Experimental Networks, starting centrality section
This commit is contained in:
parent
46d6a307ef
commit
787f35b434
1
.~lock.Formatted_Results.ods#
Normal file
1
.~lock.Formatted_Results.ods#
Normal file
@ -0,0 +1 @@
|
||||
,noah,NovaArchSys,02.05.2022 16:43,file:///home/noah/.config/libreoffice/4;
|
||||
BIN
Formatted_Results.ods
Normal file
BIN
Formatted_Results.ods
Normal file
Binary file not shown.
@ -1318,4 +1318,19 @@ of 27},
|
||||
year={2010},
|
||||
volume={432},
|
||||
pages={2181-2213}
|
||||
}
|
||||
|
||||
@article {PMID:30064421,
|
||||
Title = {A systematic survey of centrality measures for protein-protein interaction networks},
|
||||
Author = {Ashtiani, Minoo and Salehzadeh-Yazdi, Ali and Razaghi-Moghadam, Zahra and Hennig, Holger and Wolkenhauer, Olaf and Mirzaie, Mehdi and Jafari, Mohieddin},
|
||||
DOI = {10.1186/s12918-018-0598-2},
|
||||
Number = {1},
|
||||
Volume = {12},
|
||||
Month = {July},
|
||||
Year = {2018},
|
||||
Journal = {BMC systems biology},
|
||||
ISSN = {1752-0509},
|
||||
Pages = {80},
|
||||
Abstract = {<h4>Background</h4>Numerous centrality measures have been introduced to identify "central" nodes in large networks. The availability of a wide range of measures for ranking influential nodes leaves the user to decide which measure may best suit the analysis of a given network. The choice of a suitable measure is furthermore complicated by the impact of the network topology on ranking influential nodes by centrality measures. To approach this problem systematically, we examined the centrality profile of nodes of yeast protein-protein interaction networks (PPINs) in order to detect which centrality measure is succeeding in predicting influential proteins. We studied how different topological network features are reflected in a large set of commonly used centrality measures.<h4>Results</h4>We used yeast PPINs to compare 27 common of centrality measures. The measures characterize and assort influential nodes of the networks. We applied principal component analysis (PCA) and hierarchical clustering and found that the most informative measures depend on the network's topology. Interestingly, some measures had a high level of contribution in comparison to others in all PPINs, namely Latora closeness, Decay, Lin, Freeman closeness, Diffusion, Residual closeness and Average distance centralities.<h4>Conclusions</h4>The choice of a suitable set of centrality measures is crucial for inferring important functional properties of a network. We concluded that undertaking data reduction using unsupervised machine learning methods helps to choose appropriate variables (centrality measures). Hence, we proposed identifying the contribution proportions of the centrality measures with PCA as a prerequisite step of network analysis before inferring functional consequences, e.g., essentiality of a node.},
|
||||
URL = {https://europepmc.org/articles/PMC6069823},
|
||||
}
|
||||
@ -16,24 +16,30 @@
|
||||
\citation{Guo2017HermitianAM}
|
||||
\citation{Mieghem2018DirectedGA}
|
||||
\citation{Brualdi2010SpectraOD}
|
||||
\citation{noauthor_health_1996}
|
||||
\citation{PCI}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3}Difficulties of Compliance Graph Analysis}{3}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {2}Related Works}{3}{}\protected@file@percent }
|
||||
\citation{PMID:30064421}
|
||||
\@writefile{lot}{\contentsline {table}{\numberline {1}{\ignorespaces Network Properties for the Three Networks Utilized\relax }}{4}{}\protected@file@percent }
|
||||
\providecommand*\caption@xref[2]{\@setref\relax\@undefined{#1}}
|
||||
\newlabel{table:networks}{{1}{4}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3}Experimental Networks}{4}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4}Centralities}{5}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.1}Introduction}{5}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4}Centralities}{4}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.1}Introduction}{4}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.2}Degree}{5}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.3}Betweenness}{5}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4}Katz}{5}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5}K-Path Edge}{5}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.6}Adapted Page Rank}{5}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5}Transitive Closure}{5}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.1}Introduction}{5}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2}Application}{5}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6}Dominant Tree}{5}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1}Introduction}{5}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2}Application}{5}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {7}Results and Result Analysis}{5}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {8}Conclusions and Future Work}{5}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.3}Betweenness}{6}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4}Katz}{6}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5}K-Path Edge}{6}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.6}Adapted Page Rank}{6}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5}Transitive Closure}{6}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.1}Introduction}{6}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2}Application}{6}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6}Dominant Tree}{6}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1}Introduction}{6}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2}Application}{6}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {7}Results and Result Analysis}{6}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {8}Conclusions and Future Work}{6}{}\protected@file@percent }
|
||||
\bibdata{Bibliography}
|
||||
\bibcite{phillips_graph-based_1998}{1}
|
||||
\bibcite{schneier_modeling_1999}{2}
|
||||
@ -44,6 +50,9 @@
|
||||
\bibcite{ming_diss}{7}
|
||||
\bibcite{Guo2017HermitianAM}{8}
|
||||
\bibcite{Brualdi2010SpectraOD}{9}
|
||||
\bibcite{noauthor_health_1996}{10}
|
||||
\bibcite{PCI}{11}
|
||||
\bibcite{PMID:30064421}{12}
|
||||
\bibstyle{ieeetr}
|
||||
\@writefile{toc}{\contentsline {section}{Bibliography}{6}{}\protected@file@percent }
|
||||
\gdef \@abspage@last{6}
|
||||
\@writefile{toc}{\contentsline {section}{Bibliography}{7}{}\protected@file@percent }
|
||||
\gdef \@abspage@last{7}
|
||||
|
||||
@ -1,4 +1,4 @@
|
||||
\begin{thebibliography}{1}
|
||||
\begin{thebibliography}{10}
|
||||
|
||||
\bibitem{phillips_graph-based_1998}
|
||||
C.~Phillips and L.~P. Swiler, ``A graph-based system for network-vulnerability
|
||||
@ -41,4 +41,21 @@ K.~Guo and B.~Mohar, ``Hermitian adjacency matrix of digraphs and mixed
|
||||
R.~A. Brualdi, ``Spectra of digraphs,'' {\em Linear Algebra and its
|
||||
Applications}, vol.~432, pp.~2181--2213, 2010.
|
||||
|
||||
\bibitem{noauthor_health_1996}
|
||||
``Health {Insurance} {Portability} and {Accountability} {Act} of 1996.''
|
||||
\newblock Pub. L. No. 104-191. 1996 [Online]. Available:
|
||||
https://www.govinfo.gov/content/pkg/PLAW-104publ191/html/PLAW-104publ191.htm.
|
||||
|
||||
\bibitem{PCI}
|
||||
P.~S.~S. Council, ``Payment {Card} {Industry} {(PCI)} {Data} {Security}
|
||||
{Standard},'' May 2018.
|
||||
\newblock {Available:
|
||||
https://www.pcisecuritystandards.org/documents/PCI$\_$DSS$\_$v3-2-1.pdf}.
|
||||
|
||||
\bibitem{PMID:30064421}
|
||||
M.~Ashtiani, A.~Salehzadeh-Yazdi, Z.~Razaghi-Moghadam, H.~Hennig,
|
||||
O.~Wolkenhauer, M.~Mirzaie, and M.~Jafari, ``A systematic survey of
|
||||
centrality measures for protein-protein interaction networks,'' {\em BMC
|
||||
systems biology}, vol.~12, p.~80, July 2018.
|
||||
|
||||
\end{thebibliography}
|
||||
|
||||
@ -4,45 +4,45 @@ The top-level auxiliary file: Schrick-Noah_CS-7863_Final-Report.aux
|
||||
The style file: ieeetr.bst
|
||||
Database file #1: Bibliography.bib
|
||||
Warning--empty booktitle in Mieghem2018DirectedGA
|
||||
You've used 9 entries,
|
||||
You've used 12 entries,
|
||||
1876 wiz_defined-function locations,
|
||||
534 strings with 4972 characters,
|
||||
and the built_in function-call counts, 1708 in all, are:
|
||||
= -- 166
|
||||
> -- 55
|
||||
549 strings with 5647 characters,
|
||||
and the built_in function-call counts, 2222 in all, are:
|
||||
= -- 211
|
||||
> -- 83
|
||||
< -- 0
|
||||
+ -- 23
|
||||
- -- 14
|
||||
* -- 104
|
||||
:= -- 261
|
||||
add.period$ -- 12
|
||||
call.type$ -- 9
|
||||
change.case$ -- 8
|
||||
+ -- 34
|
||||
- -- 22
|
||||
* -- 138
|
||||
:= -- 337
|
||||
add.period$ -- 16
|
||||
call.type$ -- 12
|
||||
change.case$ -- 11
|
||||
chr.to.int$ -- 0
|
||||
cite$ -- 10
|
||||
duplicate$ -- 97
|
||||
empty$ -- 187
|
||||
format.name$ -- 14
|
||||
if$ -- 414
|
||||
cite$ -- 13
|
||||
duplicate$ -- 117
|
||||
empty$ -- 241
|
||||
format.name$ -- 22
|
||||
if$ -- 541
|
||||
int.to.chr$ -- 0
|
||||
int.to.str$ -- 9
|
||||
missing$ -- 7
|
||||
newline$ -- 34
|
||||
num.names$ -- 9
|
||||
pop$ -- 36
|
||||
int.to.str$ -- 12
|
||||
missing$ -- 8
|
||||
newline$ -- 45
|
||||
num.names$ -- 11
|
||||
pop$ -- 54
|
||||
preamble$ -- 1
|
||||
purify$ -- 0
|
||||
quote$ -- 0
|
||||
skip$ -- 42
|
||||
skip$ -- 55
|
||||
stack$ -- 0
|
||||
substring$ -- 60
|
||||
swap$ -- 23
|
||||
substring$ -- 64
|
||||
swap$ -- 28
|
||||
text.length$ -- 0
|
||||
text.prefix$ -- 0
|
||||
top$ -- 0
|
||||
type$ -- 0
|
||||
warning$ -- 1
|
||||
while$ -- 14
|
||||
width$ -- 10
|
||||
write$ -- 88
|
||||
while$ -- 17
|
||||
width$ -- 14
|
||||
write$ -- 114
|
||||
(There was 1 warning)
|
||||
|
||||
@ -1,4 +1,4 @@
|
||||
This is pdfTeX, Version 3.141592653-2.6-1.40.24 (TeX Live 2022/Arch Linux) (preloaded format=pdflatex 2022.4.29) 2 MAY 2022 15:13
|
||||
This is pdfTeX, Version 3.141592653-2.6-1.40.24 (TeX Live 2022/Arch Linux) (preloaded format=pdflatex 2022.4.29) 2 MAY 2022 16:54
|
||||
entering extended mode
|
||||
restricted \write18 enabled.
|
||||
%&-line parsing enabled.
|
||||
@ -317,34 +317,75 @@ n, the information
|
||||
[]
|
||||
|
||||
[2]
|
||||
Overfull \hbox (18.35255pt too wide) in paragraph at lines 43--44
|
||||
\OT1/cmr/m/n/10 adjacency matrix present in directed graphs. With undirected gr
|
||||
aphs, simplifications
|
||||
Overfull \hbox (10.74141pt too wide) in paragraph at lines 49--50
|
||||
\OT1/cmr/m/n/10 cooperation to training and administrative policies. This netwo
|
||||
rk is also progressed
|
||||
[]
|
||||
|
||||
[3] [4] [5] (./Schrick-Noah_CS-7863_Final-Report.bbl) [6
|
||||
[3]
|
||||
|
||||
]
|
||||
(./Schrick-Noah_CS-7863_Final-Report.aux) )
|
||||
LaTeX Warning: No positions in optional float specifier.
|
||||
Default added (so using `tbp') on input line 51.
|
||||
|
||||
|
||||
Overfull \hbox (14.1025pt too wide) in paragraph at lines 66--67
|
||||
\OT1/cmr/m/n/10 opportunities for compliance violation. This work discusses fiv
|
||||
e centrality measures,
|
||||
[]
|
||||
|
||||
[4] [5] [6] (./Schrick-Noah_CS-7863_Final-Report.bbl
|
||||
Underfull \hbox (badness 1237) in paragraph at lines 4--8
|
||||
[]\OT1/cmr/m/n/10 C. Phillips and L. P. Swiler, ``A graph-based system for netw
|
||||
ork-
|
||||
[]
|
||||
|
||||
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 45--48
|
||||
[]\OT1/cmr/m/n/10 ``Health Insurance Portability and Accountability Act of
|
||||
[]
|
||||
|
||||
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 45--48
|
||||
\OT1/cmr/m/n/10 1996.'' Pub. L. No. 104-191. 1996 [Online]. Available:
|
||||
[]
|
||||
|
||||
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 45--48
|
||||
\OT1/cmr/m/n/10 https://www.govinfo.gov/content/pkg/PLAW-104publ191/html/PLAW-
|
||||
[]
|
||||
|
||||
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 50--54
|
||||
[]\OT1/cmr/m/n/10 P. S. S. Council, ``Payment Card Industry (PCI)
|
||||
[]
|
||||
|
||||
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 50--54
|
||||
\OT1/cmr/m/n/10 Data Security Standard,'' May 2018. Available:
|
||||
[]
|
||||
|
||||
) [7
|
||||
|
||||
] (./Schrick-Noah_CS-7863_Final-Report.aux) )
|
||||
Here is how much of TeX's memory you used:
|
||||
5362 strings out of 478238
|
||||
96336 string characters out of 5850456
|
||||
398271 words of memory out of 5000000
|
||||
23539 multiletter control sequences out of 15000+600000
|
||||
5373 strings out of 478238
|
||||
96520 string characters out of 5850456
|
||||
398294 words of memory out of 5000000
|
||||
23550 multiletter control sequences out of 15000+600000
|
||||
473860 words of font info for 43 fonts, out of 8000000 for 9000
|
||||
1141 hyphenation exceptions out of 8191
|
||||
67i,6n,77p,1123b,191s stack positions out of 5000i,500n,10000p,200000b,80000s
|
||||
</usr/share/texmf-dist/fonts/type1/p
|
||||
ublic/amsfonts/cm/cmbx10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts
|
||||
/cm/cmbx12.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr10.pfb>
|
||||
</usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr12.pfb></usr/share/tex
|
||||
mf-dist/fonts/type1/public/amsfonts/cm/cmr17.pfb></usr/share/texmf-dist/fonts/t
|
||||
ype1/public/amsfonts/cm/cmti10.pfb>
|
||||
Output written on Schrick-Noah_CS-7863_Final-Report.pdf (6 pages, 110956 bytes)
|
||||
67i,8n,77p,1807b,289s stack positions out of 5000i,500n,10000p,200000b,80000s
|
||||
</usr/share/texmf-dist/fonts/type1
|
||||
/public/amsfonts/cm/cmbx10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfon
|
||||
ts/cm/cmbx12.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr10.pf
|
||||
b></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr12.pfb></usr/share/t
|
||||
exmf-dist/fonts/type1/public/amsfonts/cm/cmr17.pfb></usr/share/texmf-dist/fonts
|
||||
/type1/public/amsfonts/cm/cmti10.pfb>
|
||||
Output written on Schrick-Noah_CS-7863_Final-Report.pdf (7 pages, 116347 bytes)
|
||||
.
|
||||
PDF statistics:
|
||||
53 PDF objects out of 1000 (max. 8388607)
|
||||
32 compressed objects within 1 object stream
|
||||
58 PDF objects out of 1000 (max. 8388607)
|
||||
36 compressed objects within 1 object stream
|
||||
0 named destinations out of 1000 (max. 500000)
|
||||
1 words of extra memory for PDF output out of 10000 (max. 10000000)
|
||||
|
||||
|
||||
Binary file not shown.
@ -46,11 +46,26 @@ Analysis of directed graphs is not as simple as their undirected counterparts, a
|
||||
The author of \cite{ming_diss} presents three centrality measures that were applied to various attack graphs. The centrality measures implemented were Katz, K-path Edge, and Adapted PageRank. Each of these centrality measures are applicable to the directed format of attack graphs, and conclusions can be drawn regarding patching schemes for preventing exploits. As an approach for avoiding complex eigenvalues, the authors of \cite{Guo2017HermitianAM} present work examining directed, undirected, and mixed graphs using its Hermitian adjacency matrix. Other works, such as that discussed by the author of \cite{Mieghem2018DirectedGA} include mathematical manipulation of directed graph spectra (originally presented by the author of \cite{Brualdi2010SpectraOD}) with Schur's Theorem to bound eigenvalues and allow for explicit computation, which can then be used for additional analysis metrics.
|
||||
|
||||
\section{Experimental Networks}
|
||||
The work conducted in this approach
|
||||
The work conducted in this approach utilized three compliance graphs, with their properties displayed in Table \ref{table:networks}. Connectivity in this table refers to the mean degree, divided by the number of nodes in the network, multiplied by 100 to get the number in a percentage form. Network 1 is a vehicle maintenance network. This network has one car asset that is deemed ``brand new", and has no mileage. This network is examined at its current state, and progresses through time with time steps of 1 month, up to 12 months total. At each time step the car gains mileage and increases its age property, and is reexamined to evaluate its standing in regards to its vehicular regulatory maintenance schedule. Network 2 is an artificial company network that is attempting to maintain HIPAA compliance \cite{noauthor_health_1996}. This network examines its standing in relation to security properties that are required per HIPAA guidelines, as well as employee cooperation to training and administrative policies. This network is also progressed through time to illustrate the company's standing in relation to yearly audits and trainings that must be followed. Employees are also added and removed through the network at set points during the time progression process. Network 3 is another artificial company network. This company is attempting to maintain PCI DSS compliance \cite{PCI}. This network generation was static and did not progress through time. This network examined the company and its current state, and examined all changes that could occur. These changes were primarily tied to security properties such as physical break-ins on the property, firewalls being disabled, default system settings, and encryption expiration.
|
||||
|
||||
\begin{table}[]
|
||||
\centering
|
||||
\begin{tabular}{|c|c|c|c|}
|
||||
\hline
|
||||
\textbf{Network} & \textbf{Nodes} & \textbf{Edges} & \textbf{Connectivity (\%)} \\ \hline
|
||||
Car & 2491 & 12968 & 0.209 \\ \hline
|
||||
HIPAA & 2321 & 8063 & 0.150 \\ \hline
|
||||
PCI DSS & 61 & 163 & 4.381 \\ \hline
|
||||
\end{tabular}
|
||||
\caption{Network Properties for the Three Networks Utilized}
|
||||
\label{table:networks}
|
||||
\end{table}
|
||||
|
||||
\section{Centralities}
|
||||
\subsection{Introduction}
|
||||
The author of \cite{PMID:30064421} provides a survey of centrality measures, and discusses how various centrality measures have been implemented and brought forth in order to determine node importance in networks. By determining the importance of nodes, various conclusions can be drawn regarding the network. In the case of compliance graphs, conclusions can be drawn regarding the prioritization of patching or correction schemes. If one node is known to lead to the creation of many other nodes, it may be said that a patch is imperative to prevent further opportunities for compliance violation. This work discusses five centrality measures, and discusses their application to compliance graphs.
|
||||
\subsection{Degree}
|
||||
Degree centrality is a trivial, localized measure of node importance based on the number of edges that a node has. In an undirected graph, the degree centrality is predicated solely on the number of edges. However, in the case of a directed graph, a distinction is drawn with a degree centrality oriented on the number of edges coming into a node, and another measure focused on the number of edges leaving a node. Both of these cases provide useful information for compliance graphs. When a node has a large number of other nodes it points to, this node may be prioritized since it creates further room for violation. When a node has a large number of edges pointing to it, this node may be prioritized since the probability that systems may enter this state is higher due to the increased number of ways that a system could lead to this state.
|
||||
\subsection{Betweenness}
|
||||
\subsection{Katz}
|
||||
\subsection{K-Path Edge}
|
||||
|
||||
@ -5,19 +5,19 @@
|
||||
\contentsline {subsection}{\numberline {1.3}Difficulties of Compliance Graph Analysis}{3}{}%
|
||||
\contentsline {section}{\numberline {2}Related Works}{3}{}%
|
||||
\contentsline {section}{\numberline {3}Experimental Networks}{4}{}%
|
||||
\contentsline {section}{\numberline {4}Centralities}{5}{}%
|
||||
\contentsline {subsection}{\numberline {4.1}Introduction}{5}{}%
|
||||
\contentsline {section}{\numberline {4}Centralities}{4}{}%
|
||||
\contentsline {subsection}{\numberline {4.1}Introduction}{4}{}%
|
||||
\contentsline {subsection}{\numberline {4.2}Degree}{5}{}%
|
||||
\contentsline {subsection}{\numberline {4.3}Betweenness}{5}{}%
|
||||
\contentsline {subsection}{\numberline {4.4}Katz}{5}{}%
|
||||
\contentsline {subsection}{\numberline {4.5}K-Path Edge}{5}{}%
|
||||
\contentsline {subsection}{\numberline {4.6}Adapted Page Rank}{5}{}%
|
||||
\contentsline {section}{\numberline {5}Transitive Closure}{5}{}%
|
||||
\contentsline {subsection}{\numberline {5.1}Introduction}{5}{}%
|
||||
\contentsline {subsection}{\numberline {5.2}Application}{5}{}%
|
||||
\contentsline {section}{\numberline {6}Dominant Tree}{5}{}%
|
||||
\contentsline {subsection}{\numberline {6.1}Introduction}{5}{}%
|
||||
\contentsline {subsection}{\numberline {6.2}Application}{5}{}%
|
||||
\contentsline {section}{\numberline {7}Results and Result Analysis}{5}{}%
|
||||
\contentsline {section}{\numberline {8}Conclusions and Future Work}{5}{}%
|
||||
\contentsline {section}{Bibliography}{6}{}%
|
||||
\contentsline {subsection}{\numberline {4.3}Betweenness}{6}{}%
|
||||
\contentsline {subsection}{\numberline {4.4}Katz}{6}{}%
|
||||
\contentsline {subsection}{\numberline {4.5}K-Path Edge}{6}{}%
|
||||
\contentsline {subsection}{\numberline {4.6}Adapted Page Rank}{6}{}%
|
||||
\contentsline {section}{\numberline {5}Transitive Closure}{6}{}%
|
||||
\contentsline {subsection}{\numberline {5.1}Introduction}{6}{}%
|
||||
\contentsline {subsection}{\numberline {5.2}Application}{6}{}%
|
||||
\contentsline {section}{\numberline {6}Dominant Tree}{6}{}%
|
||||
\contentsline {subsection}{\numberline {6.1}Introduction}{6}{}%
|
||||
\contentsline {subsection}{\numberline {6.2}Application}{6}{}%
|
||||
\contentsline {section}{\numberline {7}Results and Result Analysis}{6}{}%
|
||||
\contentsline {section}{\numberline {8}Conclusions and Future Work}{6}{}%
|
||||
\contentsline {section}{Bibliography}{7}{}%
|
||||
|
||||
1162
results.csv
1162
results.csv
File diff suppressed because it is too large
Load Diff
Loading…
x
Reference in New Issue
Block a user