2019
DOI: 10.1155/2019/6528431
|View full text |Cite
|
Sign up to set email alerts
|

Influential Node Identification in Command and Control Networks Based on Integral k-Shell

Abstract: Influential nodes act as a hub for information transmission in a command and control network. The identification of influential nodes in a network of this nature is a significant and challenging task; however, it is necessary if the invulnerability of the network is to be increased. The existing k-shell method is problematic in that it features a coarse sorting granularity and does not consider the local centrality of nodes. Thus, the degree of accuracy with which the influential nodes can be identified is rel… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 37 publications
0
7
0
Order By: Relevance
“…Let us consider the complex network with 18 edges and 14 nodes, as shown in Figure 2. [30][31][32] In the K-shell decomposition of the above-mentioned network, degree one is assigned for Nodes I, II, IX, XIV, XII, and XIII and are removed from the network during the first iteration, which is marked in blue color. Here, all the nodes with degree one are assigned with the K-index I k ¼ 1 and again recursively check for new nodes with degree one.…”
Section: K-shell Decompositionmentioning
confidence: 99%
“…Let us consider the complex network with 18 edges and 14 nodes, as shown in Figure 2. [30][31][32] In the K-shell decomposition of the above-mentioned network, degree one is assigned for Nodes I, II, IX, XIV, XII, and XIII and are removed from the network during the first iteration, which is marked in blue color. Here, all the nodes with degree one are assigned with the K-index I k ¼ 1 and again recursively check for new nodes with degree one.…”
Section: K-shell Decompositionmentioning
confidence: 99%
“…Then, the relevant departments will take a more powerful approach to reduce the impact of negative public opinion and promote more network users believing real information, ultimately creating more immune users at the initial stage of direct immunity. Simultaneously, because opinion leaders in social networks will have an important influence on the spread of sentiment, [27,28] increasing the involvement of relevant departments should limit the spreading ability of influential communicators in the network, thus suppressing the spread.…”
Section: Interventional Force Of Relevant Departmentsmentioning
confidence: 99%
“…[24]. Wang et al proposed a method based on an integral k-shell to identify the influential nodes in a command-andcontrol network [25]. Escalante and Odehnal proposed a deterministic SIRS-type model for rumour propagation and applied it in simulations with two types of rumours: an original rumour, followed by a second counteracting rumour based on a complex network [26].…”
Section: Literature Reviewmentioning
confidence: 99%