Return to Article Details Effective Graph Protection Method to Prevent the Spreading of Attacks in Networks Download Download PDF