Research Article
A Software Vulnerability Detection Method Based on Complex Network Community
Table 4
The order of the nodes in the Dolphins dataset.
| Ranking | Degree centrality | PageRank algorithm | LeaderRank algorithm | nRank algorithm | Node | DC | Node | PR | Node | LR | Node | R |
| 1 | 14 | 12 | 17 | 0.032 | 14 | 0.030 | 14 | 0.015 | 2 | 45 | 11 | 51 | 0.031 | 37 | 0.027 | 45 | 0.012 | 3 | 37 | 11 | 14 | 0.031 | 45 | 0.027 | 37 | 0.009 | 4 | 51 | 10 | 57 | 0.030 | 51 | 0.025 | 51 | 0.009 | 5 | 33 | 10 | 37 | 0.029 | 33 | 0.025 | 33 | 0.007 | 6 | 57 | 9 | 45 | 0.028 | 57 | 0.023 | 57 | 0.007 | 7 | 29 | 9 | 33 | 0.028 | 17 | 0.023 | 29 | 0.005 | 8 | 20 | 9 | 29 | 0.026 | 20 | 0.023 | 13 | 0.004 | 9 | 17 | 9 | 13 | 0.026 | 29 | 0.023 | 17 | 0.003 | 10 | 40 | 8 | 1 | 0.024 | 13 | 0.020 | 9 | 0.003 |
|
|