Worst-case scenarios for greedy, centrality-based network protection strategies | IEEE Conference Publication | IEEE Xplore