2023
DOI: 10.4018/ijdcf.317100
|View full text |Cite
|
Sign up to set email alerts
|

Key Node Identification Based on Vulnerability Life Cycle and the Importance of Network Topology

Abstract: The key network node identification technology plays an important role in comprehending unknown terrains and rapid action planning in network attack and defense confrontation. The conventional key node identification algorithm only takes one type of relationship into consideration; therefore, it is incapable of representing the characteristics of multiple relationships between nodes. Additionally, it typically disregards the periodic change law of network node vulnerability over time. In order to solve the abo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 14 publications
(13 reference statements)
0
0
0
Order By: Relevance
“…Select function impact, impact scope, and business safety zone to evaluate the importance of power grid impact. The State Grid of Southern China and experts have stipulated specific quantitative rules [5] .…”
Section: Evaluation Indexmentioning
confidence: 99%
“…Select function impact, impact scope, and business safety zone to evaluate the importance of power grid impact. The State Grid of Southern China and experts have stipulated specific quantitative rules [5] .…”
Section: Evaluation Indexmentioning
confidence: 99%