2022
DOI: 10.1016/j.comnet.2022.108764
|View full text |Cite
|
Sign up to set email alerts
|

Construction of network topology and geographical vulnerability for telecommunication network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 21 publications
0
8
0
Order By: Relevance
“…The general steps are: (1) The historical data of the nodes are processed for machine learning. (2) Experts are asked to modify some probabilities that do not conform to the distribution to complete the maximum practical value of the Bayesian network. (3) In the process of improving the CPT value, three scholars were required to first revise the CPT value of the sub-node based on a literature review and professional knowledge, and then two anti-fraud police officers were asked to further revise the CPT values based on realworld experience.…”
Section: Bayesian Network Probability Generationmentioning
confidence: 99%
See 3 more Smart Citations
“…The general steps are: (1) The historical data of the nodes are processed for machine learning. (2) Experts are asked to modify some probabilities that do not conform to the distribution to complete the maximum practical value of the Bayesian network. (3) In the process of improving the CPT value, three scholars were required to first revise the CPT value of the sub-node based on a literature review and professional knowledge, and then two anti-fraud police officers were asked to further revise the CPT values based on realworld experience.…”
Section: Bayesian Network Probability Generationmentioning
confidence: 99%
“…The general steps are: (1) The historical data of the nodes are processed for machine learning. (2) Experts are asked to modify some probabilities that do not conform to the distribution to complete the maximum practical value of the Bayesian network.…”
Section: Bayesian Network Probability Generationmentioning
confidence: 99%
See 2 more Smart Citations
“…Complex network detection has been a popular topic in recent years because it involves a wide and deep range, including but not limited to telecommunications networks [16], community networks [17], traffic networks [18], and biological networks [19]. Among them, the nodes of the community networks are usually composed of people, and the connection between the nodes is dominated by familiarity, emotion, information, and other factors.…”
Section: Community Network Detection and Choquet Integralsmentioning
confidence: 99%