Graph mining: Laws, generators, and algorithms

D Chakrabarti, C Faloutsos - ACM computing surveys (CSUR), 2006‏ - dl.acm.org
How does the Web look? How could we tell an abnormal social network from a normal one?
These and similar questions are important in many fields where the data can intuitively be …

Graph metrics for network robustness—a survey

M Oehlers, B Fabian - Mathematics, 2021‏ - mdpi.com
Research on the robustness of networks, and in particular the Internet, has gained critical
importance in recent decades because more and more individuals, societies and firms rely …

The internet topology zoo

S Knight, HX Nguyen, N Falkner… - IEEE Journal on …, 2011‏ - ieeexplore.ieee.org
The study of network topology has attracted a great deal of attention in the last decade, but
has been hampered by a lack of accurate data. Existing methods for measuring topology …

Measuring ISP topologies with Rocketfuel

N Spring, R Mahajan, D Wetherall - ACM SIGCOMM Computer …, 2002‏ - dl.acm.org
To date, realistic ISP topologies have not been accessible to the research community,
leaving work that depends on topology on an uncertain footing. In this paper, we present …

Measuring ISP topologies with Rocketfuel

N Spring, R Mahajan, D Wetherall… - … /ACM Transactions on …, 2004‏ - ieeexplore.ieee.org
To date, realistic ISP topologies have not been accessible to the research community,
leaving work that depends on topology on an uncertain footing. In this paper, we present …

The rich-club phenomenon in the internet topology

S Zhou, RJ Mondragón - IEEE communications letters, 2004‏ - ieeexplore.ieee.org
We show that the Internet topology at the autonomous system (AS) level has a rich-club
phenomenon. The rich nodes, which are a small number of nodes with large numbers of …

Resisting structural re-identification in anonymized social networks

M Hay, G Miklau, D Jensen, D Towsley… - Proceedings of the VLDB …, 2008‏ - dl.acm.org
We identify privacy risks associated with releasing network data sets and provide an
algorithm that mitigates those risks. A network consists of entities connected by links …

Systematic topology analysis and generation using degree correlations

P Mahadevan, D Krioukov, K Fall… - ACM SIGCOMM Computer …, 2006‏ - dl.acm.org
Researchers have proposed a variety of metrics to measure important graph properties, for
instance, in social, biological, and computer networks. Values for a particular graph metric …

A first-principles approach to understanding the internet's router-level topology

L Li, D Alderson, W Willinger, J Doyle - ACM SIGCOMM computer …, 2004‏ - dl.acm.org
A detailed understanding of the many facets of the Internet's topological structure is critical
for evaluating the performance of networking protocols, for assessing the effectiveness of …

Power laws and the AS-level Internet topology

G Siganos, M Faloutsos, P Faloutsos… - … /ACM Transactions on …, 2003‏ - ieeexplore.ieee.org
We study and characterize the topology of the Internet at the autonomous system (AS) level.
First, we show that the topology can be described efficiently with power laws. The elegance …