Weakening Covert Networks by Minimizing Inverse Geodesic Length
暂无分享,去创建一个
[1] Michael R. Fellows,et al. Fundamentals of Parameterized Complexity , 2013 .
[2] Pim van 't Hof,et al. On the Computational Complexity of Vertex Integrity and Component Order Connectivity , 2014, Algorithmica.
[3] John T. Saccoman,et al. A Survey of Component Order Connectivity Models of Graph Theoretic Networks , 2013 .
[4] Fedor V. Fomin,et al. Algorithms Parameterized by Vertex Cover and Modular Width, Through Potential Maximal Cliques , 2014, Algorithmica.
[5] Yicheng Zhang,et al. Identifying influential nodes in complex networks , 2012 .
[6] Rafael Amer,et al. A connectivity game for graphs , 2004, Math. Methods Oper. Res..
[7] Hernán A. Makse,et al. Influence maximization in complex networks through optimal percolation , 2015, Nature.
[8] John E. Hopcroft,et al. Complexity of Computer Computations , 1974, IFIP Congress.
[9] Michael Lampis,et al. Algorithmic Meta-theorems for Restrictions of Treewidth , 2010, Algorithmica.
[10] Guofei Gu,et al. A Taxonomy of Botnet Structures , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[11] Richard M. Karp,et al. Reducibility Among Combinatorial Problems , 1972, 50 Years of Integer Programming.
[12] Albert-László Barabási,et al. Destruction perfected , 2015, Nature.
[13] Ivan Belik,et al. The Analysis of Split Graphs in Social Networks Based on the K-Cardinality Assignment Problem , 2014 .
[14] John Dunagan,et al. Active Graph Reachability Reduction for Network Security and Software Engineering , 2011, IJCAI.
[15] Talal Rahwan,et al. Strategic Social Network Analysis , 2017, AAAI.
[16] Robert Ganian,et al. Improving Vertex Cover as a Graph Parameter , 2015, Discret. Math. Theor. Comput. Sci..
[17] Beom Jun Kim,et al. Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[18] Robert Ganian,et al. Using Neighborhood Diversity to Solve Hard Problems , 2012, ArXiv.
[19] Reinhard Diestel,et al. Graph Theory , 1997 .
[20] Talal Rahwan,et al. Efficient algorithms for game-theoretic betweenness centrality , 2016, Artif. Intell..
[21] Nicholas R. Jennings,et al. Computational Analysis of Connectivity Games with Applications to the Investigation of Terrorist Networks , 2013, IJCAI.
[22] E. Griffor,et al. Computational Complexity Theory , 2022 .
[23] L. Christophorou. Science , 2018, Emerging Dynamics: Science, Energy, Society and Values.
[24] Leizhen Cai,et al. Parameterized Complexity of Cardinality Constrained Optimization Problems , 2008, Comput. J..
[25] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[26] R. Rosenfeld. Nature , 2009, Otolaryngology--head and neck surgery : official journal of American Academy of Otolaryngology-Head and Neck Surgery.
[27] Herbert Hamers,et al. Cooperative game theoretic centrality analysis of terrorist networks: The cases of Jemaah Islamiyah and Al Qaeda , 2013, Eur. J. Oper. Res..
[28] K. Brown,et al. Graduate Texts in Mathematics , 1982 .
[29] Mikkel Thorup,et al. Undirected single-source shortest paths with positive integer weights in linear time , 1999, JACM.
[30] Michal Pilipczuk,et al. Parameterized Algorithms , 2015, Springer International Publishing.
[31] Kathleen M. Carley,et al. Destabilizing Terrorist Networks , 1998 .
[32] Michael R. Fellows,et al. Graph Layout Problems Parameterized by Vertex Cover , 2008, ISAAC.
[33] Ge Xia,et al. Improved upper bounds for vertex cover , 2010, Theor. Comput. Sci..
[34] Oskar Skibski,et al. Defeating Terrorist Networks with Game Theory , 2015, IEEE Intelligent Systems.