The hardware and bandwidth for this mirror is donated by dogado GmbH, the Webhosting and Full Service-Cloud Provider. Check out our Wordpress Tutorial.
If you wish to report a bug, or if you are interested in having us mirror your free-software or open-source project, please feel free to contact us at mirror[@]dogado.de.

dynetNLAResistance: Resisting Neighbor Label Attack in a Dynamic Network

An anonymization algorithm to resist neighbor label attack in a dynamic network.

Version: 0.1.0
Depends: R (≥ 2.10)
Imports: igraph, doParallel, foreach, grDevices, graphics, utils, parallel
Suggests: testthat
Published: 2016-11-25
DOI: 10.32614/CRAN.package.dynetNLAResistance
Author: Jiaqi Tang
Maintainer: Jiaqi Tang <1107967177 at qq.com>
License: MIT + file LICENSE
NeedsCompilation: no
Materials: README
CRAN checks: dynetNLAResistance results

Documentation:

Reference manual: dynetNLAResistance.pdf

Downloads:

Package source: dynetNLAResistance_0.1.0.tar.gz
Windows binaries: r-devel: dynetNLAResistance_0.1.0.zip, r-release: dynetNLAResistance_0.1.0.zip, r-oldrel: dynetNLAResistance_0.1.0.zip
macOS binaries: r-release (arm64): dynetNLAResistance_0.1.0.tgz, r-oldrel (arm64): dynetNLAResistance_0.1.0.tgz, r-release (x86_64): dynetNLAResistance_0.1.0.tgz, r-oldrel (x86_64): dynetNLAResistance_0.1.0.tgz

Linking:

Please use the canonical form https://CRAN.R-project.org/package=dynetNLAResistance to link to this page.

These binaries (installable software) and packages are in development.
They may not be fully stable and should be used with caution. We make no claims about them.
Health stats visible at Monitor.