Author of the publication

Identifying Influential Spreaders in Complex Networks Based on Degree Centrality.

, , , , and . WISA, volume 13579 of Lecture Notes in Computer Science, page 314-326. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

USBE: User-similarity based estimator for multimedia cold-start recommendation., , , and . Multim. Tools Appl., 83 (1): 1127-1142 (January 2024)Index-Based Load Shedding for Streaming Sliding Window Joins., , and . ICIC (3), volume 2 of Communications in Computer and Information Science, page 162-170. Springer, (2007)Security Feature Measurement for Frequent Dynamic Execution Paths in Software System., , , , , and . Secur. Commun. Networks, (2018)An approach for predicting multiple-type overflow vulnerabilities based on combination features and a time series neural network algorithm., , , , , and . Comput. Secur., (2022)A fast all-packets-based DDoS attack detection approach based on network graph and graph kernel., , , , , and . J. Netw. Comput. Appl., (2021)DetAC: Approach to Detect Access Control Vulnerability in Web Application Based on Sitemap Model with Global Information Representation., , , , , , , and . Int. J. Softw. Eng. Knowl. Eng., 33 (9): 1327-1354 (September 2023)DMP_MI: An Effective Diabetes Mellitus Classification Algorithm on Imbalanced Data With Missing Values., , , , , and . IEEE Access, (2019)Representative points clustering algorithm based on density factor and relevant degree., , and . Int. J. Machine Learning & Cybernetics, 8 (2): 641-649 (2017)An Empirical Study on Predicting Blood Pressure Using Classification and Regression Trees., , , , and . IEEE Access, (2018)An Approach for Database Intrusion Detection Based on the Event Sequence Clustering., , , and . NCM, page 584-588. IEEE Computer Society, (2009)