Graph mining: Laws, generators, and algorithms

D Chakrabarti, C Faloutsos - ACM computing surveys (CSUR), 2006 - dl.acm.org
How does the Web look? How could we tell an abnormal social network from a normal one?
These and similar questions are important in many fields where the data can intuitively be …

Network topologies: inference, modeling, and generation

H Haddadi, M Rio, G Iannaccone… - … Surveys & Tutorials, 2008 - ieeexplore.ieee.org
Accurate measurement, inference and modeling techniques are fundamental to Internet
topology research. Spatial analysis of the Internet is needed to develop network planning …

The internet topology zoo

S Knight, HX Nguyen, N Falkner… - IEEE Journal on …, 2011 - ieeexplore.ieee.org
The study of network topology has attracted a great deal of attention in the last decade, but
has been hampered by a lack of accurate data. Existing methods for measuring topology …

Measuring ISP topologies with Rocketfuel

N Spring, R Mahajan, D Wetherall - ACM SIGCOMM Computer …, 2002 - dl.acm.org
To date, realistic ISP topologies have not been accessible to the research community,
leaving work that depends on topology on an uncertain footing. In this paper, we present …

Measuring ISP topologies with Rocketfuel

N Spring, R Mahajan, D Wetherall… - … /ACM Transactions on …, 2004 - ieeexplore.ieee.org
To date, realistic ISP topologies have not been accessible to the research community,
leaving work that depends on topology on an uncertain footing. In this paper, we present …

The rich-club phenomenon in the internet topology

S Zhou, RJ Mondragón - IEEE communications letters, 2004 - ieeexplore.ieee.org
We show that the Internet topology at the autonomous system (AS) level has a rich-club
phenomenon. The rich nodes, which are a small number of nodes with large numbers of …

Resisting structural re-identification in anonymized social networks

M Hay, G Miklau, D Jensen, D Towsley… - Proceedings of the VLDB …, 2008 - dl.acm.org
We identify privacy risks associated with releasing network data sets and provide an
algorithm that mitigates those risks. A network consists of entities connected by links …

Systematic topology analysis and generation using degree correlations

P Mahadevan, D Krioukov, K Fall… - ACM SIGCOMM Computer …, 2006 - dl.acm.org
Researchers have proposed a variety of metrics to measure important graph properties, for
instance, in social, biological, and computer networks. Values for a particular graph metric …

Power laws and the AS-level Internet topology

G Siganos, M Faloutsos, P Faloutsos… - … /ACM Transactions on …, 2003 - ieeexplore.ieee.org
We study and characterize the topology of the Internet at the autonomous system (AS) level.
First, we show that the topology can be described efficiently with power laws. The elegance …

The Internet AS-level topology: three data sources and one definitive metric

P Mahadevan, D Krioukov, M Fomenkov… - ACM SIGCOMM …, 2006 - dl.acm.org
We calculate an extensive set of characteristics for Internet AS topologies extracted from the
three data sources most frequently used by the research community: traceroutes, BGP, and …