暂无分享,去创建一个
Indrajit Ray | Sutanay Choudhury | Pin-Yu Chen | Luke Rodriguez | Alfred Hero | A. Hero | Pin-Yu Chen | I. Ray | Sutanay Choudhury | Luke Rodriguez
[1] John Dunagan,et al. Active Graph Reachability Reduction for Network Security and Software Engineering , 2011, IJCAI.
[2] Indrajit Ray,et al. Action Recommendation for Cyber Resilience , 2015, SafeConfig@CCS.
[3] XiaoFeng Wang,et al. Upgrading Your Android, Elevating My Malware: Privilege Escalation through Mobile OS Updating , 2014, 2014 IEEE Symposium on Security and Privacy.
[4] Alfred O. Hero,et al. Assessing and safeguarding network resilience to nodal attacks , 2014, IEEE Communications Magazine.
[5] Lawrence B. Holder,et al. Towards a network-of-networks framework for cyber security , 2013, 2013 IEEE International Conference on Intelligence and Security Informatics.
[6] Bradley Malin,et al. Detecting Anomalous Insiders in Collaborative Information Systems , 2012, IEEE Transactions on Dependable and Secure Computing.
[7] Christos Faloutsos,et al. Fractional Immunization in Networks , 2013, SDM.
[8] Pili Hu,et al. How to Leak a 100-Million-Node Social Graph in Just One Week?-A Reflection on OAuth and API Design in Online Social Networks , 2014 .
[9] Chun-Ying Huang,et al. Decapitation via digital epidemics: a bio-inspired transmissive attack , 2016, IEEE Communications Magazine.
[10] Harriet Goldman,et al. Cyber resilience for mission assurance , 2011, 2011 IEEE International Conference on Technologies for Homeland Security (HST).
[11] Charles R. Johnson,et al. Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.
[12] Michalis Faloutsos,et al. Gelling, and melting, large graphs by edge manipulation , 2012, CIKM.
[13] Ranjita Bhagwan,et al. Baaz: A System for Detecting Access Control Misconfigurations , 2010, USENIX Security Symposium.
[14] Piet Demeester,et al. Resilience in multilayer networks , 1999, IEEE Commun. Mag..
[15] Kwang-Cheng Chen,et al. On Modeling Malware Propagation in Generalized Social Networks , 2011, IEEE Communications Letters.
[16] Mehran Mesbahi,et al. Controllability and Observability of Network-of-Networks via Cartesian Products , 2014, IEEE Transactions on Automatic Control.
[17] Hanghang Tong,et al. Inside the atoms: ranking on a network of networks , 2014, KDD.
[18] Kwang-Cheng Chen,et al. Optimal Control of Epidemic Information Dissemination Over Networks , 2014, IEEE Transactions on Cybernetics.
[19] Hanghang Tong,et al. MET: A Fast Algorithm for Minimizing Propagation in Large Graphs with Small Eigen-Gaps , 2015, SDM.
[20] Niels Provos,et al. Preventing Privilege Escalation , 2003, USENIX Security Symposium.
[21] Satoru Fujishige,et al. Submodular functions and optimization , 1991 .
[22] Ahmad-Reza Sadeghi,et al. Towards Taming Privilege-Escalation Attacks on Android , 2012, NDSS.
[23] Sacha Brostoff,et al. Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .
[24] Harry Eugene Stanley,et al. Robustness of a Network of Networks , 2010, Physical review letters.
[25] Hanghang Tong,et al. Make It or Break It: Manipulating Robustness in Large Networks , 2014, SDM.