A method of fast locating the key nodes based on the distribution law of node's propagation domain

Xiaolin Zhao, Meijing Wu, Qi Zhang, Jingfeng Xue, Yiman Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this paper, we select the key nodes from the software network by selecting the propagation domain as the standard and propose a method of fast locating key nodes based on the distribution law of node's propagation domain. Firstly, a reasonable sample node is used to quickly obtain the critical propagation domain threshold as a screening criterion. And filtering the key nodes with this threshold can significantly reduce the total traversal workload. In order to further reduce workload, this paper proposes a filtering method of critical nodes that threshold is based on the number of packets that the nodes can affect. After a number of experiments, the result shows that the proposed method can effectively reduce the traversal workload of locating key nodes.

Original languageEnglish
Title of host publicationProceedings - 2018 IEEE 3rd International Conference on Data Science in Cyberspace, DSC 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages902-909
Number of pages8
ISBN (Electronic)9781538642108
DOIs
Publication statusPublished - 16 Jul 2018
Event3rd IEEE International Conference on Data Science in Cyberspace, DSC 2018 - Guangzhou, Guangdong, China
Duration: 18 Jun 201821 Jun 2018

Publication series

NameProceedings - 2018 IEEE 3rd International Conference on Data Science in Cyberspace, DSC 2018

Conference

Conference3rd IEEE International Conference on Data Science in Cyberspace, DSC 2018
Country/TerritoryChina
CityGuangzhou, Guangdong
Period18/06/1821/06/18

Keywords

  • Key nodes
  • NODE'S propagation domain
  • The number of packages that the node can affect

Fingerprint

Dive into the research topics of 'A method of fast locating the key nodes based on the distribution law of node's propagation domain'. Together they form a unique fingerprint.

Cite this