Next Article in Journal
A Mixed-Integer Programming Framework for Drone Routing and Scheduling with Flexible Multiple Visits in Highway Traffic Monitoring
Previous Article in Journal
Swap Test-Based Quantum Protocol for Private Array Equality Comparison
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Characterization of Some Claw-Free Graphs in Co-Secure Domination Number

1
School of Mathematics, Liaoning Normal University, Dalian 116029, China
2
School of Mathematics and Statistics, Beijing Key Laboratory on MCAACI, Beijing Institute of Technology, Beijing 100081, China
*
Author to whom correspondence should be addressed.
Mathematics 2025, 13(15), 2426; https://doi.org/10.3390/math13152426
Submission received: 10 June 2025 / Revised: 24 July 2025 / Accepted: 26 July 2025 / Published: 28 July 2025

Abstract

For a vertex subset S of a graph G , if each vertex of G is either in S or adjacent to some vertex in S , then S is a dominating set of G . Let S be a dominating set of a graph G . If each vertex v not in S has a neighbor u in S such that ( S \ { u } ) { v } is also a dominating set of G , then S is a secure dominating set of G . If each vertex u in S has a neighbor v not in S such that ( S \ { u } ) { v } is also a dominating set of G, then S is a co-secure dominating set of G. The minimum cardinality of a secure (resp. co-secure) dominating set of G is the secure (resp. co-secure) domination number of G . Arumugam et al. proposed the questions to characterize a graph G such that the co-secure domination number of G equals the independence number and the secure domination number of G, respectively. Inspired by those questions, in this paper, we obtain two classes of claw-free graphs such that the co-secure domination number equal the independence number and the secure domination number. Our results provide some theoretical basis of claw-free graphs for networks.

1. Introduction

We consider only simple and undirected graphs in this paper. For notation and terminology not defined in this paper, readers are referred to [1]. For a graph G and S V ( G ) , we use G [ S ] to denote the subgraph of G induced by S. Let N S ( v ) denote the set of all the neighbors of v in S , and d S ( v ) = | N S ( v ) | ; moreover, we set N ( v ) = N G ( v ) , and d ( v ) = d G ( v ) for simplicity. Let N [ v ] = N ( v ) { v } . For a graph H 1 , if a subgraph H 2 of a graph G is isomorphic to H 1 , then let H 1 = H 2 . A complete graph consisting of n vertices is denoted by K n , and a complete bipartite graph consisting of two vertex-disjoint independent A , B is denoted by K a , b , where | A | = a and | B | = b . We use G S to denote the vertex set V ( G ) S , where S is a vertex subset of G.
Given a graph H , a graph G is H-free if G contains no induced subgraph isomorphic to H . A claw is a graph isomorphic to K 1 , 3 . Let G [ { v , v 1 , v 2 , v 3 } ] = K 1 , 3 such that d H ( v ) = 3 , d H ( v i ) = 1 , i { 1 , 2 , 3 } , if a subgraph H consisting of { v , v 1 , v 2 , v 3 } in G is isomorphic to a claw. Let K 4 denote the graph obtained by deleting an edge of K 4 . For a positive integer k , we use C k , and P k to denote a cycle, and a path of order k, respectively. A bull is a graph (see Figure 1) obtained by joining two isolated vertices to two distinct vertices of a triangle, respectively. We use G [ { v 1 , v 2 , v 3 , v 4 , v 5 } ] to denote a subgraph H of G isomorphic to a bull, which consists of { v 1 , v 2 , v 3 , v 4 , v 5 } such that d H ( v 1 ) = 2 ,   d H ( v 2 ) = d H ( v 3 ) = 3 ,   d H ( v 4 ) = d H ( v 5 ) = 1 and v 4 v 2 , v 3 v 5 E ( G ) . A Z 2 is a graph (see Figure 1) obtained by identifying an end of a path of length 2 to a vertex of a triangle. In this paper, we use G [ { u 1 , u 2 , u 3 , u 4 , u 5 } ] to denote a subgraph H of G isomorphic to Z 2 , which consists of { u 1 , u 2 , u 3 , u 4 , u 5 } such that d H ( u 1 ) = 3 ,   d H ( u 2 ) = d H ( u 3 ) = d H ( u 4 ) = 2 ,   d H ( u 5 ) = 1 and H [ { u 1 , u 2 , u 3 } ] = K 3 . For two graphs H 1 and H 2 , the join of H 1 and H 2 , denoted by H 1 H 2 , is a graph with vertex set V ( H 1 ) V ( H 1 ) and edge set E ( H 1 ) E ( H 2 ) { u v : u V ( H 1 ) , v V ( H 2 ) } . Let α ( G ) denote the independence number of a graph G.
If every vertex of a graph G is in S or adjacent to some vertex in S , then S is called a dominating set of G . Let S be a dominating set of a graph G. If for every vertex u G S , S contains a neighbor of u , denoted by v , such that ( S \ { v } ) { u } is also a dominating set of G , then S is called a secure dominating set of G .  S is called a co-secure dominating set of G if for every vertex v in S , there is a neighbor of v in G S , denoted by u , such that ( S \ { v } ) { u } is also a dominating set of G . The minimum cardinality of a co-secure dominating set (resp. secure dominating set) of G is the called the co-secure (resp. secure) domination number of G . We use γ c s ( G ) and γ s ( G ) to denote the co-secure domination number and secure domination number of G , respectively.
Let S be a dominating set of a graph G . For a vertex u G S , if u has an exactly one neighbor in S, denoted by v , then u is called an external private neighbor of v with respect to S . For a vertex v S , let e p n ( v , S ) = { u V ( G ) S : u is an external private neighbor of v with respect to S } , and r p n ( v , S ) = { w V ( G ) S : w v E ( G ) and ( S \ { v } ) { w } is a dominating set of G } .
In [2], Cockayne et al. proposed the concepts of a secure dominating set and secure domination number; moreover, they also determined the exact values of the secure domination number of paths, cycles, and complete multipartite graphs. Araki and Yumoto [3] proved that the secure domination number of a maximal outerplane graph of n vertices is at most 3 n / 7 . Degawa and Saito [4] gave that the secure domination number of every C 5 -free graph is no larger than its independence number. The secure domination number of Cartesian products of small graphs with paths, cycles, and some other graph classes were given in [5]. For the bounds of the secure domination number of more classes of graphs, the readers are referred to [6,7,8].
Arumugan et al. introduced the concept of co-secure domination in [9]. They also obtained the co-secure domination number of paths and cycles, and the sharp upper and lower bounds of some graphs; moreover, they proposed that the problem to determine the co-secure domination number of a graph is NP-complete even if it is a bipartite, chordal or planar graph. Joseph and Sangeetha [10] obtained the co-secure domination number of Friendship graphs, Jahangir graphs, and Helm graphs; they also studied a family of trees such that the co-secure domination number equals the secure domination number. Pothuvath et al. [11] gave the bounds of domination number and co-secure domination number for jump graphs. We summarize the results on the parameter in the bound of co-secure domination number in Table 1.
Finding the minimum dominating set (MDS) and co-secure dominating set (MCSDS) are NP-complete. However, MCSDS is practically harder due to the co-secure constraint, which introduces combinatorial challenges. The co-secure condition (the “swap” for every u S in a dominating set S) forces solutions to be larger and more structured. Specifically, algorithms must consider larger sets S, and the number of candidate sets grows exponentially with size (e.g., from O ( 2 n ) for MDS to O ( 2 c n ) for larger c in MCSDS).
Arumugan et al. [9] gave the bounds of the co-secure domination number by independence number, and secure domination number, as follows.
Theorem 1
([9]). If G is a non-trivial graph, then γ c s ( G ) α ( G ) .
Theorem 2
([9]). If G is a graph and δ ( G ) 2 , then γ c s ( G ) γ s ( G ) .
Moreover, in [9], Arumugan et al. proposed the following two problems.
Problem 1
([9]). Characterize graphs G with γ c s ( G ) = α ( G ) .
Problem 2
([9]). Characterize graphs G with γ c s ( G ) = γ s ( G ) .
There is very little research on Problems 1 and 2. We think the dense graphs may satisfy the characterization by the structural analysis. Claw-free graphs can be utilized to design deadlock-free routing algorithms in the context of supercomputer networks and distributed systems, because their structure can avoid complex dependencies that may lead to deadlocks. P 5 -free graphs are useful for creating low-diameter and fault-tolerant network topologies, as their restricted path structure helps minimize communication latency and improve robustness. Inspired by the significant application value of { c l a w , P 5 } -free graphs and the above open problems, in this paper, we characterize the co-secure domination number of { c l a w , P 5 } -free graphs.
Notice that if a graph G contains an isolate vertex v, then v is in every dominating set of G . By the definition, for a co-secure dominating set S of a graph G , each vertex in S has a neighbor in G S , which implies that G contains no isolated vertex. Thus, δ ( G ) 1 if G contains a co-secure dominating set.

2. Characterization of Claw-Free Graphs G with γ cs ( G ) = α ( G )

In this section, we characterize the claw-free graphs G with γ c s ( G ) = α ( G ) . Firstly, we obtain the following preliminaries.
Lemma 1.
Let G be a non-trivial claw-free graph such that G contains exactly one vertex of degree | V ( G ) | 1 . Then γ c s ( G ) = α ( G ) .
Proof. 
Let v be the only one vertex of G of degree | V ( G ) | 1 . Then, G is not a complete graph, and hence, α ( G ) 2 . Moreover, each vertex of G is in N [ v ] , which implies α ( G ) = 2 since G is claw-free. Suppose γ c s ( G ) = 1 and { x } is a minimum co-secure dominating set of G . Then, there is a vertex y in G { x } such that { y } is dominating set of G , which implies d ( x ) = d ( y ) = | V ( G ) | 1 , a contradiction. Thus, γ c s ( G ) 2 . Assume v 1 , v 2 are two nonadjacent vertices of G. We claim that S = { v 1 , v 2 } is a co-secure dominating set of G, and then, S is a minimum co-secure dominating set of G by γ c s ( G ) 2 . Since α ( G ) = 2 ,   S is a maximum independent set of G , and hence, S is a dominating set of G . Clearly, v S since each vertex of G is adjacent to v and v 1 v 2 E ( G ) . Thus, S i = ( S \ { v i } ) { v } is a dominating set of G for each i { 1 , 2 } . It follows that S is a minimum co-secure dominating set of G and then γ c s ( G ) = α ( G ) .
Let F be the family of claw-free graphs G of such that G is not complete, and G contains at least two vertices of degree | V ( G ) | 1 (see Figure 2). It is easy to verify that γ c s ( G ) = 1 and α ( G ) = 2 . Thus, by Lemma 1, γ c s ( G ) = α ( G ) if G contains a vertex of degree | V ( G ) | 1 and G F . In Theorem 4 of [12], we prove that every { c l a w , b u l l , Z 2 } -free graph G with δ ( G ) 3 and α ( G ) 2 contains a minimum co-secure dominating set that is a maximum independent set of G , i.e., γ c s ( G ) = α ( G ) . However, there is a { c l a w , b u l l , Z 2 } -free graph G with δ ( G ) 3 such that γ c s ( G ) = α ( G ) = 2 . In this paper, we give the following result, which is more precise.
Theorem 3.
Let G be a { c l a w , b u l l , Z 2 } -free graph with δ ( G ) 3 and G F . Then, G contains a minimum co-secure dominating set that is a maximum independent set of G .
Assume that G 1 = K m , m 1 , and G 2 = v 1 v 2 v 3 v 4 v 5 v 1 is a 5-cycle. Let G be the graph (see Figure 3) obtained by joining each vertex in G 1 to every vertex in { v 1 , v 2 , v 5 } of G 2 . Clearly, G is { c l a w , P 5 , b u l l } -free, but not Z 2 -free. Thus, there is a { c l a w , P 5 , b u l l } -free graph that is not { c l a w , b u l l , Z 2 } -free. Conversely, there is a { c l a w , b u l l , Z 2 } -free graph that is not { c l a w , P 5 , b u l l } -free; for example, P k , k 5 , is a { c l a w , b u l l , Z 2 } -free graph, but not P 5 -free.
In the following, we give the relation between the co-secure domination number and independence number of { c l a w , P 5 , b u l l } -free graphs.
Theorem 4.
Let G be a { c l a w , P 5 , b u l l } -free graph such that G F and δ ( G ) 1 . Then, G contains a minimum co-secure dominating set that is a maximum independent set of G.
Proof. 
Since for a disconnected graph, its co-secure domination number is the sum of the co-secure domination number of all the components, and hence, it suffices to consider G is connected in the following proof. If G is complete, then we are done. Thus, we assume that G is a connected and non-complete graph. Then, α ( G ) 2 , which implies that γ c s ( G ) 2 by G F . We take a minimum co-secure dominating set S of G such that G [ S ] contains the minimum number of edges. We have | S | 2 by γ c s ( G ) 2 . In the following proof, firstly, we prove that S is an independent set, and then, we claim that S is a maximum independent set of G. □
We need the following result to prove S is an independent set of G.
Claim 1.
e p n ( v , S ) = if v S and d S ( v ) 1 .
Proof. 
Suppose to the contrary that there is a vertex v S such that d S ( v ) 1 and e p n ( v , S ) . Let u S such that u v E ( G ) . We claim that G [ e p n ( v , S ) ] is a clique. Otherwise, e p n ( v , S ) contains two non-adjacent vertices. Let v 1 , v 2 e p n ( v , S ) such that v 1 v 2 E ( G ) . Since v 1 , v 2 e p n ( v , S ) and u S , we have v 1 u , v 2 u E ( G ) . It follows that G [ { v , v 1 , v 2 , u } ] = K 1 , 3 , a contradiction. Thus, G [ e p n ( v , S ) ] is a clique.
Let v 1 e p n ( v , S ) and S = ( S \ { v } ) { v 1 } . Since G [ e p n ( v , S ) ] is a clique, we have v 1 r p n ( v , S ) , and hence, S is a dominating set of G with | S |   =   | S | . By v 1 e p n ( v , S ) ,   G [ S ] contains fewer edges than G [ S ] . Thus, S is not a co-secure dominating set of G by the choice of S . Clearly, v r p n ( v 1 , S ) . Then, there is vertex w S \ { v 1 } such that r p n ( w , S ) = and e p n ( w , S ) contains two nonadjacent vertices w 1 , w 2 with { w 1 , w 2 } N ( v ) . We have w 1 v 1 , w 2 v 1 E ( G ) by w 1 , w 2 e p n ( w , S ) .
Suppose { w 1 , w 2 } N ( v ) . Then, w 1 w 2 E ( G ) by G [ v , w 1 , w 2 , v 1 ] K 1 , 3 and w 1 v 1 ,   w 2 v 1 E ( G ) , a contradiction. Thus, | { w 1 , w 2 } N ( v ) | = 1 . Without loss of generality, assume that w 1 v E ( G ) and w 2 v E ( G ) . Then, w 2 e p n ( w , S ) . Recall that u N S ( v ) . Suppose w u . Then, w 1 u E ( G ) by w 1 e p n ( w , S ) , which implies G [ { v , v 1 , u , w 1 } ] = K 1 , 3 , a contradiction. Thus, w = u , and then, G [ { w 1 , v , u , v 1 , w 2 } ] = b u l l , a contradiction. The claim is true. □
Next, we prove S is an independent set.
Claim 2.
S is an independent set.
Proof. 
Suppose to the contrary that S is not an independent set. Let u , v be in S such that u v E ( G ) , and set S = S \ { v } . By Claim 1, e p n ( v , S ) = , and hence, S is a dominating set of G . Since | S |   <   | S | and S is a minimum co-secure dominating set of G ,   S is not a co-secure dominating set of G . Thus, there is a vertex w S such that r p n ( w , S ) = and e p n ( w , S ) contains two nonadjacent vertices w 1 , w 2 with { w 1 , w 2 } N ( v ) .
Suppose { w 1 , w 2 } N ( v ) . Then, we have w 1 u E ( G ) or w 2 u E ( G ) by G [ v , w 1 , w 2 , u ]   K 1 , 3 and w 1 w 2 E ( G ) , which implies u = w by w i e p n ( w , S ) for each i { 1 , 2 } . We have e p n ( u , S ) = by Claim 1, and hence, each vertex in e p n ( u , S ) is adjacent to v . Then, v r p n ( u , S ) , a contradiction to r p n ( w , S ) = . Thus, | { w 1 , w 2 } N ( v ) | = 1 .
Without loss of generality, assume w 1 v E ( G ) and w 2 v E ( G ) . Then, w 2 e p n ( w , S ) , which implies w u since e p n ( u , S ) = by Claim 1. Thus, w 1 u , w 2 u E ( G ) by w 1 , w 2 e p n ( w , S ) . It follows that G [ { u , v , w 1 , w , w 2 } ] = P 5 , a contradiction. Thus, S is an independent set of G. □
If there is a minimum co-secure dominating set of G that is a maximum independent set of G, then we are done. Suppose on the contrary, that every minimum co-secure dominating set of G is not a maximum independent set of G. Let S be a maximum independent set of G. Subject to the original assumption that S is a minimum co-secure dominating set of G such that G [ S ] contains the minimum number of edges; we choose S such that | S S | is maximum. S is an independent set of G by Claim 2, but it is not a maximum independent set of G. Then, | S |   <   | S | and | S \ S | > | S \ S | .
Claim 3.
If x S \ S and x e p n ( y , S ) for some vertex y S , then x r p n ( y , S ) .
Proof. 
Let x S \ S and y S such that x e p n ( y , S ) . Suppose to the contrary that x r p n ( y , S ) . Let S = ( S \ { y } ) { x } . Then, we obtain that e p n ( y , S ) N [ x ] by x r p n ( y , S ) . Thus, S is a dominating set of G , and S is an independent set of G by x e p n ( y , S ) . We have y S by x y E ( G ) and x S , and hence, | S S |   >   | S S | . Then, by the choice of S ,   S is not a co-secure dominating set of G. Clearly, y r p n ( x , S ) . It follows that there is a vertex z S \ { x } such that r p n ( z , S ) = and e p n ( z , S ) contains two non-adjacent vertices z 1 , z 2 with { z 1 , z 2 } N ( y ) .
By z 1 , z 2 e p n ( z , S ) and z x , we have z 1 x , z 2 x E ( G ) . We claim that | { z 1 , z 2 } N ( y ) | = 1 . For otherwise, { z 1 , z 2 } N ( y ) , and then, G [ { y , x , z 1 , z 2 } ] = K 1 , 3 , a contradiction. Without loss of generality, assume z 1 y E ( G ) and z 2 y E ( G ) . Then, N ( z 1 ) S = { z , y } and z 2 e p n ( z , S ) . Clearly, z x E ( G ) by x e p n ( y , S ) . Thus, G [ { x , y , z 1 , z , z 2 } ] = P 5 , a contradiction. It follows that x r p n ( y , S ) .
Claim 4.
If x S \ S , then x e p n ( y , S ) for any vertex y in N S ( x ) .
Proof. 
Let x S \ S and y N S ( x ) . Suppose to the contrary that x e p n ( y , S ) . Then, by Claim 3, x r p n ( y , S ) . Thus, there is a vertex z e p n ( y , S ) \ { x } such that z x E ( G ) . Since S is a co-secure dominating set of G ,   r p n ( y , S ) . Let u r p n ( y , S ) . Then, z u , x u E ( G ) . We claim that u e p n ( y , S ) . Suppose on the contrary, u w E ( G ) for some vertex w S \ { y } . Then, w x , w z E ( G ) by x , z e p n ( y , S ) , and hence, G [ { u , x , z , w } ] = K 1 , 3 , a contradiction. Thus, u e p n ( y , S ) .
We claim that N ( y ) = e p n ( y , S ) . Note that N ( y ) G S since S is an independent set of G. Suppose to the contrary that there is a vertex v N ( y ) \ e p n ( y , S ) . We have d S ( v ) = 2 since G is claw-free and S is an independent set. Let N S ( v ) = { y , w } . Clearly, v { x , z , u } , and x w , z w , u w E ( G ) by x , z , u e p n ( y , S ) . We have v x E ( G ) or v z E ( G ) by G [ { y , v , x , z } ] K 1 , 3 and z x E ( G ) . We claim that | N ( v ) { z , x } | = 1 , for otherwise, G [ { v , x , z , w } ] = K 1 , 3 , a contradiction. Without loss of generality, assume v x E ( G ) . It follows that G [ { x , y , v , z , w } ] = b u l l , a contradiction. Thus, N ( y ) = e p n ( y , S ) .
Since | S | 2 and G is connected, N G S ( y ) contains a vertex adjacent to some vertex in G S that has a neighbor in S \ { y } by N ( y ) = e p n ( y , S ) . Let x 1 N ( y ) ,   w 1 G S ,   w S \ { y } such that x 1 w 1 , w 1 w E ( G ) . By N ( y ) = e p n ( y , S ) , we have that x 1 w , w 1 y E ( G ) . We claim that w 1 x , w 1 z E ( G ) . Suppose on the contrary that w 1 x E ( G ) . Then, z w 1 E ( G ) by G [ { z , y , x , w 1 , w } ] P 5 and z x , w 1 y , z w , y w , x w E ( G ) . It follows that G [ { w 1 , x , z , w } ] = K 1 , 3 , a contradiction. Thus, w 1 x E ( G ) , which implies x x 1 . Similarly, w 1 z E ( G ) and z x 1 . We have x 1 u , for otherwise, G [ { u , w 1 , x , z } ] = K 1 , 3 , a contradiction. We obtain that x 1 x E ( G ) or x 1 z E ( G ) by G [ { y , x 1 , x , z } ] K 1 , 3 and x z E ( G ) . Moreover, we have | N ( x 1 ) { x , z } | = 1 , for otherwise, G [ { x 1 , w 1 , x , z } ] = K 1 , 3 , a contradiction. Without loss of generality, assume that x 1 z E ( G ) . Then, x 1 x E ( G ) , and hence, G [ { z , y , x 1 , x , w 1 } ] = b u l l , a contradiction. Thus, x e p n ( y , S ) for any vertex y S .
Claim 5.
There are two vertices x , y in S \ S such that d S ( x ) = d S ( y ) = 2 ; moreover, N S ( x ) = N S ( y ) .
Proof. 
Since S is a dominating set of G and S is an independent set of G, each vertex in S \ S is adjacent to some vertex in S \ S . Moreover, there are at least two vertices in S \ S that have a common neighbor in S by | S \ S | > | S \ S | . Let x , y S \ S , and z N S ( x ) N S ( y ) . Since S is an independent set with x , y S , we have x y E ( G ) . By Claim 4, x , y e p n ( z , S ) , and hence, min { d S ( x ) , d S ( y ) } 2 . Moreover, d S ( x ) = d S ( y ) = 2 since G is claw-free and S is an independent set of G.
Suppose on the contrary that N S ( x ) N S ( y ) . Let N S ( x ) = { z , u } and N S ( y ) = { z , v } . Clearly, v u , and z u , z v , u v , x v , x y , y u E ( G ) . Thus, G [ { u , x , z , y , v } ] = P 5 , a contradiction. It follows that x and y have two common neighbors in S .
Now, let us complete the proof of Theorem 4. By Claim 5, let v 1 , v 2 be in S \ S and u , v S such that N S ( v 1 ) = N S ( v 2 ) = { u , v } . Since v 1 , v 2 are in S and S is an independent set, we have v 1 v 2 E ( G ) . Let S = ( S \ { u , v } ) { v 1 , v 2 } . We have S is an independent set of G since S is an independent set of G ,   N S ( v 1 ) = N S ( v 2 ) = { u , v } and v 1 v 2 E ( G ) . For each vertex x N ( u ) N ( v ) , we have x v 1 E ( G ) or x v 2 E ( G ) by G [ { u ( v ) , x , v 1 , v 2 } ] K 1 , 3 and v 1 v 2 E ( G ) . Thus, S is a dominating set with | S |   =   | S | . By v i S and u , v N ( v i ) , i { 1 , 2 } , we have u , v S . Thus, | S S |   >   | S S | . Then, by the choice of S , we have S is not a co-secure dominating set of G. Thus, there is a vertex x in S such that r p n ( x , S ) = . We claim that x { v 1 , v 2 } .
Suppose on the contrary that x { v 1 , v 2 } and r p n ( x , S ) = . There are two non-adjacent vertices x 1 , x 2 in e p n ( x , S ) such that { x 1 , x 2 } ( N ( u ) N ( v ) ) by r p n ( x , S ) = . Without loss of generality, assume x 1 N ( u ) N ( v ) . Then, x 1 v 1 E ( G ) or x 1 v 2 E ( G ) since each vertex in N ( u ) N ( v ) is adjacent to v 1 or v 2 . Thus, d S ( x 1 ) 2 by x { v 1 , v 2 } , a contradiction to x 1 e p n ( x , S ) . It follows that x { v 1 , v 2 } . Without loss of generality, assume that x = v 1 . Then, x 1 v 2 , x 2 v 2 E ( G ) by x 1 , x 2 e p n ( v 1 , S ) . By G [ { v 1 , x 1 , x 2 , u } ] K 1 , 3 and x 1 x 2 E ( G ) , we have x 1 u E ( G ) or x 2 u E ( G ) . Without loss of generality, assume that x 1 u E ( G ) . Then, we have x 2 u E ( G ) , for otherwise, G [ { u , v 2 , x 1 , x 2 } ] = K 1 , 3 , a contradiction. Thus, G [ { x 1 , v 1 , u , x 2 , v 2 } ] = b u l l by x 1 x 2 , v 2 x 1 , v 2 x 2 , x 2 u , v 2 v 1 E ( G ) , a contradiction. Thus, Theorem 4 is true.
By Theorem 4, we obtain the following result, which characterizes a { c l a w , P 5 , b u l l } -free graph G with γ c s ( G ) = α ( G ) .
Corollary 1.
Let G be a { c l a w , P 5 , b u l l } -free graph such that δ ( G ) 1 and G F . Then, γ c s ( G ) = α ( G ) .
A cograph is a graph that contains no induced subgraph isomorphic to P 4 . Obviously, a cograph is P 5 -free. Then, by Theorem 4, we can obtain the following result.
Corollary 2.
Let G be a { c l a w , b u l l } -free cograph with δ ( G ) 1 and G F . Then γ c s ( G ) = α ( G ) .

3. Characterization of Claw-Free Graphs G with γ cs ( G ) = γ s ( G )

According to Problem 2 in Section 1, we characterize the claw-free graph G with γ c s ( G ) = γ s ( G ) in this section. By Theorem 2, for a graph G, if the minimum degree of G is at least 2, then γ c s ( G ) γ s ( G ) . For a claw-free graph, we can obtain the following result, in which the minimum degree can be decreased to 1. We will apply this result to the proof of the main result in this section.
Theorem 5.
If G is a claw-free graph and δ ( G ) 1 , then γ c s ( G ) γ s ( G ) .
Proof. 
It suffices to prove that there is a minimum secure dominating set of G such that it is also a co-secure domination set of G. If G is disconnected, then the minimum secure (resp. co-secure) domination number is the sum of the minimum secure (resp. co-secure) domination number of each component in G. Thus, without loss of generality, we assume that G is a connected claw-free graph. If G is complete, then we are done. Thus, we assume G is not complete. We prove the theorem by reduction to absurdity. Suppose to the contrary that each minimum secure dominating set of G is not a co-secure domination set of G. Firstly, we have the following result. □
Claim 6.
There is a vertex v in S such that all the neighbors of v are in S for every minimum secure dominating set S of G.
Proof. 
Suppose to the contrary that there is a minimum secure dominating set S of G such that each vertex in S has at least one neighbor in G S . Since S is not a co-secure dominating set of G, there is a vertex x S such that r p n ( x , S ) = .
If e p n ( x , S ) = , then each vertex in N G S ( x ) is in r p n ( x , S ) , a contradiction. Thus, e p n ( x , S ) . Since S is a secure dominating set, G [ e p n ( x , S ) ] is a clique, which implies e p n ( x , S ) r p n ( x , S ) , a contradiction. Thus, the claim is true. □
In the following proof, let S be a minimum secure dominating set of G such that G [ S ] contains the minimum number of edges among all the minimum secure dominating sets of G . By Claim 6, let v S such that N [ v ] S . Since δ ( G ) 1 ,   G [ S ] contains at least one edge. Then, | S | 2 . Let S = S \ { v } . Then, S is a dominating set of G by N [ v ] S . Clearly, | S |   <   | S | . By the minimality of | S | ,   S is not a secure dominating set of G. Thus, there is a vertex x in G S such that x r p n ( y , S ) for each neighbor y of x in S . By N [ v ] S , it is easy to verify that v is the exactly one vertex in G S such that v r p n ( y , S ) for every neighbor y of v in S . Thus, there is a vertex in e p n ( y , S ) that is non-adjacent to v for each neighbor y of v in S .
Let y N ( v ) and y 1 e p n ( y , S ) such that v y 1 E ( G ) . Clearly, y 1 e p n ( y , S ) . We claim that G [ N G S ( y ) ] is a clique. For two distinct vertices u 1 , u 2 N G S ( y ) , we have u 1 v , u 2 v E ( G ) by N [ v ] S , and hence, u 1 u 2 E ( G ) by G [ { y , u 1 , u 2 , v } ] K 1 , 3 . Thus, G [ N G S ( y ) ] is a clique.
Let S 1 = ( S \ { y } ) { y 1 } . Since G [ N G S ( y ) ] is a clique, S 1 is a dominating set of G with | S 1 | = | S | . Moreover, N S 1 ( x ) N S ( x ) { y 1 } for each vertex x in G S with x y E ( G ) , and N S 1 ( z ) = ( N S ( z ) \ { y } ) { y 1 } for each vertex in z N G S ( y ) . Thus, for each vertex x G S ,   x r p n ( x , S 1 ) for some neighbor x of x in S 1 \ { v , y 1 } if | S | 3 . Furthermore, it is easy to verify that y r p n ( v , S 1 ) and y r p n ( y 1 , S 1 ) . It follows that S 1 is a secure dominating set of G . Clearly, G [ S 1 ] contains fewer edges than G [ S ] , a contradiction. Thus, G contains a minimum secure dominating set that is also a co-secure dominating set of G , i.e., γ s ( G ) γ c s ( G ) .
Theorem 6.
If G is a { c l a w , b u l l , P 5 } -free graph with δ ( G ) 1 and α ( G ) 2 , then γ c s ( G ) = γ s ( G ) .
Proof. 
By Theorem 5, it suffices to prove that γ c s ( G ) γ s ( G ) . If G is complete, then we are done. We assume that G is not complete. Then, α ( G ) 3 by α ( G ) 2 . Without loss of generality, assume that G is connected. In the following, we will prove that G contains a minimum co-secure dominating set that is also a secure dominating set, and hence, γ c s ( G ) γ s ( G ) .
Note that G F by α ( G ) 2 . Thus, by Theorem 4, let S be a minimum co-secure dominating set of G such that S is a maximum independent set of G. If S is also a secure dominating set of G , then we are done. Thus, we assume that S is not a secure dominating set of G . Notice that | S | = α ( G ) 3 . Firstly, we have the following result.
Claim 7.
G [ e p n ( v , S ) ] is a clique if e p n ( v , S ) for a vertex v S .
Proof. 
Suppose to the contrary that v S and e p n ( v , S ) contains two distinct non-adjacent vertices v 1 , v 2 . Clearly, v i is non-adjacent to any vertex in S \ { v } by v i e p n ( v , S ) , for each i { 1 , 2 } . Let S = ( S \ { v } ) { v 1 , v 2 } . Then, S is an independent set of G with | S |   >   | S | , a contradiction to the choice that S is a maximum independent set of G. Thus, the claim is true. □
Since S is not a secure dominating set of G , in the following proof, let x G S such that x r p n ( y , S ) for each neighbor y of x in S . By Claim 7, if x e p n ( y , S ) for some vertex y S , then x r p n ( y , S ) , a contradiction. Thus, d S ( x ) 2 .
Let y 1 , y 2 N S ( x ) . Then, e p n ( y i , S ) and e p n ( y i , S ) contains at least one vertex that is non-adjacent to x by x r p n ( y i , S ) for each i { 1 , 2 } . Let z i e p n ( y i , S ) such that z i x E ( G ) for each i { 1 , 2 } . By z 1 e p n ( y 1 , S ) and z 2 e p n ( y 2 , S ) , we have z 1 y 2 , z 2 y 1 E ( G ) . Since S is an independent set of G, we have y 1 y 2 E ( G ) . Thus, z 1 z 2 E ( G ) by G [ { z 1 , y 1 , x , y 2 , z 2 } ] P 5 .
We claim that N S ( u ) { y 1 , y 2 } for each vertex u in N ( y 1 ) N ( y 2 ) . Note that N ( y 1 ) N ( y 2 ) G S since S is an independent set of G. Without loss of generality, suppose to the contrary that u 1 N ( y 1 ) , y 3 S \ { y 1 , y 2 } such that u 1 y 3 E ( G ) . Since S is an independent set of G and G is claw-free, we have N S ( u 1 ) = { y 1 , y 3 } and N S ( x ) = { y 1 , y 2 } , which implies u 1 x . Thus, u 1 y 2 , x y 3 E ( G ) . We have u 1 x E ( G ) by G [ { y 3 , u 1 , y 1 , x , y 2 } ] P 5 , which implies G [ { y 1 , u 1 , x , y 3 , y 2 } ] = b u l l , a contradiction. It follows that N S ( u ) { y 1 , y 2 } for each vertex u in N ( y 1 ) N ( y 2 ) .
Since | S | 3 and G is connected, there is a vertex in N ( y 1 ) N ( y 2 ) adjacent to some vertex in G S that has a neighbor in S \ { y 1 , y 2 } by N S ( u ) { y 1 , y 2 } for each vertex u in N ( y 1 ) N ( y 2 ) .
Without loss of generality, assume that u 1 N G S ( y 1 ) ,   v 1 G S , v 2 S \ { y 1 , y 2 } such that u 1 v 1 , v 1 v 2 E ( G ) . Then, x v 2 , v 1 y 1 , v 1 y 2 , u 1 v 2 E ( G ) , and x v 1 by N S ( u ) { y 1 , y 2 } for each vertex u in N ( y 1 ) N ( y 2 ) . We have v 1 x E ( G ) for otherwise, G [ x , v 1 , y 1 , y 2 ]   = K 1 , 3 by v 1 y 1 , v 1 y 2 , y 1 y 2 E ( G ) , a contradiction. It follows that u 1 x . We have u 1 x E ( G ) by G [ { v 2 , v 1 , u 1 , y 1 , x } ] = P 5 and v 1 y 1 , u 1 v 2 , y 1 v 2 , x v 2 , v 1 x E ( G ) . Moreover, we have u 1 y 2 E ( G ) by G [ { y 1 , u 1 , x , v 1 , y 2 } ] b u l l and v 1 x , v 1 y 1 , v 1 y 2 , y 1 y 2 E ( G ) . It follows that G [ { u 1 , v 1 , y 1 , y 2 } ] = K 1 , 3 , a contradiction. Thus, Theorem 6 is true.
Note that α ( G ) 2 is necessary in Theorem 6. Let G 1 , G 2 and G 3 be three vertex-disjoint graphs such that G 1 = K m 1 ,   G 2 = K m 2 , and G 3 = v 1 v 2 v 3 v 4 v 5 v 1 is a 5-cycle, where m 1 , m 2 1 . Let G be a graph (see Figure 4) obtained by joining every vertex in G 1 to each vertex { v 1 , v 4 , v 5 } of G 3 , and joining every vertex in G 2 to each vertex in { v 1 , v 2 , v 3 } of G 3 . Clearly, G is a { c l a w , b u l l , P 5 } -free graph with δ ( G ) 1 . It is easy to verify that α ( G ) = 2 ,   γ c s ( G ) = 2 , and γ s ( G ) = 3 .
It is obvious that α ( G ) = 2 for each graph G in F . Thus, by Corollary 1 and Theorem 6, we can obtain the following result.
Corollary 3.
Let G be a { c l a w , b u l l , P 5 } -free graph with δ ( G ) 1 and α ( G ) 2 . Then, γ c s ( G ) = α ( G ) = γ s ( G ) .
In the following, we characterize the relationship between the co-secure domination number and secure domination number of { c l a w , b u l l , Z 2 } -free graphs.
Theorem 7.
If G is a { c l a w , b u l l , Z 2 } -free graph with δ ( G ) 3 and α ( G ) 2 , then γ c s ( G ) = γ s ( G ) .
Proof. 
If G is complete, then we are done. Thus, we assume G is not complete, and then, α ( G ) 3 by α ( G ) 2 . By Theorem 2, it suffices to prove that γ c s ( G ) γ s ( G ) . As in the proof of Theorem 6, assume G is connected, and in the following proof, we show that G contains a minimum co-secure dominating set S such that S is also a secure dominating set of G.
By Theorem 3, let S be a minimum co-secure dominating set of G such that S is a maximum independent set of G. Then | S | 3 by α ( G ) 3 . If S is a secure dominating set of G , then we are done. Suppose to the contrary that S is not a secure dominating set of G . Let x be in G S such that x r p n ( y , S ) for each neighbor y of x in S . As in the proof of Claim 7 of Theorem 6, we can also obtain that G [ e p n ( v , S ) ] is a clique, and then e p n ( v , S ) r p n ( v , S ) if e p n ( v , S ) for a vertex v S . Thus, d S ( x ) 2 and e p n ( y , S ) contains a vertex that is non-adjacent to x for each neighbor y of x in S .
Let y 1 , y 2 N S ( x ) and z i e p n ( y i , S ) such that z i x E ( G ) for each i { 1 , 2 } .
We claim that N S ( u ) { y 1 , y 2 } for each vertex u in N ( y 1 ) N ( y 2 ) . Without loss of generality, suppose on the contrary that u 1 N S ( y 1 ) ,   v 1 S \ { y 1 , y 2 } such that u 1 v 1 E ( G ) by α ( G ) 3 . Since G is claw-free and S is an independent set, we have N S ( u 1 ) = { y 1 , v 1 } and N S ( x ) = { y 1 , y 2 } . Thus, u 1 x , and x v 1 , u 1 y 2 E ( G ) . Moreover, u 1 { z 1 , z 2 } by z 1 e p n ( y 1 , S ) and z 2 e p n ( y 2 , S ) . By G [ { y 1 , u 1 , z 1 , x } ] K 1 , 3 and x z 1 E ( G ) , we have u 1 x E ( G ) or z 1 u 1 E ( G ) . Suppose u 1 x E ( G ) . Then, G [ { y 1 , x , u 1 , y 2 , v 1 } ] = b u l l by y 1 y 2 , u 1 y 2 , x v 1 , v 1 y 1 , v 1 y 2 , x v 1 E ( G ) , a contradiction. Thus, u 1 x E ( G ) , and then, z 1 u 1 E ( G ) . It follows that G [ { z 1 , y 1 , u 1 , x , v 1 } ] = b u l l , a contradiction. Thus, N S ( u ) { y 1 , y 2 } for each vertex u in N ( y 1 ) N ( y 2 ) .
Since G is connected and | S | 3 , we have N ( y 1 ) N ( y 2 ) contains a vertex adjacent to some vertex in G S that has a neighbor in S \ { y 1 , y 2 } since G is connected. Without loss of generality, let u 1 N G S ( y 1 ) ,   u 2 G S ,   v S \ { y 1 , y 2 } such that u 1 u 2 , v u 2 E ( G ) . Then, u 1 v , u 2 y 1 , u 2 y 2 E ( G ) by N S ( u ) { y 1 , y 2 } for each vertex u in N ( y 1 ) N ( y 2 ) . We have u 2 x E ( G ) , for otherwise, G [ { x , u 2 , y 1 , y 2 } ] = K 1 , 3 , a contradiction. Thus, u 1 x 1 .
We have that u 1 x E ( G ) , for otherwise G [ { u 1 , x , y 1 , u 2 , v } ] = Z 2 , a contradiction. Moreover, we have u 1 y 2 E ( G ) , for otherwise G [ { u 1 , y 1 , y 2 , u 2 } ] = K 1 , 3 , a contradiction.
Since δ ( G ) 3 and u 1 x , let z N G S ( y 1 ) \ { u 1 , x } . Then, z x E ( G ) or z u 1 E ( G ) by G [ { y 1 , u 1 , x , z } ] K 1 , 3 and u 1 x E ( G ) . We have z v E ( G ) by N S ( u ) { y 1 , y 2 } for each vertex u in N ( y 1 ) N ( y 2 ) .
We claim that z u 1 E ( G ) . Otherwise, z u 2 E ( G ) by G [ { u 1 , z , y 1 , u 2 , v } ] Z 2 and u 2 y 1 , v y 1 , u 1 v , z v E ( G ) . Then, we have z y 2 E ( G ) , for otherwise G [ { z , u 2 , y 1 , y 2 } ] = K 1 , 3 , a contradiction. Thus, z x E ( G ) by G [ { y 1 , z , u 1 , x , y 2 } ] Z 2 and u 1 y 2 , y 1 y 2 , z y 2 , u 1 x E ( G ) . It follows that G [ { z , y 1 , x , u 2 , v } ] = Z 2 , a contradiction. Thus, z u 1 E ( G ) , and then, z x E ( G ) .
We have z u 2 E ( G ) by G [ { y 1 , x , z , u 1 , u 2 } ] Z 2 and z u 1 , u 1 x , u 2 x , u 2 y 1 E ( G ) . Thus, G [ { u 2 , u 1 , z , v } ] = K 1 , 3 , a contradiction. Thus, the theorem is true. □
In the following, we construct a { c l a w , b u l l , Z 2 } -free G with δ ( G ) 3 such that α ( G ) = 2 ,   γ c s ( G ) = 2 and γ s ( G ) = 3 , which shows that α ( G ) 2 is necessary in Theorem 7. Let H 1 and H 2 be two complete graphs of order m ,   m 2 , respectively, such that V ( H 1 ) = { u 1 , , u m } and V ( H 2 ) = { v 1 , , v m } . Assume that H 3 = K m 2 such that V ( H 3 ) = { w i j : 1 i ,   j m } . Let G 1 = H 1 H 2 . Suppose that H is a graph obtained by joining every vertex w i j of H 3 to each vertex in G 1 except u i of H 1 and v j of H 2 ,   1 i , j m . Let G be the graph (see Figure 5) with V ( G ) = { u , v } V ( H ) such that v u E ( G ) , u is adjacent to each vertex in V ( H 1 ) V ( H 3 ) of H , and v is adjacent to each vertex in V ( H 2 ) V ( H 3 ) of H .
By Theorem 3 and Theorem 7, we can obtain the following results.
Corollary 4.
Let G be a { c l a w , b u l l , Z 2 } -free graph with δ ( G ) 3 and α ( G ) 2 . Then, γ c s ( G ) = α ( G ) = γ s ( G ) .
Corollary 5.
Let G be a 3-connected { c l a w , b u l l , Z 2 } -free graph and α ( G ) 2 . Then, γ c s ( G ) = α ( G ) = γ s ( G ) .

4. Conclusions

Co-secure dominating sets can be applied to wireless sensor networks, network security, combinatorial optimization problems, and other fields. Claw-free graphs are beneficial for designing deadlock-free routing algorithms and simplifying communication protocols in supercomputer networks. Moreover, inspired by Arumugam et al.’s [9] questions on the co-secure domination number, in this paper, we characterize two classes of claw-free graphs such that their co-secure domination numbers equal the independence number and the secure domination number. The research on degree conditions of graphs are always the focus problems in graph theory, and the minimum degree affects the bound of co-secure domination number. Thus, we propose the question: What is the minimum degree δ ( G ) k such that if G is claw-free, then γ c s ( G ) = α ( G ) = γ s ( G ) ?

Author Contributions

Conceptualization, Y.Z. and J.Z.; methodology, X.C., J.Z. and S.J.; validation, X.C. and S.J.; writing—original draft preparation, X.C.; writing—review and editing, Y.Z. and S.J.; project administration, L.X. All authors have read and agreed to the published version of the manuscript.

Funding

This research is supported by the National Natural Science Foundation of China (Grant No. 11901268, No. 12131013) and the Fundamental Research Funds for the Universities of Liaoning Province (Grant No. LJ212410165065).

Data Availability Statement

No data, models, or code were generated or used during the study.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Bondy, J.; Murty, U. Graph Theory with Applications; American Elsevier: New York, NY, USA, 1976. [Google Scholar]
  2. Cockayne, E.; Grobler, P.; Gründlingh, W.; Munganga, J.; Vuuren, J. Protection of a graph. Util. Math. 2005, 67, 19–32. [Google Scholar]
  3. Araki, T.; Yumoto, I. On the secure domination numbers of maximal outerplanar graphs. Discrete Appl. Math. 2018, 236, 23–29. [Google Scholar] [CrossRef]
  4. Degawa, S.; Saito, A. A note on secure domination in C5-free graphs. Discrete Appl. Math. 2023, 333, 82–83. [Google Scholar] [CrossRef]
  5. Haythorpe, M.; Newcombe, A. The secure domination number of Cartesian products of small graphs with paths and cycles. Discrete Appl. Math. 2022, 309, 32–45. [Google Scholar] [CrossRef]
  6. Cockayne, E.; Favaron, O.; Mynhardt, C. Secure domination, weak Roman domination and forbidden subgraphs. Bull. Inst. Comb. Appl. 2003, 39, 87–100. [Google Scholar]
  7. Manjusha, P.; Chithra, M.R. Co-secure domination in mycielski graph. J. Comb. Math. Comb. Comput. 2020, 113, 289–297. [Google Scholar]
  8. Merouane, H.; Chellali, M. On secure domination in graphs. Inform. Process. Lett. 2015, 115, 786–790. [Google Scholar] [CrossRef]
  9. Arumugan, S.; Ebadi, K.; Manrique, M. Co-secure and secure domination in graphs. Util. Math. 2014, 94, 167–182. [Google Scholar]
  10. Joseph, A.; Sangeetha, V. Bounds on co-secure domination in graphs. Int. J. Math. Trends Technol. 2018, 55, 158–164. [Google Scholar] [CrossRef]
  11. Pothuvath, M.; Iyer, R.R.; Asiri, A.; Somasundaram, K. Co-secure domination in jump graphs for enhanced security. Mathematics 2024, 12, 3077. [Google Scholar] [CrossRef]
  12. Cui, J.; Li, T.; Zhang, J.; Chen, X.; Xiong, L. Co-secure domination number in some graphs. Axioms 2025, 14, 10. [Google Scholar] [CrossRef]
Figure 1. Two forbidden induced subgraphs in this paper.
Figure 1. Two forbidden induced subgraphs in this paper.
Mathematics 13 02426 g001
Figure 2. A c l a w -free graph G with γ c s ( G ) = 1 ,   α ( G ) = 2 and d ( u ) = d ( v ) = | V ( G ) | 1 .
Figure 2. A c l a w -free graph G with γ c s ( G ) = 1 ,   α ( G ) = 2 and d ( u ) = d ( v ) = | V ( G ) | 1 .
Mathematics 13 02426 g002
Figure 3. A { c l a w , b u l l , P 5 } -free graph but not Z 2 -free.
Figure 3. A { c l a w , b u l l , P 5 } -free graph but not Z 2 -free.
Mathematics 13 02426 g003
Figure 4. A { c l a w , P 5 , b u l l } -free graph G such that α ( G ) = 2 and γ c s ( G ) γ s ( G ) .
Figure 4. A { c l a w , P 5 , b u l l } -free graph G such that α ( G ) = 2 and γ c s ( G ) γ s ( G ) .
Mathematics 13 02426 g004
Figure 5. A { c l a w , b u l l , Z 2 } -free graph G with δ ( G ) 3 such that α ( G ) = 2 and γ c s ( G ) γ s ( G ) .
Figure 5. A { c l a w , b u l l , Z 2 } -free graph G with δ ( G ) 3 such that α ( G ) = 2 and γ c s ( G ) γ s ( G ) .
Mathematics 13 02426 g005
Table 1. Parameter in the bounds of the secure domination number of a graph G.
Table 1. Parameter in the bounds of the secure domination number of a graph G.
Graph ClassThe Parameter in the γ cs ( G ) -BoundReference
Path, cycle, wheel GThe order of G [9]
Tree GThe order and the number of leaves of G [9]
Connected graph G α ( G ) [9]
General graph GThe order of G and γ ( G ) [9]
General graph G with δ ( G ) 2 γ s ( G ) [9]
Friendship graph GThe order of G [10]
Jahangir graph GThe order of G [10]
Helm graph GThe order of G [10]
Jump graph GSpecific number [11]
Claw-free graph G α ( G ) , γ s ( G ) [12]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, Y.; Zhang, J.; Jing, S.; Chen, X.; Xiong, L. Characterization of Some Claw-Free Graphs in Co-Secure Domination Number. Mathematics 2025, 13, 2426. https://doi.org/10.3390/math13152426

AMA Style

Zhang Y, Zhang J, Jing S, Chen X, Xiong L. Characterization of Some Claw-Free Graphs in Co-Secure Domination Number. Mathematics. 2025; 13(15):2426. https://doi.org/10.3390/math13152426

Chicago/Turabian Style

Zhang, Yuexin, Jiayuan Zhang, Siwen Jing, Xiaodong Chen, and Liming Xiong. 2025. "Characterization of Some Claw-Free Graphs in Co-Secure Domination Number" Mathematics 13, no. 15: 2426. https://doi.org/10.3390/math13152426

APA Style

Zhang, Y., Zhang, J., Jing, S., Chen, X., & Xiong, L. (2025). Characterization of Some Claw-Free Graphs in Co-Secure Domination Number. Mathematics, 13(15), 2426. https://doi.org/10.3390/math13152426

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop