Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Dangalchev, Chavdar; *
Affiliations: Pactera Technologies Redmond, WA, USA, [email protected]
Correspondence: [*] Address for correspondence: 12613 SE 42nd ST, Bellevue, Wa 98006, USA.
Abstract: One of the most sensitive characteristics of network vulnerability is residual closeness. Calculating the closeness and the residual closeness of larger graphs is a time consuming and operations heavy process. In this article, we try to mitigate the process for thorn graphs - we present the thorn graphs residual closeness as a function of the closeness and the residual closeness of the original graphs.
Keywords: network vulnerability, closeness, residual closeness, thorn graph
DOI: 10.3233/FI-2018-1710
Journal: Fundamenta Informaticae, vol. 162, no. 1, pp. 1-15, 2018
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]