# network theory (graphs)

biblio

biblio

- Hamming space
- Knowledge engineering
- autoencoder
- attribute similarity penalizing term
- Attributed Network
- binary code learning
- data reduction
- dimension reduction
- feature aggregation
- network coding
- learned binary representation vectors
- network embedding
- node classification
- node clustering
- relaxation-quantization method
- unsupervised neural based binarized attributed network embedding
- Weisfeiler-Lehman Proximity Matirx
- Weisfeiler-Lehman proximity matrix
- composability
- feature extraction
- Neural networks
- pubcrawl
- Metrics
- resilience
- Resiliency
- matrix algebra
- optimization
- learning (artificial intelligence)
- Data mining
- pattern classification
- neural nets
- Task Analysis
- network theory (graphs)
- pattern clustering
- Binary codes
- neural network training

biblio

- Metrics
- Strategic Agents
- social surplus maximizing mechanism
- social surplus maximization
- Silicon
- security management
- Resiliency
- resilience
- pubcrawl
- Probability distribution
- private information
- network theory (graphs)
- network security
- network coordinator
- multi-agent systems
- Social Agents
- interdependent valuations
- interconnected multiagent networked systems
- inter-temporal correlations
- incentive compatibility
- dynamic networks
- dynamic mechanism design problem
- dynamic mechanism design
- Cost accounting
- computer security
- computer networks
- computer network security
- composability
- Communication networks
- agents security state

biblio

- recursive community structure
- functional Twitter elements
- hashtag semantics
- heavy degree distribution tail
- high clustering coefficient values
- higher order analytics
- higher order counterpart
- Julia
- Kruskal decomposition
- low diameter
- news aggregators
- Political Campaigns
- politics
- rank one tensors
- functional coherency
- semantic weight
- semantically aware communities
- Structural coherency
- structural Twitter elements
- substantial empirical evidence
- synthetic graph generation models
- tensor algebra
- tensor kruskal decomposition
- tensor representation
- Tucker tensor decomposition
- Twitter subgraph
- unofficial form
- unsupervised discovery
- tensors
- graph theory
- social networking (online)
- Metrics
- social network
- network theory (graphs)
- cyber physical systems
- Unsupervised Learning
- Semantics
- Compositionality
- Periodic structures
- singular value decomposition
- SVD
- pubcrawl
- Tucker decomposition
- decomposition
- analytical methodologies
- Blogs
- clustered graph spectrum
- Community discovery
- community structure discovery
- compact community size distribution
- digital marketing
- Facebook groups
- fact checking
- followfollower relationships

biblio

- data storage
- universally good Fractional Repetition codes
- partial regular graph
- multidimensional optimization problem
- minimum distance bound
- heterogeneous DSS
- encoded packet replication
- distributed storage systems
- Data storage systems
- storage overhead
- coding theory
- network coding
- network theory (graphs)
- pubcrawl
- Compositionality
- optimisation
- computer network reliability
- network security
- storage management
- Cryptography
- security
- optimization
- computer network security
- Resiliency
- resilience
- Metrics

biblio

- Heating systems
- Human Behavior and Cybersecurity
- topological sort networks
- network theory
- movement association
- mixed methods
- graph topological ordering
- dynamic decision-making
- adversarial team
- adversarial movement complexity
- adaptive human behavior
- Human behavior
- security of data
- cyberattacks
- integrated circuits
- Sorting
- network theory (graphs)
- social network
- Training
- Decision Making
- tools
- graph theory
- pubcrawl
- Computer crime

biblio

- Topology
- similarity structure
- semi-supervised learning
- prediction capability
- node copying
- graph topology
- graph neural network topology attacks
- graph convolutional networks
- graph based machine
- downstream learning task
- detection problem
- deep learning models
- corruption
- attack graphs
- graph connectivity
- Predictive Metrics
- security of data
- adversarial attacks
- network topology
- network theory (graphs)
- Training
- Prediction algorithms
- Neural networks
- neural nets
- Computational modeling
- graph theory
- composability
- pubcrawl
- Resiliency
- learning (artificial intelligence)
- Task Analysis

biblio

- security issues
- VA scans
- VA reports
- network vulnerabilities
- network health
- MulVal
- Attack Graph Generation Tools.
- attach graph
- attack paths
- attack graphs
- attack graph
- Informatics
- Predictive Metrics
- computer network security
- Complexity theory
- Security analysis
- network theory (graphs)
- complex networks
- computer security
- tools
- Databases
- composability
- pubcrawl
- Resiliency
- vulnerability assessment
- Organizations

biblio

- Matrices
- DC load flow
- electrical equations
- grid geometry
- Hybrid topological model
- IEEE 118-bus system
- industrial software
- load distribution
- load-flow equations
- blackout
- Network capacity reserve metric
- power blackouts
- power generators
- power systems
- topological indicators
- vulnerability lines
- Power Grid Vulnerability Assessment
- pubcrawl
- Load flow
- Cascading Failures
- network theory (graphs)
- complex network theory
- power system reliability
- failure analysis
- Measurement
- Metrics
- power grids
- composability
- Vulnerability
- Mathematical model
- Generators
- Resiliency
- resilience

biblio

- Metrics
- structural modifications
- social networking (online)
- social network
- Publishing
- pubcrawl
- privacy protection
- privacy models and measurement
- privacy
- pattern clustering
- original social network
- node degrees
- network theory (graphs)
- network structure stable
- network nodes
- anonymity
- Mathematical model
- Loss measurement
- k-subgraph method
- k-degree anonymous graph
- k-degree anonymity
- k-anonymity
- information losses
- information loss
- improved privacy protection method
- graph theory
- data privacy
- computer security
- Clustering algorithms
- anonymity models