2023
DOI: 10.1109/tcss.2022.3148778
|View full text |Cite
|
Sign up to set email alerts
|

Influential Spreaders Identification in Complex Networks With TOPSIS and K-Shell Decomposition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(1 citation statement)
references
References 56 publications
0
1
0
Order By: Relevance
“…However, the urban PT network almost conforms to the characteristics of all network models and also has the corresponding drawbacks of various models, such as the possibility of complete paralysis if a large key hub is attacked. Therefore, to quickly separate and evaluate the importance of each traffic node, the K-shell decomposition (K-shell) method is used to analyze, peel off, and classify nodes at various levels in the traffic network, thereby providing important data support and reference for the maintenance of key nodes and safety assurance plans [22]. The K-shell algorithm process is shown in Figure 3.…”
Section: A Cn and K-shell Algorithmmentioning
confidence: 99%
“…However, the urban PT network almost conforms to the characteristics of all network models and also has the corresponding drawbacks of various models, such as the possibility of complete paralysis if a large key hub is attacked. Therefore, to quickly separate and evaluate the importance of each traffic node, the K-shell decomposition (K-shell) method is used to analyze, peel off, and classify nodes at various levels in the traffic network, thereby providing important data support and reference for the maintenance of key nodes and safety assurance plans [22]. The K-shell algorithm process is shown in Figure 3.…”
Section: A Cn and K-shell Algorithmmentioning
confidence: 99%