Research Article

Analysis on Influential Functions in the Weighted Software Network

Figure 9

A software attack instance.
(a)
(b)