CN108965287B - Virus propagation control method based on limited temporary edge deletion - Google Patents

Virus propagation control method based on limited temporary edge deletion Download PDF

Info

Publication number
CN108965287B
CN108965287B CN201810745673.8A CN201810745673A CN108965287B CN 108965287 B CN108965287 B CN 108965287B CN 201810745673 A CN201810745673 A CN 201810745673A CN 108965287 B CN108965287 B CN 108965287B
Authority
CN
China
Prior art keywords
network
edge
nodes
deletion
cell
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810745673.8A
Other languages
Chinese (zh)
Other versions
CN108965287A (en
Inventor
李黎
张瑞芳
杜娜娜
柳寰宇
张立臣
李鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shaanxi Normal University
Original Assignee
Shaanxi Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shaanxi Normal University filed Critical Shaanxi Normal University
Priority to CN201810745673.8A priority Critical patent/CN108965287B/en
Publication of CN108965287A publication Critical patent/CN108965287A/en
Application granted granted Critical
Publication of CN108965287B publication Critical patent/CN108965287B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A virus propagation control method based on finite temporary deletion edge constructs a virus propagation model, and establishes a susceptible-susceptible virus propagation model based on cellular automata; giving a network graph G (N, E), initializing an adjacent matrix A (t) of the network at the time t, and selecting m% of nodes as initial infection sources; utilizing a community structure discovery algorithm to obtain a deletion order based on the whole network edge betweenness; determining the number of edge deletion to be k% by using a breadth-first search algorithm, wherein k is a finite positive integer; temporarily deleting an edge meeting the condition according to the edge betweenness deletion sequence; repeating the previous step until the temporary edge deletion proportion is k%; the invention has the advantages of simplicity, effectiveness and obvious reduction of the virus transmission speed and the infection scale.

Description

Virus propagation control method based on limited temporary edge deletion
Technical Field
The invention belongs to the technical field of computers, and particularly relates to a virus propagation control method based on limited temporary edge deletion.
Background
With the continuous development and development of the research on the complex network theory, more and more researchers pay attention to the dynamics of virus transmission on the complex network, such as virus transmission on computer network, rumor on social network, public opinion transmission, and disease transmission in biological network.
In real life, each individual has a behavior of being driving towards profit and avoiding harm, and as for nodes in the network, the individuals can avoid contacting infected nodes by changing the network structure. Thus, the topology of the network is no longer static.
In the research of Roc and the like, the edges directly connected with the important nodes or the edges between any two important nodes and the common neighbor nodes are immunized according to the relationship between the edges and the important nodes. Shaw et al and Gross et al both believe that when an infected node exists in the network, the vulnerable node will choose to disconnect from the infected node, and reselect a non-neighboring healthy node to connect with it to protect itself from infection. Risau-Gusman et al also studied the transmission behavior of the virus under various reconnecting methods. Later, Song Yurong et al in the course of research have demonstrated that the reconnecting method has an inhibitory effect on viral transmission. Cao Yulin et al analyzed the method proposed by Song Yurong et al and proposed a reconnection method based on shortest path and node degree. However, most of the existing optimization methods for controlling virus propagation all use edge deletion reconnection to control, but the cost of edge deletion reconnection is higher than that of only edge deletion, the realization is also more complicated, and limited resource constraints are not considered.
Disclosure of Invention
The invention aims to provide a virus propagation control method based on limited temporary deletion edge, which is simple, effective and capable of obviously reducing the virus propagation speed and the infection scale.
The technical scheme for solving the technical problems is as follows: a virus propagation control method based on limited temporary edge deletion comprises the following steps:
(1) construction of a Virus propagation model
Establishing a susceptible-susceptible virus propagation model based on a cellular automaton;
(2) giving a network graph G (N, E), wherein N represents a set of all nodes in the network, E represents a set of edges among all nodes in the network, initializing an adjacent matrix A (t) of the network at the time t, selecting m% of nodes as initial infection sources, and m is a finite positive integer;
(3) utilizing a community structure discovery algorithm to obtain a deletion order based on the whole network edge betweenness;
(4) determining the number of edge deletion to be k% by using a breadth-first search algorithm, wherein k is a finite positive integer;
(5) temporarily deleting an edge meeting the condition according to the edge betweenness deletion sequence obtained in the step (3);
(6) repeating the step (5) until the temporary edge deletion proportion is k%;
as a preferred technical solution, in the step (1), the nodes in the network are used as cells, the network including N nodes is a cellular automaton including N cells, N is a finite positive integer, and a susceptible-susceptible virus propagation model established according to four elements of the cellular automaton is:
cell space C: establishing a one-dimensional cellular space containing N cells at an initial moment;
finite state set Q: the states of the corresponding cells of the nodes are divided into a chromophil state and an infection state, which are respectively represented by 0 and 1, and a state set Q is {0, 1 }; si(t) is the state variable of the cell i at time t, Si(t) is equal to Q, then there is
Figure BDA0001724301840000021
Cell neighborhood V: the network adjacency matrix A (t) is the relation between each cell neighbor in the cell space, the neighbor of the cell i at the time t is the element set with all values of 1 in the ith row in A (t), alphaij=1,αije.A (t) is the edge where there is a connection between cell i and cell j, and αii=αjj=0;
Cell state transition rule function δ: at each time t, the infected node infects neighboring nodes around the infected node with a probability beta, and the infected node is recovered to be a healthy node with a probability alpha, and the state transition function between the infected node and the healthy node is as follows:
Figure BDA0001724301840000031
in the formula, an upper horizontal line is an inversion operation, and g is a state transition judgment function between an infected node and an susceptible node;
the proportion of infected nodes at the time t is I (t),
Figure BDA0001724301840000032
when the proportion of healthy nodes at time t is s (t), at any time i (t) and s (t), i (t) + s (t) ═ 1 is satisfied.
As a preferred technical solution, the function for judging state transition between the infected node and the susceptible node
Figure BDA0001724301840000033
Wherein α represents a recovery rate, β represents an infection rate, γ is a random number between (0,1), and SjAnd (t) is the state variable of the unit cell j at the time t.
As a preferred technical scheme, the positions of m% nodes and the value of m are randomly selected.
The invention has the following beneficial effects:
compared with the prior art, the method has the advantages that the cost is low, the implementation is easy, and the virus propagation speed and the infection scale can be obviously reduced; the invention is a virus propagation control method irrelevant to the initial infection source, and can ensure that the basic functions of a network system are not influenced under the condition of temporarily deleting a limited number of edges. The method is simple and effective, has low cost and overhead, and can be used as a general optimization control method to be applied to the fields of public opinion network propagation control, traffic network congestion management and the like.
Drawings
FIG. 1 is a flowchart of a virus propagation control method based on limited temporary edge deletion according to the present invention.
FIG. 2 is a model of transmission of a susceptible-susceptible virus of the present invention.
Fig. 3 is a graph of the results of a simulation experiment of the infection rate of a small-scale actual network as a function of time.
FIG. 4 is a graph of simulation experiment results of WS networks' infection rates over time.
Fig. 5 is a diagram showing the results of a simulation experiment in which the average path length of a small-scale actual network varies with the number of punctured edges.
Fig. 6 is a graph of simulation experiment results of WS network average path length variation with number of punctured edges.
FIG. 7 is a diagram showing simulation experiment results of the change of the proportion of nodes in the maximum connected subgraph of the small-scale practical network along with the number of deleted edges.
FIG. 8 is a graph of simulation experiment results of the change of the proportion of nodes in the maximum connected subgraph of the WS network with the number of deleted edges.
Detailed Description
The present invention will be described in further detail below with reference to the drawings and examples, but the present invention is not limited to the embodiments described below.
In fig. 1, a virus propagation control method based on finite temporary edge deletion in this embodiment includes the following steps:
(1) establishing an SIS virus propagation model of susceptibility-infection-susceptibility based on a cellular automaton, as shown in figure 2;
the cellular automata CA is a simplified model and can simulate a dynamic system with internal interaction, and mainly comprises four major elements, namely a cell space C, a finite state set Q, a cell neighborhood V and a cell state conversion rule function delta, and is expressed as CA (C, Q, V, delta);
a network system is generally represented by a network graph G (N, E), where N is a set of all nodes in a network, E is a set of edges between all nodes in the network, and taking nodes in the network system as cells, the network including N nodes is a cellular automaton including N cells, N is a finite positive integer, and an SIS virus propagation model established according to four elements of the cellular automaton is:
cell space C: establishing a one-dimensional cellular space containing N cells at an initial moment;
finite state set Q: the states of the corresponding cells of the nodes are divided into a chromophil state and an infection state, which are respectively represented by 0 and 1, and a state set Q is {0, 1 }; si(t) is the state variable of the cell i at time t, Si(t) is equal to Q, then there is
Figure BDA0001724301840000051
Cell neighborhood V: the network adjacency matrix A (t) is the relation between each cell neighbor in the cell space, the neighbor of the cell i at the time t is the element set with all values of 1 in the ith row in A (t), alphaij=1,αije.A (t) is the edge where there is a connection between cell i and cell j, and αii=αjj=0;
Cell state transition rule function δ: at each time t, the infected node infects neighboring nodes around the infected node with the probability of beta, and the infected node is recovered to be a healthy node with the probability of alpha, and the state transition function between the infected node and the healthy node is as follows:
Figure BDA0001724301840000052
in the formula, the upper horizontal line is an inverting operation, g is a state transition judgment function between an infected node and an susceptible node, and the state transition judgment function g between the infected node and the susceptible node is as follows:
Figure BDA0001724301840000053
wherein α represents a recovery rate, β represents an infection rate, γ is a random number between (0,1), and Sj(t) is the state variable of the cell j at the time t;
the proportion of infected nodes at the time t is I (t),
Figure BDA0001724301840000054
when the proportion of healthy nodes at the time t is S (t), I (t) and S (t) meet I (t) + S (t) ═ 1 at any time;
(2) giving a network graph G (N, E), wherein N represents a set of all nodes in a network, E represents a set of edges among all nodes in the network, initializing an adjacent matrix A (t) of the network at the time t, selecting m% of nodes as initial infection sources, and randomly selecting values of m and positions of the nodes;
(3) by utilizing a community structure discovery algorithm, a deletion order based on the whole network edge betweenness is obtained, and the method specifically comprises the following steps:
a. calculating the edge betweenness of each edge;
b. deleting the side with the largest edge betweenness;
c. recalculating edge betweenness of the rest edges in the network;
d. and (c) repeating the step (b) and the step (c) until the edge deletion sequence of the edge betweenness in the whole network is calculated.
(4) Determining the number of edge deletion to be k% by using a breadth-first search algorithm, wherein k is a finite positive integer;
in the process of temporary edge deletion, in order to ensure that the basic functions of the network are not influenced, the network functions are reflected through network connectivity, the change condition of the maximum connected subgraph scale in the network along with the increase of the number of temporary edge deletions is counted by using a breadth-first search algorithm, and the number k% of limited temporary edge deletions is further determined under the condition of meeting the requirement of given network connectivity;
(5) temporarily deleting an edge meeting the condition according to the edge betweenness deletion sequence obtained in the step (3);
(6) and (5) repeating the step until the temporary edge deletion ratio is k%.
In order to verify the beneficial effects of the invention, the inventor carries out simulation experiments, and the experimental conditions are as follows:
experiment 1
An actual small-world network containing 34 nodes, namely a Zachary empty hand club network and a medium-small-scale WS network containing 200 nodes are selected, based on the SIS virus propagation model in the embodiment, the propagation parameter recovery rate alpha and the infection rate beta in a simulation experiment are respectively set to be alpha 0.8 and beta 0.4, the initial infected node is 4% of the total randomly selected nodes, the temporary edge deletion number is less than 15%, and the temporary edge deletion number is determined on the premise of ensuring that the basic functions of the network are not influenced. In the simulation experiments, each curve value represents the average of 100 runs.
The network scale of fig. 3 is 34, that is, N is 34, the number of simulation steps is 25, the network scale of fig. 4 is 200, that is, N is 200, and the number of simulation steps is 50; fig. 3 and 4 show the variation trend of the proportion i (t) of the infected nodes in the network system under the control of different edge deletion methods as time t increases, and it can be known from the data analysis in the figure that:
(1) from the aspect of virus propagation speed, compared with a method without edge deletion, the method using random edge deletion and node degree edge deletion and the limited temporary edge deletion can slow down the propagation speed of the virus, but the effect of reducing the infection rate is most obvious;
(2) compared with other deletion methods, the invention has obvious advantages in inhibiting the spread of viruses from the scale of virus infection;
(3) whether the small-scale network comprising 34 nodes is shown in figure 3, or the small-scale network comprising 200 nodes is shown in figure 4, the invention can reduce the propagation speed of the virus, control the scale of the infected node, and verify the feasibility and the effectiveness of the method.
Experiment 2
In order to examine the influence of the limited temporary edge deletion method on the network structure in the process of controlling virus propagation, the inventor performs the following experiments:
selecting the average path length L of the network structure property evaluation index to compare and analyze the performance change of the network structure under different edge deletion control methods, wherein the network average path length L is defined as the average value of the distance between any two nodes, and is:
Figure BDA0001724301840000071
in which N represents the number of nodes in the network, dijRepresenting the shortest path distance between a node i and a node j in the network; in order to avoid such divergence problem, the network average path length is further defined as an average value of distances between pairs of nodes where communication paths exist in the experiment, because the shortest path between two points may not exist, thereby resulting in an infinite average path length of the entire network.
With the increase of the number of edge deletion, the random edge deletion and the node degree edge deletion and the influence of the limited temporary edge deletion method on the average path length of the small-scale actual small-world characteristic network, as shown in fig. 5, compared with the random edge deletion and the effect of the node degree edge deletion method on the increase of the average path length of the network, the influence of the limited temporary edge deletion method on the increase of the average path length of the network is the most obvious.
With the increase of the number of edge deletion, the influence of three control methods of random edge deletion, node degree edge deletion and the limited temporary edge deletion method on the average path length of the WS network with a small scale is shown in fig. 6.
Experiment 3
Considering the constraint of the edge deletion resources/cost, the experiment optimizes the temporary edge deletion resources, and how to optimize the limited edge deletion resource set so as to obtain the high performance of virus propagation control as much as possible is the aim of the temporary edge deletion resource optimization.
It is very important to maintain the connectivity of the network because edges are removed/managed from the network graph, which usually affects the degree of connection between the network transmission and the nodes, and even destroys the connectivity of the network, which is an important factor affecting the network structure. Experience and empirical research shows that many actual large-scale networks are not communicated, but a large communication slice often exists and contains nodes in a relative proportion in the whole network.
In the actual small-world network and WS network diagram, the maximum connected subgraph scale changes with the increase of the number of deleted edges, as shown in fig. 7 and 8, and as can be seen from data analysis in fig. 7 and 8, when the number of deleted edges is less than 15%, the invention can ensure that the connectivity of the network reaches at least 85%, so that not only can the propagation speed of the virus be well inhibited, but also the propagation scale of the virus be reduced, and the basic function of the network can be ensured not to be affected. Thus, controlling the number of temporary edges pruned by the connectivity of the network not only does the basic functionality of the network not suffer, but also takes into account the limited resources.

Claims (3)

1. A virus propagation control method based on limited temporary edge deletion is characterized by comprising the following steps:
(1) construction of a Virus propagation model
Establishing a susceptible-susceptible virus propagation model based on a cellular automaton;
(2) giving a network graph G (N, E), wherein N represents a set of all nodes in the network, E represents a set of edges among all nodes in the network, initializing an adjacent matrix A (t) of the network at the time t, selecting m% of nodes as initial infection sources, and m is a finite positive integer;
(3) by utilizing a community structure discovery algorithm, a deletion order based on the whole network edge betweenness is obtained, and the method specifically comprises the following steps:
a. calculating the edge betweenness of each edge;
b. deleting the side with the largest edge betweenness;
c. recalculating edge betweenness of the rest edges in the network;
d. repeating the step b and the step c until the edge deletion sequence of the edge betweenness in the whole network is calculated;
(4) determining the number of edge deletion to be k% by using a breadth-first search algorithm, wherein k is a finite positive integer;
in the process of temporary edge deletion, in order to ensure that the basic functions of the network are not influenced, the network functions are reflected through network connectivity, the change condition of the maximum connected subgraph scale in the network along with the increase of the number of temporary edge deletions is counted by using a breadth-first search algorithm, and the number k% of limited temporary edge deletions is further determined under the condition of meeting the requirement of given network connectivity;
(5) temporarily deleting an edge meeting the condition according to the edge betweenness deletion sequence obtained in the step (3);
(6) and (5) repeating the step until the temporary edge deletion ratio is k%.
2. The method of claim 1, wherein the virus propagation control method based on the limited temporary edge deletion comprises: in the step (1), the nodes in the network are used as the cells, the network comprising N nodes is the cellular automaton comprising N cells, N is a finite positive integer, and the susceptibility-virus propagation model established according to the four elements of the cellular automaton is as follows:
cell space C: establishing a one-dimensional cellular space containing N cells at an initial moment;
finite state set Q: the states of the corresponding cells of the nodes are divided into a chromophil state and an infection state, which are respectively represented by 0 and 1, and a state set Q is {0, 1 }; si(t) is the state variable of the cell i at time t, Si(t) is equal to Q, then there is
Figure FDA0002736438050000021
Cell neighborhood V: the network adjacency matrix A (t) is the relation between each cell neighbor in the cell space, the neighbor of the cell i at the time t is the element set with all values of 1 in the ith row in A (t), alphaij=1,αije.A (t) is the edge where there is a connection between cell i and cell j, and αii=αjj=0;
Cell state transition rule function δ: at each time t, the infected node infects neighboring nodes around the infected node with a probability beta, and the infected node is recovered to be a healthy node with a probability alpha, and the state transition function between the infected node and the healthy node is as follows:
Figure FDA0002736438050000022
in the formula, the upper horizontal line is an inverting operation, g is a state transition judgment function between an infected node and an susceptible node, and the state transition judgment function g between the infected node and the susceptible node is as follows:
Figure FDA0002736438050000023
wherein α represents a recovery rate, β represents an infection rate, γ is a random number between (0,1), and Sj(t) is the state variable of the cell j at the time t;
the proportion of infected nodes at the time t is I (t),
Figure FDA0002736438050000031
when the proportion of healthy nodes at time t is s (t), at any time i (t) and s (t), i (t) + s (t) ═ 1 is satisfied.
3. The method of claim 1, wherein the virus propagation control method based on the limited temporary edge deletion comprises: the positions of m% nodes and the value of m are randomly selected.
CN201810745673.8A 2018-07-09 2018-07-09 Virus propagation control method based on limited temporary edge deletion Active CN108965287B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810745673.8A CN108965287B (en) 2018-07-09 2018-07-09 Virus propagation control method based on limited temporary edge deletion

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810745673.8A CN108965287B (en) 2018-07-09 2018-07-09 Virus propagation control method based on limited temporary edge deletion

Publications (2)

Publication Number Publication Date
CN108965287A CN108965287A (en) 2018-12-07
CN108965287B true CN108965287B (en) 2021-04-13

Family

ID=64482467

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810745673.8A Active CN108965287B (en) 2018-07-09 2018-07-09 Virus propagation control method based on limited temporary edge deletion

Country Status (1)

Country Link
CN (1) CN108965287B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110826003B (en) * 2019-11-01 2022-05-17 陕西师范大学 Illegal or harmful network information propagation control method based on edge deletion cluster
CN113726802B (en) * 2021-09-02 2023-02-03 中国人民解放军国防科技大学 Network virus propagation analysis method, device, computer equipment and medium
CN114494643B (en) * 2022-01-11 2024-02-23 西北工业大学 Disease transmission control method based on network division

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103902547A (en) * 2012-12-25 2014-07-02 深圳先进技术研究院 Increment type dynamic cell fast finding method and system based on MDL
CN104734870A (en) * 2013-12-19 2015-06-24 南京理工大学 Software fault spreading method based on cellular automaton
CN106455138A (en) * 2016-11-23 2017-02-22 天津大学 Wireless sensor network security patch distributing method based on cellular automaton

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103902547A (en) * 2012-12-25 2014-07-02 深圳先进技术研究院 Increment type dynamic cell fast finding method and system based on MDL
CN104734870A (en) * 2013-12-19 2015-06-24 南京理工大学 Software fault spreading method based on cellular automaton
CN106455138A (en) * 2016-11-23 2017-02-22 天津大学 Wireless sensor network security patch distributing method based on cellular automaton

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Adaptive coevolutionary;Gross T;《Adaptive Journal of the Royal Society》;20080331;全文 *
基于一维元胞自动机的复杂网络恶意软件传播研究;宋玉蓉;《物理学报》;20090930;全文 *
复杂网络中节点影响力挖掘及其应用研究;刘影;《电子科技大学博士学位论文》;20180115;全文 *

Also Published As

Publication number Publication date
CN108965287A (en) 2018-12-07

Similar Documents

Publication Publication Date Title
He et al. Modeling propagation dynamics and developing optimized countermeasures for rumor spreading in online social networks
CN103699606B (en) A kind of large-scale graphical partition method assembled with community based on summit cutting
CN107682195B (en) Communication network robustness evaluation method based on combination of complex network and big data
CN108965287B (en) Virus propagation control method based on limited temporary edge deletion
CN107092984B (en) Network function end node propagation prediction method based on cascade failure
CN107517201B (en) Network vulnerability identification method based on time sequence removal
CN106411904B (en) A kind of network risks control method based on microstate prediction
CN107274669B (en) Urban road traffic network entropy calculation method and system based on shortest path
CN111428323A (en) Method for identifying group of key nodes by using generalized discount degree and k-shell in complex network
CN109064348A (en) A method of it blocking rumour community in social networks and inhibits gossip propagation
CN113190939B (en) Large sparse complex network topology analysis and simplification method based on polygon coefficient
CN113422695B (en) Optimization method for improving robustness of topological structure of Internet of things
WO2019014894A1 (en) Link prediction method and device
CN105245362A (en) SDN (Software Defined Network) environment important node information acquisition method
CN109728955A (en) Based on the network node sort method for improving k-shell
CN111612641A (en) Method for identifying influential user in social network
Jia et al. An improvement method for degree and its extending centralities in directed networks
Chen et al. Optimal curing strategy for competing epidemics spreading over complex networks
Lu et al. Measuring and improving communication robustness of networks
CN113052713B (en) Negative information cascade blocking method based on sensitive node immunity
Deng et al. Efficient measurement model for critical nodes based on edge clustering coefficients and edge betweenness
CN107241222B (en) Network topology calibration method
CN116340593A (en) Complex network high-order structure importance degree identification method
Dai et al. Identifying influential nodes by leveraging redundant ties
CN115665082A (en) Social network key node identification method and system based on information entropy improvement

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant