Skip to content

Commit

Permalink
Updated docs
Browse files Browse the repository at this point in the history
  • Loading branch information
safreita1 committed Aug 21, 2022
1 parent 3b1fbff commit 0a8d9a6
Show file tree
Hide file tree
Showing 68 changed files with 2,036 additions and 4,227 deletions.
Binary file modified docs/build/doctrees/attacks.doctree
Binary file not shown.
Binary file modified docs/build/doctrees/bibliography.doctree
Binary file not shown.
Binary file modified docs/build/doctrees/cascading.doctree
Binary file not shown.
Binary file modified docs/build/doctrees/defenses.doctree
Binary file not shown.
Binary file modified docs/build/doctrees/diffusion.doctree
Binary file not shown.
Binary file modified docs/build/doctrees/environment.pickle
Binary file not shown.
Binary file modified docs/build/doctrees/graphs.doctree
Binary file not shown.
Binary file modified docs/build/doctrees/index.doctree
Binary file not shown.
Binary file modified docs/build/doctrees/intro.doctree
Binary file not shown.
Binary file modified docs/build/doctrees/measures.doctree
Binary file not shown.
Binary file modified docs/build/doctrees/modules.doctree
Binary file not shown.
Binary file modified docs/build/doctrees/simulations.doctree
Binary file not shown.
Binary file modified docs/build/doctrees/tutorials/tutorial-1.doctree
Binary file not shown.
Binary file modified docs/build/doctrees/tutorials/tutorial-2.doctree
Binary file not shown.
Binary file modified docs/build/doctrees/tutorials/tutorial-3.doctree
Binary file not shown.
Binary file modified docs/build/doctrees/tutorials/tutorial-4.doctree
Binary file not shown.
Binary file modified docs/build/doctrees/tutorials/tutorial-5.doctree
Binary file not shown.
Binary file modified docs/build/doctrees/tutorials/tutorials.doctree
Binary file not shown.
Binary file modified docs/build/doctrees/utils.doctree
Binary file not shown.
2 changes: 1 addition & 1 deletion docs/build/html/.buildinfo
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# Sphinx build info version 1
# This file hashes the configuration used when building these files. When it is not found, a full rebuild will be done.
config: 9e145b46b235921e18164ac974e1a974
config: 09bf1ce093294138f0057caa940231db
tags: 645f666f9bcd5a90fca523b33c5a78b7
Binary file modified docs/build/html/_images/defense-comparison.jpg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
68 changes: 42 additions & 26 deletions docs/build/html/_sources/intro.rst.txt
Original file line number Diff line number Diff line change
@@ -1,12 +1,28 @@
:github_url: https://github.com/safreita1/TIGER

Introduction
============

``TIGER`` is a Python **T**\ oolbox for evaluat\ **I**\ ing **G**\ raph vuln\ **E**\ rability and **R**\ obustness that allows users to (1) measure graph vulnerability and robustness, (2) attack networks using a variety of offensive techniques, (3) defend a network using a variety of heuristic and optimization based defense techniques. ``TIGER`` is specifically designed to help users:
.. figure:: ../../images/tiger-logo.jpg
:width: 100 %
:align: center


``TIGER`` is a Python **T**\ oolbox for evaluat\ **I**\ ing **G**\ raph vuln\ **E**\ rability and **R**\ obustness.
TIGER contains numerous state-of-the-art methods to help users conduct graph vulnerability and robustness analysis on
graph structured data. Specifically, ``TIGER`` helps users:

- **Quantify** network vulnerability and robustness.
- **Simulate** a variety of network attacks, cascading failures and spread of dissemination of entities.
- **Augment** a network's structure to resist attacks and recover from failure.
- **Regulate** the dissemination of entities on a network (e.g., viruses, propaganda).

For additional information, take a look at our paper:

`Evaluating Graph Vulnerability and Robustness using TIGER <https://arxiv.org/pdf/2006.05648.pdf>`_.
`Freitas, Scott <https://scottfreitas.com>`_, and Chau, Duen Horng.
*arXiv, 2020.*

- Quantify network vulnerability and robustness.
- Simulate a variety of network attacks, cascading failures and spread of dissemination of entities.
- Augment a network's structure to resist attacks and recover from failure.
- Regulate the dissemination of entities on a network (e.g., viruses, propaganda).

Background & Motivation
***********************
Expand All @@ -20,27 +36,27 @@ Unfortunately, the nature of cross-disciplinary research also comes with signifi

Installation
************
To quickly get started, install TIGER using pip
To quickly get started, install TIGER using pip:

```sh
$ pip install graph-tiger
```
``pip install graph-tiger``

Alternatively, you can git clone [TIGER](https://github.com/safreita1/TIGER.git) and create a new Anaconda environment
using the provided [YAML](environment.yml) file.
Alternatively, you can git clone `TIGER <https://github.com/safreita1/TIGER.git>`_ and create a new Anaconda environment
using the provided `YAML <https://github.com/safreita1/TIGER/blob/master/environment.yml>`_ file.


Citing
******

If you find **TIGER** useful in your research, please consider citing the following paper:

@article{freitas2020evaluating,
title={Evaluating Graph Vulnerability and Robustness using TIGER},
author={Freitas, Scott and Chau, Duen Horng},
journal={arXiv preprint arXiv:2006.05648},
year={2020}
}
.. code-block:: latex

@article{freitas2020evaluating,
title = {Evaluating Graph Vulnerability and Robustness using TIGER},
author = {Freitas, Scott and Chau, Duen Horng},
journal={arXiv preprint arXiv:2006.05648},
year = {2020},
}



Examples
Expand Down Expand Up @@ -133,28 +149,28 @@ In this example, we run a cascading failure simulation on a Barabasi Albert (BA)
cascading.plot_results(results)
.. figure:: ../../images/Cascading:step=0,l=0.8,r=0.2,k_a=30,attack=rb_node,k_d=0,defense=None.jpg
.. figure:: ../../images/Cascading--step=0,l=0.8,r=0.2,k_a=30,attack=rb_node,k_d=0,defense=None.jpg
:width: 100 %
:align: center

Time step 0: shows the network under normal operating conditions.


.. figure:: ../../images/Cascading:step=6,l=0.8,r=0.2,k_a=30,attack=rb_node,k_d=0,defense=None.jpg
.. figure:: ../../images/Cascading--step=6,l=0.8,r=0.2,k_a=30,attack=rb_node,k_d=0,defense=None.jpg
:width: 100 %
:align: center

Step 5: we observe a series of failures across the network.


.. figure:: ../../images/Cascading:step=99,l=0.8,r=0.2,k_a=30,attack=rb_node,k_d=0,defense=None.jpg
.. figure:: ../../images/Cascading--step=99,l=0.8,r=0.2,k_a=30,attack=rb_node,k_d=0,defense=None.jpg
:width: 100 %
:align: center

Step 99: most of the network has collapsed.


.. figure:: ../../images/Cascading:step=100,l=0.8,r=0.2,k_a=30,attack=rb_node,k_d=0,defense=None_results.jpg
.. figure:: ../../images/Cascading--step=100,l=0.8,r=0.2,k_a=30,attack=rb_node,k_d=0,defense=None_results.jpg
:width: 100 %
:align: center

Expand Down Expand Up @@ -204,28 +220,28 @@ In this example, we run a computer virus simulation (SIS infection model) on a B
.. figure:: ../../images/SIS_epidemic:step=0,diffusion=min,method=ns_node,k=5.jpg
.. figure:: ../../images/SIS_epidemic--step=0,diffusion=min,method=ns_node,k=5.jpg
:width: 100 %
:align: center

Step 0: A highly infected network with 4 nodes "vaccinated" according to Netshield defense.


.. figure:: ../../images/SIS_epidemic:step=80,diffusion=min,method=ns_node,k=5.jpg
.. figure:: ../../images/SIS_epidemic--step=80,diffusion=min,method=ns_node,k=5.jpg
:width: 100 %
:align: center

Step 80: The computer virus begins to remit.


.. figure:: ../../images/SIS_epidemic:step=4999,diffusion=min,method=ns_node,k=5.jpg
.. figure:: ../../images/SIS_epidemic--step=4999,diffusion=min,method=ns_node,k=5.jpg
:width: 100 %
:align: center

Step 4999: The virus is nearly contained.


.. figure:: ../../images/SIS_epidemic:step=5000,diffusion=min,method=ns_node,k=5_results.jpg
.. figure:: ../../images/SIS_epidemic--step=5000,diffusion=min,method=ns_node,k=5_results.jpg
:width: 100 %
:align: center

Expand Down
1 change: 1 addition & 0 deletions docs/build/html/_sources/tutorials/tutorial-1.rst.txt
Original file line number Diff line number Diff line change
@@ -1,6 +1,7 @@
Tutorial 1: Measuring Vulnerability and Robustness
********************************************************

Robustness is defined as a measure of a network's ability to continue functioning when part of the network is naturally damaged or targeted for attack :cite`ellens2013graph,chan2016optimizing,beygelzimer2005improving`.
TIGER contains numerous robustness measures, grouped into one of three categories depending on whether the measure uses the graph, adjacency, or Laplacian matrix. In the figure below, we show some common robustness measures from each category.

.. _fig-coordsys-rect:
Expand Down
Loading

0 comments on commit 0a8d9a6

Please sign in to comment.