On secure domination in graphs

From MaRDI portal
Publication:2348710

DOI10.1016/j.ipl.2015.05.006zbMath1329.05223OpenAlexW248890345MaRDI QIDQ2348710

Houcine Boumediene Merouane, Mustapha Chellali

Publication date: 15 June 2015

Published in: Information Processing Letters (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/j.ipl.2015.05.006




Related Items (28)

Complexity issues of perfect secure domination in graphsAn improved binary programming formulation for the secure domination problemProtection of graphs with emphasis on Cartesian product graphsSecure domination in proper interval graphsComplexity issues of variants of secure domination in graphsSecure domination in cographsOn the secure domination numbers of maximal outerplanar graphsComplexity results on cosecure domination in graphsCorrecting the algorithm for a minimum secure dominating set of proper interval graphs by Zou, Liu, Hsu and WangCosecure domination: hardness results and algorithmsAlgorithmic aspects of secure domination in unit disk graphsSome new algorithmic results on co-secure domination in graphsOn the complexity of co-secure dominating set problemOn computing a minimum secure dominating set in block graphsThe complexity of secure domination problem in graphsA note on secure domination in \(C_5\)-free graphsUnnamed ItemThe secure domination problem in cographsCorrecting the algorithm for the secure domination number of cographs by Jha, Pradhan, and BanerjeeFrom (secure) \(w\)-domination in graphs to protection of lexicographic product graphsA characterization of trees with equal independent domination and secure domination numbersSecure domination in rooted product graphsSecure Italian domination in graphsThe complexity of the defensive domination problem in special graph classesAlgorithmic aspects of secure connected domination in graphsEternal and Secure Domination in GraphsProtection of lexicographic product graphsOn secure domination in trees



Cites Work


This page was built for publication: On secure domination in graphs