Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  Bestsellers

  • articleNo Access

    Assessing the Impact of Software Patching on Vulnerabilities: A Comprehensive Framework for Faulty and Safe Patches

  • articleNo Access

    Software Vulnerability Detection: A Comparison of Statistical and Machine Learning Algorithms

  • articleNo Access

    ANALYZING VULNERABILITIES OF CRITICAL INFRASTRUCTURES USING FLOWS AND CRITICAL VERTICES IN AND/OR GRAPHS

  • articleNo Access

    COMPUTING THE RUPTURE DEGREE IN COMPOSITE GRAPHS

  • articleNo Access

    NEIGHBOR INTEGRITY OF TRANSFORMATION GRAPHS

  • articleNo Access

    SOME RESULTS FOR THE RUPTURE DEGREE

  • articleNo Access

    Neighbor Rupture Degree of Harary Graphs

  • articleNo Access

    Binding Number and Wheel Related Graphs

  • articleNo Access

    Neighbor Rupture Degree of Transformation Graphs GxyGxy

  • articleNo Access

    Link Vulnerability in Networks

  • articleNo Access

    A Comparison Between Edge Neighbor Rupture Degree and Edge Scattering Number in Graphs

  • articleNo Access

    Exponential Independence Number of Some Graphs

  • articleNo Access

    A Note on the Link Residual Closeness of Graphs Under Join Operation

  • articleNo Access

    Isolated Rupture in Thorny Networks

  • articleNo Access

    Analysis of Vulnerability of Some Transformation Networks

  • articleNo Access

    Isolated Rupture in Composite Networks

  • articleNo Access

    Node and Link Vulnerability in Complete Multipartite Networks

  • articleNo Access

    Cascading failures mechanism based on betweenness-degree ratio distribution with different connecting preferences

  • articleNo Access

    Link failure in wheel type networks

  • articleNo Access

    ON ARBITRARY SIZE WAKSMAN NETWORKS AND THEIR VULNERABILITY