{"id":"https://openalex.org/W2551125584","doi":"https://doi.org/10.1142/s012905411650026x","title":"Neighbor Rupture Degree of Harary Graphs","display_name":"Neighbor Rupture Degree of Harary Graphs","publication_year":2016,"publication_date":"2016-09-01","ids":{"openalex":"https://openalex.org/W2551125584","doi":"https://doi.org/10.1142/s012905411650026x","mag":"2551125584"},"language":"en","primary_location":{"id":"doi:10.1142/s012905411650026x","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s012905411650026x","pdf_url":null,"source":{"id":"https://openalex.org/S68047077","display_name":"International Journal of Foundations of Computer Science","issn_l":"0129-0541","issn":["0129-0541","1793-6373"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Foundations of Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042903667","display_name":"Ferhan Nihan Altundag","orcid":null},"institutions":[{"id":"https://openalex.org/I16748637","display_name":"Manisa Celal Bayar University","ror":"https://ror.org/053f2w588","country_code":"TR","type":"education","lineage":["https://openalex.org/I16748637"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Ferhan Nihan Altundag","raw_affiliation_strings":["Department of Mathematics, Manisa Celal Bayar University, Turkey"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Manisa Celal Bayar University, Turkey","institution_ids":["https://openalex.org/I16748637"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083670283","display_name":"G\u00f6k\u015fen Bacak-Turan","orcid":"https://orcid.org/0000-0001-6935-4841"},"institutions":[{"id":"https://openalex.org/I16748637","display_name":"Manisa Celal Bayar University","ror":"https://ror.org/053f2w588","country_code":"TR","type":"education","lineage":["https://openalex.org/I16748637"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Goksen Bacak-Turan","raw_affiliation_strings":["Department of Mathematics, Manisa Celal Bayar University, Turkey"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Manisa Celal Bayar University, Turkey","institution_ids":["https://openalex.org/I16748637"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5083670283"],"corresponding_institution_ids":["https://openalex.org/I16748637"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13323888,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"27","issue":"06","first_page":"739","last_page":"756"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10374","display_name":"Advanced Graph Theory Research","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10374","display_name":"Advanced Graph Theory Research","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10829","display_name":"Interconnection Networks and Systems","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11476","display_name":"Graph theory and applications","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/2608","display_name":"Geometry and Topology"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/degree","display_name":"Degree (music)","score":0.688004732131958},{"id":"https://openalex.org/keywords/vertex","display_name":"Vertex (graph theory)","score":0.6781198382377625},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.6424493193626404},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4703806936740875},{"id":"https://openalex.org/keywords/k-nearest-neighbors-algorithm","display_name":"k-nearest neighbors algorithm","score":0.45443102717399597},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4536721706390381},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.4377979338169098},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.39087745547294617},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.36950749158859253},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2613285183906555},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.20031234622001648},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.0969923734664917}],"concepts":[{"id":"https://openalex.org/C2775997480","wikidata":"https://www.wikidata.org/wiki/Q586277","display_name":"Degree (music)","level":2,"score":0.688004732131958},{"id":"https://openalex.org/C80899671","wikidata":"https://www.wikidata.org/wiki/Q1304193","display_name":"Vertex (graph theory)","level":3,"score":0.6781198382377625},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.6424493193626404},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4703806936740875},{"id":"https://openalex.org/C113238511","wikidata":"https://www.wikidata.org/wiki/Q1071612","display_name":"k-nearest neighbors algorithm","level":2,"score":0.45443102717399597},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4536721706390381},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4377979338169098},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.39087745547294617},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.36950749158859253},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2613285183906555},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.20031234622001648},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0969923734664917},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s012905411650026x","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s012905411650026x","pdf_url":null,"source":{"id":"https://openalex.org/S68047077","display_name":"International Journal of Foundations of Computer Science","issn_l":"0129-0541","issn":["0129-0541","1793-6373"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Foundations of Computer Science","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities","score":0.44999998807907104},{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.4399999976158142}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1971499400","https://openalex.org/W2055745794","https://openalex.org/W2071850839","https://openalex.org/W2083101853","https://openalex.org/W2125993726","https://openalex.org/W2397809402"],"related_works":["https://openalex.org/W3161230432","https://openalex.org/W1487201914","https://openalex.org/W4367190712","https://openalex.org/W280458463","https://openalex.org/W1170131723","https://openalex.org/W4301429470","https://openalex.org/W2168900540","https://openalex.org/W2125310826","https://openalex.org/W2339723535","https://openalex.org/W2014652112"],"abstract_inverted_index":{"The":[0,57],"vulnerability":[1,40,52],"shows":[2],"the":[3,6,9,13,34,42,51,85,95,99,106],"endurance":[4],"of":[5,15,53,61,81,87,98,101,110],"network":[7],"until":[8],"communication":[10,19],"collapse":[11],"after":[12],"breakdown":[14],"certain":[16],"stations":[17,36],"or":[18,24],"links.":[20],"If":[21],"a":[22,25,30,54,62],"spy":[23,31,55],"station":[26],"is":[27,67,76,84,94],"invaded":[28],"in":[29,90],"network,":[32],"then":[33],"adjacent":[35],"are":[37,113],"treacherous.":[38],"A":[39],"parameter":[41],"neighbor":[43,58,107],"rupture":[44,59,108],"degree":[45,60,109],"can":[46],"be":[47,70],"used":[48],"to":[49,69],"obtain":[50],"network.":[56],"noncomplete":[63],"connected":[64,88],"graph":[65],"G":[66],"defined":[68],"[Formula:":[71],"see":[72],"text]":[73],"where":[74],"S":[75],"any":[77],"vertex":[78],"subversion":[79],"strategy":[80],"G,":[82],"w(G/S)":[83],"number":[86],"components":[89,100],"G/S,":[91],"and":[92],"c(G/S)":[93],"maximum":[96],"order":[97],"G/S.":[102],"In":[103],"this":[104],"paper,":[105],"Harary":[111],"graphs":[112],"obtained.":[114]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
