Secure domination critical graphs
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 1095171 (Why is no real title available?)
- scientific article; zbMATH DE number 2174620 (Why is no real title available?)
- scientific article; zbMATH DE number 2094533 (Why is no real title available?)
- scientific article; zbMATH DE number 2104838 (Why is no real title available?)
- scientific article; zbMATH DE number 2114685 (Why is no real title available?)
- scientific article; zbMATH DE number 2188604 (Why is no real title available?)
- scientific article; zbMATH DE number 2188623 (Why is no real title available?)
- Defending the Roman Empire from multiple attacks
- Defending the Roman Empire---a new strategy
- Irredundance, secure domination and maximum degree in trees
- Protection of complete multipartite graphs
- Roman domination in graphs.
- Secure domination and secure total domination in graphs
Cited in
(22)- Secure domination parameters of Halin graph with perfect \(k\)-ary tree
- The cost of edge removal in graph domination
- Eternal and Secure Domination in Graphs
- Secure equitable subdivision number of graphs
- Exact algorithms for weak Roman domination
- Edge domination and secure edge domination in Mycielski graph of trees.
- Global security in claw-free cubic graphs
- Secure Italian domination in graphs
- On minimum secure dominating sets of graphs
- Secure dominating sets in the lexicographic product of graphs
- On the secure domination numbers of maximal outerplanar graphs
- A linear algorithm for secure domination in trees
- The cost of edge failure with respect to secure graph domination
- On computing a minimum secure dominating set in block graphs
- The complexity of secure domination problem in graphs
- On secure domination in trees
- A characterization of trees with equal independent domination and secure domination numbers
- Secure domination in proper interval graphs
- Edge criticality in secure graph domination
- Domination parameters and edge-removal-critical graphs
- Global secure sets of grid-like graphs
- Edge stability in secure graph domination
This page was built for publication: Secure domination critical graphs
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1045117)