Abstract
One of the most sensitive characteristics of network vulnerability is residual closeness. Calculating the closeness and the residual closeness of larger graphs is a time consuming and operations heavy process. In this article, we try to mitigate the process for thorn graphs - we present the thorn graphs residual closeness as a function of the closeness and the residual closeness of the original graphs.
Get full access to this article
View all access options for this article.
