Abstract: In this paper, the issue of modeling the transformations of information links in the architecture of cybersecurity of systems with discretionary access control on graphs using the formal ...
I believe the results of closeness centrality produces incorrect results in the undirected, weighted, not fully connected graph case. I can verify results from my algorithm with the networkX library ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results