Research Article

Hierarchical Evolution Model of Command and Control Network Based on Hypernetwork

Figure 5

(a) Comparisons of natural connectivity under targeted attack
(b) Comparison of natural connectivity under random attack