Strategies for network security

[1]  Hans J. Herrmann,et al.  Mitigation of malicious attacks on networks , 2011, Proceedings of the National Academy of Sciences.

[2]  N. Stanietsky,et al.  The interaction of TIGIT with PVR and PVRL2 inhibits human NK cell cytotoxicity , 2009, Proceedings of the National Academy of Sciences.

[3]  A. Vespignani,et al.  Economic Networks: The New Challenges , 2009, Science.

[4]  Albert-László Barabási,et al.  Scale-Free Networks: A Decade and Beyond , 2009, Science.

[5]  David D. Jensen,et al.  Navigating networks by using homophily and degree , 2008, Proceedings of the National Academy of Sciences.

[6]  E. Young Contagion , 2015, New Scientist.

[7]  Éva Tardos,et al.  Influential Nodes in a Diffusion Model for Social Networks , 2005, ICALP.

[8]  Moti Yung,et al.  Proceedings of the 32nd international conference on Automata, Languages and Programming , 2005 .

[9]  Massimo Marchiori,et al.  Error and attacktolerance of complex network s , 2004 .

[10]  S. Havlin,et al.  Optimization of network robustness to waves of targeted and random attacks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[11]  H. Stone,et al.  Two-peak and three-peak optimal complex networks. , 2004, Physical review letters.

[12]  A. Motter Cascade control and defense in complex networks. , 2004, Physical review letters.

[13]  Jon Kleinberg,et al.  Maximizing the spread of influence through a social network , 2003, KDD '03.

[14]  Reuven Cohen,et al.  Efficient immunization strategies for computer networks and populations. , 2002, Physical review letters.

[15]  Duncan J Watts,et al.  A simple model of global cascades on random networks , 2002, Proceedings of the National Academy of Sciences of the United States of America.

[16]  Reuven Cohen,et al.  Cohen, Erez, ben-Avraham, and Havlin Reply: , 2001 .

[17]  S. N. Dorogovtsev,et al.  Comment on "breakdown of the Internet under intentional attack". , 2001, Physical Review Letters.

[18]  Alessandro Vespignani,et al.  Epidemic spreading in scale-free networks. , 2000, Physical review letters.

[19]  S. Havlin,et al.  Breakdown of the internet under intentional attack. , 2000, Physical review letters.

[20]  P. Kaye Infectious diseases of humans: Dynamics and control , 1993 .

[21]  R. May,et al.  Infectious Diseases of Humans: Dynamics and Control , 1991, Annals of Internal Medicine.

[22]  C. Causer The Art of War , 2011, IEEE Potentials.

[23]  Reuven Cohen,et al.  Reply: Cohen, Erez, ben-Avraham, and Havlin , 2001 .

[24]  A. Barabasi,et al.  Emergence of Scaling in Random Networks , 1999 .

[25]  P. Erdos,et al.  On the evolution of random graphs , 1984 .

[26]  B. Bollobás The evolution of random graphs , 1984 .

[27]  P. Erdös On random graphs, I , 1959 .