Research Article
Influential Node Identification in Command and Control Networks Based on Integral k-Shell
Table 2
Decomposing a network with the k-shell algorithm.
| Number of shellings (j) | k-shell value | k-shell (j) value | Shelled nodes from the network |
| 1 | 1 | 1 | 1, 2, 4, 5, 7, 14, 17 | 2 | ā | 1 | 3, 16 | 3 | ā | 1 | 6 | 4 | 2 | 2 | 8, 9, 15 | 5 | 3 | 3 | 10, 11, 12, 13 |
|
|