Optimal resource allocation to defend against deliberate attacks in networking infrastructures
暂无分享,去创建一个
Chunming Qiao | Minming Li | Xun Xiao | Jianping Wang | C. Qiao | Minming Li | Jianping Wang | Xun Xiao
[1] George C. Polyzos,et al. Traffic characteristics of the T1 NSFNET backbone , 1993, IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings.
[2] William Stallings,et al. Cryptography and network security , 1998 .
[3] Eytan Modiano,et al. Assessing the Vulnerability of the Fiber Infrastructure to Disasters , 2009, IEEE INFOCOM 2009.
[4] J. Gross,et al. Graph Theory and Its Applications , 1998 .
[5] S. Skaperdas. Contest success functions , 1996 .
[6] M. Morari,et al. Geometric Algorithm for Multiparametric Linear Programming , 2003 .
[7] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[8] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.
[9] R. Kevin Wood,et al. Shortest‐path network interdiction , 2002, Networks.
[10] Guoliang Xue,et al. Circuits/Cutsets Duality and a Unified Algorithmic Framework for Survivable Logical Topology Design in IP-over-WDM Optical Networks , 2009, IEEE INFOCOM 2009.
[11] D. Marquis,et al. Assessing Network Infrastructure Vulnerabilities to Physical Layer Attacks , 1999 .
[12] Suresh Subramaniam,et al. Survivability in optical networks , 2000, IEEE Netw..
[13] Rocky K. C. Chang,et al. Defending against flooding-based distributed denial-of-service attacks: a tutorial , 2002, IEEE Commun. Mag..
[14] Efstratios N. Pistikopoulos,et al. Linear Model Predictive Control via Multiparametric Programming , 2014 .
[15] R. Powell. Defending against Terrorist Attacks with Limited Resources , 2007, American Political Science Review.
[16] Samuel Bowles,et al. Microeconomics: Behavior, Institutions, and Evolution , 2003 .
[17] Francisco Facchinei,et al. Generalized Nash Equilibrium Problems , 2010, Ann. Oper. Res..
[18] David K. Smith. Network Flows: Theory, Algorithms, and Applications , 1994 .
[19] Muriel Medard,et al. Security issues in all-optical networks , 1997 .
[20] White House Administrative Office. The national strategy for the physical protection of critical infrastructures and key assets , 2003 .