Strategies for network security
暂无分享,去创建一个
[1] Hans J. Herrmann,et al. Mitigation of malicious attacks on networks , 2011, Proceedings of the National Academy of Sciences.
[2] N. Stanietsky,et al. The interaction of TIGIT with PVR and PVRL2 inhibits human NK cell cytotoxicity , 2009, Proceedings of the National Academy of Sciences.
[3] A. Vespignani,et al. Economic Networks: The New Challenges , 2009, Science.
[4] Albert-László Barabási,et al. Scale-Free Networks: A Decade and Beyond , 2009, Science.
[5] David D. Jensen,et al. Navigating networks by using homophily and degree , 2008, Proceedings of the National Academy of Sciences.
[6] E. Young. Contagion , 2015, New Scientist.
[7] Éva Tardos,et al. Influential Nodes in a Diffusion Model for Social Networks , 2005, ICALP.
[8] Moti Yung,et al. Proceedings of the 32nd international conference on Automata, Languages and Programming , 2005 .
[9] Massimo Marchiori,et al. Error and attacktolerance of complex network s , 2004 .
[10] S. Havlin,et al. Optimization of network robustness to waves of targeted and random attacks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[11] H. Stone,et al. Two-peak and three-peak optimal complex networks. , 2004, Physical review letters.
[12] A. Motter. Cascade control and defense in complex networks. , 2004, Physical review letters.
[13] Jon Kleinberg,et al. Maximizing the spread of influence through a social network , 2003, KDD '03.
[14] Reuven Cohen,et al. Efficient immunization strategies for computer networks and populations. , 2002, Physical review letters.
[15] Duncan J Watts,et al. A simple model of global cascades on random networks , 2002, Proceedings of the National Academy of Sciences of the United States of America.
[16] Reuven Cohen,et al. Cohen, Erez, ben-Avraham, and Havlin Reply: , 2001 .
[17] S. N. Dorogovtsev,et al. Comment on "breakdown of the Internet under intentional attack". , 2001, Physical Review Letters.
[18] Alessandro Vespignani,et al. Epidemic spreading in scale-free networks. , 2000, Physical review letters.
[19] S. Havlin,et al. Breakdown of the internet under intentional attack. , 2000, Physical review letters.
[20] P. Kaye. Infectious diseases of humans: Dynamics and control , 1993 .
[21] R. May,et al. Infectious Diseases of Humans: Dynamics and Control , 1991, Annals of Internal Medicine.
[22] C. Causer. The Art of War , 2011, IEEE Potentials.
[23] Reuven Cohen,et al. Reply: Cohen, Erez, ben-Avraham, and Havlin , 2001 .
[24] A. Barabasi,et al. Emergence of Scaling in Random Networks , 1999 .
[25] P. Erdos,et al. On the evolution of random graphs , 1984 .
[26] B. Bollobás. The evolution of random graphs , 1984 .
[27] P. Erdös. On random graphs, I , 1959 .