Research Article
A Software Vulnerability Detection Method Based on Complex Network Community
Table 3
The order of the nodes in the Karate dataset.
| Ranking | Degree centrality | PageRank algorithm | LeaderRank algorithm | nRank algorithm | Node | DC | Node | PR | Node | LR | Node | R |
| 1 | 33 | 17 | 33 | 0.099 | 33 | 0.081 | 0 | 0.021 | 2 | 0 | 16 | 0 | 0.076 | 0 | 0.076 | 33 | 0.019 | 3 | 32 | 12 | 32 | 0.061 | 32 | 0.058 | 32 | 0.013 | 4 | 2 | 10 | 2 | 0.051 | 2 | 0.049 | 2 | 0.011 | 5 | 1 | 9 | 1 | 0.046 | 1 | 0.045 | 1 | 0.010 | 6 | 31 | 6 | 31 | 0.032 | 31 | 0.031 | 3 | 0.008 | 7 | 3 | 6 | 3 | 0.032 | 3 | 0.031 | 13 | 0.007 | 8 | 23 | 5 | 23 | 0.028 | 13 | 0.027 | 8 | 0.006 | 9 | 13 | 5 | 6 | 0.028 | 8 | 0.027 | 7 | 0.005 | 10 | 8 | 5 | 5 | 0.028 | 23 | 0.027 | 31 | 0.005 |
|
|