An efficient critical node detection algorithm
Abstract
References
Index Terms
- An efficient critical node detection algorithm
Recommendations
A Critical Node Detection Algorithm Based Node Interplay Model
Security, Privacy, and Anonymity in Computation, Communication, and StorageAbstractIdentifying critical nodes helps people to protect these nodes from attacks and prevent these critical nodes from rapidly infecting other nodes in the network with viruses. Gateway Local Rank (GLR) algorithm cannot distinguish the difference ...
Efficient heuristic algorithm for identifying critical nodes in planar networks
Highlights- The critical node problem (CNP) is NP-Hard on planar graphs.
- The objective ...
AbstractThe critical node problem (CNP) removes a limited number of nodes from a network in order to achieve the minimum pair-wise connectivity in the remaining network. In this paper, we present a heuristic algorithm for solving the CNP on ...
Angle Based Critical Nodes Detection (ABCND) for Reliable Industrial Wireless Sensor Networks
AbstractNode failure in the Wireless Sensor Networks (WSN) topology may lead to economic loss, endanger people, and cause environmental damage. Node reliability can be achieved by adequately managing network topology using structural approaches, where the ...
Comments
Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Funding Sources
- Ministry of Education Humanities and Social Sciences Research Planning Fund Project
- Foundation of State Key Laboratory of Public Big Data
- Innovation Team Project of Colleges in Guangdong Province
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 6Total Downloads
- Downloads (Last 12 months)6
- Downloads (Last 6 weeks)2
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format