Text this: Identifying important nodes affecting network security in complex networks