2020
DOI: 10.1007/s10878-020-00570-8
|View full text |Cite
|
Sign up to set email alerts
|

Secure domination of honeycomb networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…But, if there is an intruder which accesses the network not through its vertices, but by using some connections between them (edges), then such intruder could not be identified, and in this sense, the surveillance fails in its commitment and some extra property is required in the network to be used effectively for this purpose [38]. The honeycomb and hexagonal networks along with the security are studied in [39]. Hence, such limitation can cause a major disadvantage from the application point of view.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…But, if there is an intruder which accesses the network not through its vertices, but by using some connections between them (edges), then such intruder could not be identified, and in this sense, the surveillance fails in its commitment and some extra property is required in the network to be used effectively for this purpose [38]. The honeycomb and hexagonal networks along with the security are studied in [39]. Hence, such limitation can cause a major disadvantage from the application point of view.…”
Section: Background and Related Workmentioning
confidence: 99%
“…In order to prove this, the concept of the co-ordinate system of the hexagonal network is presented as adapted by Nocetti et al [39]. He introduced the three axes, X , Y and Z at an angle of 120 along the sides of any triangle within a hexagonal network as shown in the Fig.…”
Section: Edge Metric Dimension Of the Hexagonal Networkmentioning
confidence: 99%
“…A secure dominating set in is a set which is both a secure set and also a dominating set in . The secure domination number of is [ 2 , 4 ]. For a graph in Fig.…”
Section: Preliminariesmentioning
confidence: 99%
“…He examined numerous facets of this notion and its applications in graph theory. This metric finds utility in diverse domains, encompassing network architecture [3], facility placement [4], and network efficiency and security challenges [5]. Determining the domination number of a graph is frequently a pivotal stage in resolving optimization problems within graph theory [6].…”
Section: Introductionmentioning
confidence: 99%