Bounds on service quality for networks subject to augmentation and attack
暂无分享,去创建一个
[1] Walter Willinger,et al. Towards a Theory of Scale-Free Graphs: Definition, Properties, and Implications , 2005, Internet Math..
[2] Ellen W. Zegura,et al. Trading latency for energy in densely deployed wireless ad hoc networks using message ferrying , 2007, Ad Hoc Networks.
[3] Ellen W. Zegura,et al. Capacity Enhancement using Throwboxes in DTNs , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[4] Jean-Loup Guillaume,et al. Comparison of Failures and Attacks on Random and Scale-Free Networks , 2004, OPODIS.
[5] S. Havlin,et al. Breakdown of the internet under intentional attack. , 2000, Physical review letters.
[6] Nick Feamster,et al. Understanding the network-level behavior of spammers , 2006, SIGCOMM 2006.
[7] Christos H. Papadimitriou,et al. Heuristically Optimized Trade-Offs: A New Paradigm for Power Laws in the Internet , 2002, ICALP.
[8] Alan T. Murray,et al. Comparative Approaches for Assessing Network Vulnerability , 2008 .
[9] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[10] Xiaodong Lin,et al. SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks , 2009, IEEE Transactions on Vehicular Technology.
[11] G. B. A. Barab'asi. Competition and multiscaling in evolving networks , 2000, cond-mat/0011029.
[12] Dave Katz,et al. Application of the Border Gateway Protocol in the Internet , 1990, RFC.
[13] Bruce Hendrickson,et al. The Chaco user`s guide. Version 1.0 , 1993 .
[14] Pan Hui,et al. Pocket switched networks and human mobility in conference environments , 2005, WDTN '05.
[15] Andrew B. Kahng,et al. New spectral methods for ratio cut partitioning and clustering , 1991, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[16] Yih-Chun Hu,et al. SPV: secure path vector routing for securing BGP , 2004, SIGCOMM.
[17] Panos M. Pardalos,et al. Detecting critical nodes in sparse graphs , 2009, Comput. Oper. Res..
[18] Arun Venkataramani,et al. Interactive wifi connectivity for moving vehicles , 2008, SIGCOMM '08.
[19] Walter Willinger,et al. A first-principles approach to understanding the internet's router-level topology , 2004, SIGCOMM '04.
[20] A. Barabasi,et al. Scale-free characteristics of random networks: the topology of the world-wide web , 2000 .
[21] Ralf Diekmann,et al. The PARTY Partitioning Library User Guide - Version 1.1 , 1996 .
[22] Thomas Erlebach,et al. On the Spectrum and Structure of Internet Topology Graphs , 2002, IICS.
[23] Martine D. F. Schlag,et al. Spectral K-Way Ratio-Cut Partitioning and Clustering , 1993, 30th ACM/IEEE Design Automation Conference.
[24] F. Chung,et al. Eigenvalues of Random Power law Graphs , 2003 .
[25] Curt Jones,et al. Finding Good Approximate Vertex and Edge Partitions is NP-Hard , 1992, Inf. Process. Lett..
[26] Hari Balakrishnan,et al. Cabernet: vehicular content delivery using WiFi , 2008, MobiCom '08.
[27] Carl A. Gunter,et al. Denial in DTNs , 2010 .
[28] David M. Pennock,et al. Static and dynamic analysis of the Internet's susceptibility to faults and attacks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[29] J.J. Garcia-Luna-Aceves,et al. Securing the border gateway routing protocol , 1996, Proceedings of GLOBECOM'96. 1996 IEEE Global Telecommunications Conference.
[30] Béla Bollobás,et al. Mathematical results on scale‐free random graphs , 2005 .
[31] A. Hoffman,et al. Lower bounds for the partitioning of graphs , 1973 .
[32] Damien Magoni,et al. Tearing down the Internet , 2003, IEEE J. Sel. Areas Commun..
[33] Dmitri V. Krioukov,et al. Revealing the Autonomous System Taxonomy: The Machine Learning Approach , 2006, ArXiv.
[34] Anthony Bonato,et al. A Survey of Models of the Web Graph , 2004, CAAN.
[35] Donald F. Towsley,et al. Relays, base stations, and meshes: enhancing mobile networks with infrastructure , 2008, MobiCom '08.
[36] Shi Zhou,et al. The missing links in the BGP-based AS connectivity maps , 2003, ArXiv.
[37] F. Chung,et al. Weighted graph Laplacians and isoperimetric inequalities , 2000 .
[38] Patrick D. McDaniel,et al. Optimizing BGP security by exploiting path stability , 2006, CCS '06.
[39] Norbert Sensen,et al. Lower Bounds and Exact Algorithms for the Graph Partitioning Problem Using Multicommodity Flows , 2001, ESA.
[40] Stephen P. Boyd,et al. Semidefinite Programming , 1996, SIAM Rev..
[41] Brian Neil Levine,et al. An Energy-Efficient Architecture for DTN Throwboxes , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[42] Evangelos Kranakis,et al. Pretty Secure BGP, psBGP , 2005, NDSS.
[43] Satish Rao,et al. Graph partitioning using single commodity flows , 2006, STOC '06.
[44] Jie Wu,et al. Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets , 2009, IEEE INFOCOM 2009.
[45] M. Amin,et al. Security challenges for the electricity infrastructure , 2002 .
[46] Ling-Jyh Chen,et al. A hybrid routing approach for opportunistic networks , 2006, CHANTS '06.
[47] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[48] Jörg Widmer,et al. Network coding for efficient communication in extreme networks , 2005, WDTN '05.
[49] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[50] Gary L. Miller,et al. On the performance of spectral graph partitioning methods , 1995, SODA '95.
[51] Albert-László Barabási,et al. Error and attack tolerance of complex networks , 2000, Nature.
[52] Satish Rao,et al. Expander flows, geometric embeddings and graph partitioning , 2004, STOC '04.
[53] S. Bezrukov. Edge Isoperimetric Problems on Graphs , 2007 .
[54] Béla Bollobás,et al. Robustness and Vulnerability of Scale-Free Random Graphs , 2004, Internet Math..
[55] Taieb Znati,et al. On Approximation of New Optimization Methods for Assessing Network Vulnerability , 2010, 2010 Proceedings IEEE INFOCOM.
[56] Christos Gkantsidis,et al. Spectral analysis of Internet topologies , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[57] Adrian Perrig,et al. Modeling adoptability of secure BGP protocol , 2006, SIGCOMM 2006.
[58] Arun Venkataramani,et al. Enhancing interactive web applications in hybrid networks , 2008, MobiCom '08.
[59] Lixin Gao,et al. Estimation based erasure-coding routing in delay tolerant networks , 2006, IWCMC '06.
[60] D S Callaway,et al. Network robustness and fragility: percolation on random graphs. , 2000, Physical review letters.
[61] Steven M. Bellovin,et al. Using Link Cuts to Attack Internet Routing , 2003 .
[63] A. Barabasi,et al. Hierarchical Organization of Modularity in Metabolic Networks , 2002, Science.
[64] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[65] Massoud Amin. North America's Electricity Infrastructure: Are We Ready for More Perfect Storms? , 2003, IEEE Secur. Priv..
[66] Adrian Perrig,et al. Modeling adoptability of secure BGP protocols , 2006, SIGMETRICS '06/Performance '06.
[67] Noga Alon,et al. Spectral Techniques in Graph Algorithms , 1998, LATIN.
[68] A. Seary,et al. Partitioning Networks by Eigenvectors , 2004 .
[69] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[70] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[71] M. Fiedler. Algebraic connectivity of graphs , 1973 .
[72] Alex Pothen,et al. PARTITIONING SPARSE MATRICES WITH EIGENVECTORS OF GRAPHS* , 1990 .
[73] Walter Willinger,et al. What Causal Forces Shape Internet Connectivity at the AS-level? , 2003 .
[74] Brian Gallagher,et al. MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[75] Ellen W. Zegura,et al. Hierarchical power management in disruption tolerant networks with traffic-aware optimization , 2006, CHANTS '06.
[76] Christian Wewetzer,et al. Data aggregation and roadside unit placement for a vanet traffic information system , 2008, VANET '08.
[77] Vinny Cahill,et al. When TCP Breaks: Delay- and Disruption- Tolerant Networking , 2006, IEEE Internet Computing.
[78] Cauligi S. Raghavendra,et al. Spray and wait: an efficient routing scheme for intermittently connected mobile networks , 2005, WDTN '05.
[79] Adrian Perrig,et al. Security in wireless sensor networks - eScholarship , 2004 .
[80] Ahmad Al Hanbali,et al. Delay and resource analysis in MANETs in presence of throwboxes , 2007, Perform. Evaluation.
[81] Albert-László Barabási,et al. Scale‐Free and Hierarchical Structures in Complex Networks , 2003 .
[82] Walter Willinger,et al. Internet connectivity at the AS-level: an optimization-driven modeling approach , 2003, MoMeTools '03.
[83] Arnold L. Rosenberg,et al. Graph Separators, with Applications , 2001, Frontiers of Computer Science.
[84] Stephen T. Kent,et al. Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues , 2000, NDSS.
[85] Jörg Ott,et al. Controlling resource hogs in mobile delay-tolerant networks , 2010, Comput. Commun..
[86] Yee Wei Law,et al. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2005, TOSN.
[87] Lixin Gao. On inferring autonomous system relationships in the internet , 2001, TNET.
[88] E. Schwartz,et al. Isoperimetric Graph Partitioning for Data Clustering and Image Segmentation , 2003 .
[89] William A. Arbaugh,et al. Your 80211 wireless network has no clothes , 2002, IEEE Wirel. Commun..
[90] Fan Chung Graham,et al. Diameter bounds for altered graphs , 1984, J. Graph Theory.
[91] A. Hoffman,et al. Partitioning, Spectra and Linear Programming , 1984 .
[92] Walter Willinger,et al. Understanding Internet topology: principles, models, and validation , 2005, IEEE/ACM Transactions on Networking.
[93] Alan M. Frieze,et al. Adversarial deletion in a scale free random graph process , 2005, SODA '05.
[94] M. Fiedler. A property of eigenvectors of nonnegative symmetric matrices and its application to graph theory , 1975 .
[95] Yong Wang,et al. Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with ZebraNet , 2002, ASPLOS X.
[96] Michalis Faloutsos,et al. On power-law relationships of the Internet topology , 1999, SIGCOMM '99.
[97] Margaret Martonosi,et al. Erasure-coding based routing for opportunistic networks , 2005, WDTN '05.
[98] Arun Venkataramani,et al. DTN routing as a resource allocation problem , 2007, SIGCOMM '07.
[99] Michael William Newman,et al. The Laplacian spectrum of graphs , 2001 .
[100] Timur Friedman,et al. DTN routing in a mobility pattern space , 2005, WDTN '05.
[101] Roger Stough,et al. The Revenge of Distance: Vulnerability Analysis of Critical Information Infrastructure , 2003, cond-mat/0310427.
[102] Robert Elsässer,et al. New spectral bounds on k-partitioning of graphs , 2001, SPAA '01.
[103] Ying-Cheng Lai,et al. Complex networks: Dynamics and security , 2005 .
[104] Shi Zhou,et al. Redundancy and Robustness of the AS-level Internet topology and its models , 2004, ArXiv.
[105] Chris H. Q. Ding,et al. A spectral method to separate disconnected and nearly-disconnected web graph components , 2001, KDD '01.
[106] Qing Zhao,et al. Semidefinite Programming Relaxations for the Graph Partitioning Problem , 1999, Discret. Appl. Math..
[107] A. L. O N. On the edge-expansion of graphs , 2002 .
[108] FaloutsosMichalis,et al. On power-law relationships of the Internet topology , 1999 .
[109] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.
[110] Frank Thomson Leighton,et al. Multicommodity max-flow min-cut theorems and their use in designing approximation algorithms , 1999, JACM.
[111] Jon M. Kleinberg,et al. Detecting a Network Failure , 2004, Internet Math..
[112] Rabin K. Patra,et al. Using redundancy to cope with failures in a delay tolerant network , 2005, SIGCOMM '05.
[113] B. Mohar. THE LAPLACIAN SPECTRUM OF GRAPHS y , 1991 .
[114] Aleksandrs Slivkins,et al. Network failure detection and graph connectivity , 2004, SODA '04.
[115] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[116] William A. Arbaugh,et al. YOUR 802.11 WIRELESS NETWORK HAS NO CLOTHES , 2001 .
[117] kc claffy,et al. Internet topology: connectivity of IP graphs , 2001, SPIE ITCom.
[118] S. Low,et al. The "robust yet fragile" nature of the Internet. , 2005, Proceedings of the National Academy of Sciences of the United States of America.
[119] S. Chakrabarti,et al. QoS issues in ad hoc wireless networks , 2001, IEEE Commun. Mag..
[120] Fan Chung,et al. Graphs with small diameter after edge deletion , 1992 .
[121] Sandra L. Murphy,et al. BGP Security Vulnerabilities Analysis , 2006, RFC.
[122] Oliver Brock,et al. MV routing and capacity building in disruption tolerant networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[123] J M Carlson,et al. Highly optimized tolerance: a mechanism for power laws in designed systems. , 1999, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.
[124] Beom Jun Kim,et al. Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[125] J. J. Garcia-Luna-Aceves,et al. Securing distance-vector routing protocols , 1997, Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security.
[126] Alex Pentland,et al. DakNet: rethinking connectivity in developing nations , 2004, Computer.
[127] B. Mohar,et al. Eigenvalues in Combinatorial Optimization , 1993 .
[128] Heejo Lee,et al. Attack Resiliency of Network Topologies , 2004, PDCAT.
[129] Danny Dolev,et al. Internet resiliency to attacks and failures under BGP policy routing , 2006, Comput. Networks.
[130] Elizabeth M. Belding-Royer,et al. Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.
[131] Anthony H. Dekker,et al. Network Robustness and Graph Topology , 2004, ACSC.
[132] Albert-Laszlo Barabasi,et al. Deterministic scale-free networks , 2001 .