-ref?access_num=000074020000035&link_type=ISI) 13. [13]. Lazaros K Gallos, Reuven Cohen, Panos Argyrakis, Armin Bunde, and Shlomo Havlin. Stability and topology of scale-free networks under attack and defense strategies. Physical Review Letters, 94(18):188701, 2005. [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.1103/PhysRevLett.94.188701&link_type=DOI) [PubMed](http://medrxiv.org/lookup/external-ref?access_num=15904414&link_type=MED&atom=%2Fmedrxiv%2Fearly%2F2020%2F04%2F11%2F2020.04.07.20056606.atom) 14. [14]. Xuqing Huang, Jianxi Gao, Sergey V Buldyrev, Shlomo Havlin, and H Eugene Stanley. Robustness of interdependent networks under targeted attack. Physical Review E, 83(6):065101, 2011. 15. [15]. Sebastian Neumayer, Gil Zussman, Reuven Cohen, and Eytan Modiano. Assessing the vulnerability of the fiber infrastructure to disasters. IEEE/ACM Transactions on Networking, 19(6):1610–1623, 2011. 16. [16]. Dirk Helbing. Globally networked risks and how to respond. Nature, 497(7447):51, 2013. [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.1038/nature12047&link_type=DOI) [PubMed](http://medrxiv.org/lookup/external-ref?access_num=23636396&link_type=MED&atom=%2Fmedrxiv%2Fearly%2F2020%2F04%2F11%2F2020.04.07.20056606.atom) [Web of Science](http://medrxiv.org/lookup/external-ref?access_num=000318221500033&link_type=ISI) 17. [17]. Stephen Eubank, Hasan Guclu, VS Anil Kumar, Madhav V Marathe, Aravind Srinivasan, Zoltan Toroczkai, and Nan Wang. Modelling disease outbreaks in realistic urban social networks. Nature, 429(6988):180–184, 2004. [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.1038/nature02541&link_type=DOI) [PubMed](http://medrxiv.org/lookup/external-ref?access_num=15141212&link_type=MED&atom=%2Fmedrxiv%2Fearly%2F2020%2F04%2F11%2F2020.04.07.20056606.atom) [Web of Science](http://medrxiv.org/lookup/external-ref?access_num=000221356300041&link_type=ISI) 18. [18].Dietrich Stauffer and Ammon Aharony. Introduction to percolation theory: revised second edition. CRC press, 2014. 19. [19]. H Eugene Stanley. Phase transitions and critical phenomena. Clarendon Press, Oxford, 1971. 20. [20]. Sergey V Buldyrev, Roni Parshani, Gerald Paul, H Eugene Stanley, and Shlomo Havlin. Catastrophic cascade of failures in interdependent networks. Nature, 464(7291):1025–1028, 2010. [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.1038/nature08932&link_type=DOI) [PubMed](http://medrxiv.org/lookup/external-ref?access_num=20393559&link_type=MED&atom=%2Fmedrxiv%2Fearly%2F2020%2F04%2F11%2F2020.04.07.20056606.atom) [Web of Science](http://medrxiv.org/lookup/external-ref?access_num=000276635000035&link_type=ISI) 21. [21]. Mark EJ Newman, Steven H Strogatz, and Duncan J Watts. Random graphs with arbitrary degree distributions and their applications. Physical review E, 64(2):026118, 2001. [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.1103/PhysRevE.64.026118&link_type=DOI) 22. [22]. Jianxi Gao, Sergey V Buldyrev, H Eugene Stanley, and Shlomo Havlin. Networks formed from interdependent networks. Nature Physics, 8(1):40–48, 2012. 23. [23]. Gaogao Dong et al. Robustness of network of networks under targeted attack. Physical Review E, 87(5):052804, 2013. 24. [24]. Louis M Shekhtman, Michael M Danziger, and Shlomo Havlin. Recent advances on failure and recovery in networks of networks. Chaos, Solitons & Fractals, 90:28–36, 2016. 25. [25]. Armin Bunde and Shlomo Havlin. Fractals and disordered systems. Springer Science & Business Media, 2012. 26. [26]. Gaogao Dong et al. Resilience of networks with community structure behaves as if under an external field. Proceedings of the National Academy of Sciences, 115(27):6911–6915, 2018. [Abstract/FREE Full Text](http://medrxiv.org/lookup/ijlink/YTozOntzOjQ6InBhdGgiO3M6MTQ6Ii9sb29rdXAvaWpsaW5rIjtzOjU6InF1ZXJ5IjthOjQ6e3M6ODoibGlua1R5cGUiO3M6NDoiQUJTVCI7czoxMToiam91cm5hbENvZGUiO3M6NDoicG5hcyI7czo1OiJyZXNpZCI7czoxMToiMTE1LzI3LzY5MTEiO3M6NDoiYXRvbSI7czo1MDoiL21lZHJ4aXYvZWFybHkvMjAyMC8wNC8xMS8yMDIwLjA0LjA3LjIwMDU2NjA2LmF0b20iO31zOjg6ImZyYWdtZW50IjtzOjA6IiI7fQ==) 27. [27]. A Coniglio, Chiara Rosanna Nappi, Fulvio Peruggi, and L Russo. Percolation points and critical point in the ising model. Journal of Physics A: Mathematical and General, 10(2):205, 1977. 28. [28]. Flaviano Morone and Hernan A Makse. Influence maximization in complex networks through optimal percolation. Nature, 524(7563):65–68, 2015. [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.1038/nature14604&link_type=DOI) [PubMed](http://medrxiv.org/lookup/external-ref?access_num=26131931&link_type=MED&atom=%2Fmedrxiv%2Fearly%2F2020%2F04%2F11%2F2020.04.07.20056606.atom) 29. [29]. Réka Albert, Hawoong Jeong, and Albert-László Barabási. Error and attack tolerance of complex networks. Nature, 406(6794):378, 2000. [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.1038/35019019&link_type=DOI) [PubMed](http://medrxiv.org/lookup/external-ref?access_num=10935628&link_type=MED&atom=%2Fmedrxiv%2Fearly%2F2020%2F04%2F11%2F2020.04.07.20056606.atom) [Web of Science](http://medrxiv.org/lookup/external-ref?access_num=000088383800038&link_type=ISI) 30. [30]. Reuven Cohen, Keren Erez, Daniel Ben-Avraham, and Shlomo Havlin. Resilience of the internet to random breakdowns. Physical Review Letters, 85(21):4626, 2000. [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.1103/PhysRevLett.85.4626&link_type=DOI) [PubMed](http://medrxiv.org/lookup/external-ref?access_num=11082612&link_type=MED&atom=%2Fmedrxiv%2Fearly%2F2020%2F04%2F11%2F2020.04.07.20056606.atom) [Web of Science](http://medrxiv.org/lookup/external-ref?access_num=000165399000054&link_type=ISI) 31. [31]. Duncan S Callaway, Mark EJ Newman, Steven H Strogatz, and Duncan J Watts. Network robustness and fragility: Percolation on random graphs. Physical Review Letters, 85(25):5468, 2000. [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.1103/PhysRevLett.85.5468&link_type=DOI) [PubMed](http://medrxiv.org/lookup/external-ref?access_num=11136023&link_type=MED&atom=%2Fmedrxiv%2Fearly%2F2020%2F04%2F11%2F2020.04.07.20056606.atom) [Web of Science](http://medrxiv.org/lookup/external-ref?access_num=000165884200052&link_type=ISI) 32. [32]. Reuven Cohen et al. Breakdown of the internet under intentional attack. Physical Review Letters, 86(16):3682, 2001. [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.1103/PhysRevLett.86.3682&link_type=DOI) [PubMed](http://medrxiv.org/lookup/external-ref?access_num=11328053&link_type=MED&atom=%2Fmedrxiv%2Fearly%2F2020%2F04%2F11%2F2020.04.07.20056606.atom) [Web of Science](http://medrxiv.org/lookup/external-ref?access_num=000168109800056&link_type=ISI) 33. [33]. Gang Yan, Georgios Tsekenis, Baruch Barzel, Jean-Jacques Slotine, Yang-Yu Liu, and Albert-László Barabási. Spectrum of controlling and observing complex networks. Nature Physics, 11(9):779, 2015. 34. [34]. Yang Yang, Jianhui Wang, and Adilson E. Motter. Network observability transitions. Phys. Rev. Lett., 109:258701, Dec 2012. 35. [35]. Yang-Yu Liu, Jean-Jacques Slotine, and Albert-László Barabási. Observability of complex systems. Proceedings of the National Academy of Sciences, 110(7):2460–2465, 2013. [Abstract/FREE Full Text](http://medrxiv.org/lookup/ijlink/YTozOntzOjQ6InBhdGgiO3M6MTQ6Ii9sb29rdXAvaWpsaW5rIjtzOjU6InF1ZXJ5IjthOjQ6e3M6ODoibGlua1R5cGUiO3M6NDoiQUJTVCI7czoxMToiam91cm5hbENvZGUiO3M6NDoicG5hcyI7czo1OiJyZXNpZCI7czoxMDoiMTEwLzcvMjQ2MCI7czo0OiJhdG9tIjtzOjUwOiIvbWVkcnhpdi9lYXJseS8yMDIwLzA0LzExLzIwMjAuMDQuMDcuMjAwNTY2MDYuYXRvbSI7fXM6ODoiZnJhZ21lbnQiO3M6MDoiIjt9) 36. [36]. Paul G Hoel et al. Introduction to mathematical statistics. *Inc. New York*, (2nd Ed), 1954. [1]: /embed/inline-graphic-1.gif [2]: /embed/graphic-1.gif [3]: /embed/graphic-2.gif [4]: /embed/graphic-3.gif [5]: /embed/graphic-4.gif [6]: /embed/graphic-5.gif [7]: /embed/graphic-6.gif [8]: /embed/graphic-7.gif [9]: /embed/graphic-8.gif [10]: /embed/graphic-9.gif [11]: /embed/graphic-10.gif [12]: /embed/graphic-11.gif [13]: /embed/graphic-12.gif [14]: /embed/graphic-13.gif [15]: /embed/graphic-14.gif [16]: /embed/graphic-17.gif [17]: /embed/graphic-18.gif [18]: /embed/inline-graphic-2.gif [19]: /embed/graphic-19.gif [20]: /embed/inline-graphic-3.gif [21]: /embed/inline-graphic-4.gif [22]: /embed/inline-graphic-5.gif [23]: /embed/inline-graphic-6.gif [24]: /embed/inline-graphic-7.gif [25]: /embed/graphic-21.gif [26]: /embed/graphic-22.gif [27]: /embed/graphic-23.gif [28]: /embed/graphic-24.gif [29]: /embed/graphic-25.gif [30]: /embed/graphic-26.gif