False Positive and False Negative Effects on Network Attacks
暂无分享,去创建一个
[1] Youki Kadobayashi,et al. Exploring attack graph for cost-benefit security hardening: A probabilistic approach , 2013, Comput. Secur..
[2] Zhao Yang Dong,et al. Exploring Reliable Strategies for Defending Power Systems Against Targeted Attacks , 2011, IEEE Transactions on Power Systems.
[3] Fernando M. V. Ramos,et al. Software-Defined Networking: A Comprehensive Survey , 2014, Proceedings of the IEEE.
[4] Harry Eugene Stanley,et al. The cost of attack in competing networks , 2015, Journal of The Royal Society Interface.
[5] Mario Ventresca,et al. Network robustness versus multi-strategy sequential attack , 2015, J. Complex Networks.
[6] Amir Bashan,et al. Localized attacks on spatially embedded networks with dependencies , 2015, Scientific Reports.
[7] Harry Eugene Stanley,et al. Percolation of localized attack on complex networks , 2014, ArXiv.
[8] Jure Leskovec,et al. Community Structure in Large Networks: Natural Cluster Sizes and the Absence of Large Well-Defined Clusters , 2008, Internet Math..
[9] Filippo Radicchi,et al. Percolation in real interdependent networks , 2015, Nature Physics.
[10] Christos Faloutsos,et al. Node Immunization on Large Graphs: Theory and Algorithms , 2016, IEEE Transactions on Knowledge and Data Engineering.
[11] Shouhuai Xu,et al. Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks , 2017 .
[12] Harry Eugene Stanley,et al. Catastrophic cascade of failures in interdependent networks , 2009, Nature.
[13] Jean-Loup Guillaume,et al. Impact of random failures and attacks on Poisson and power-law random networks , 2009, ACM Comput. Surv..
[14] Dan Braha,et al. From Centrality to Temporary Fame: Dynamic Centrality in Complex Networks , 2006, Complex..
[15] David B. Dunson,et al. Bayesian Data Analysis , 2010 .
[16] Ing-Ray Chen,et al. Adaptive Network Defense Management for Countering Smart Attack and Selective Capture in Wireless Sensor Networks , 2015, IEEE Transactions on Network and Service Management.
[17] Yilun Shang,et al. Localized recovery of complex networks against failure , 2016, Scientific Reports.
[18] S. Havlin,et al. Breakdown of the internet under intentional attack. , 2000, Physical review letters.
[19] Yilun Shang,et al. Subgraph Robustness of Complex Networks Under Attacks , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[20] Sergey N. Dorogovtsev,et al. Evolution of Networks: From Biological Nets to the Internet and WWW (Physics) , 2003 .
[21] Albert-László Barabási,et al. Error and attack tolerance of complex networks , 2000, Nature.
[22] Shui Yu,et al. Predicted Packet Padding for Anonymous Web Browsing Against Traffic Analysis Attacks , 2012, IEEE Transactions on Information Forensics and Security.
[23] S. Bornholdt,et al. Scale-free topology of e-mail networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[24] Mark Newman,et al. Networks: An Introduction , 2010 .
[25] Shlomo Havlin,et al. How breadth of degree distribution influences network robustness: comparing localized and random attacks. , 2015, Physical review. E, Statistical, nonlinear, and soft matter physics.
[26] D S Callaway,et al. Network robustness and fragility: percolation on random graphs. , 2000, Physical review letters.
[27] Vinko Zlatic,et al. Robustness and assortativity for diffusion-like processes in scale-free networks , 2011, ArXiv.
[28] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[29] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[30] Reuven Cohen,et al. Stability and topology of scale-free networks under attack and defense strategies. , 2005, Physical review letters.
[31] H. Stanley,et al. Structure of shells in complex networks. , 2009, Physical review. E, Statistical, nonlinear, and soft matter physics.
[32] Harry Eugene Stanley,et al. $k$-core percolation on complex networks: Comparing random, localized and targeted attacks , 2016, Physical review. E.
[33] Kevin A. Kwiat,et al. Improving System Reliability Against Rational Attacks Under Given Resources , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[34] Reuven Cohen,et al. Efficient immunization strategies for computer networks and populations. , 2002, Physical review letters.
[35] Harry Eugene Stanley,et al. Assortativity Decreases the Robustness of Interdependent Networks , 2012, Physical review. E, Statistical, nonlinear, and soft matter physics.
[36] Béla Bollobás,et al. Random Graphs , 1985 .
[37] Marc Barthelemy,et al. Spatial Networks , 2010, Encyclopedia of Social Network Analysis and Mining.
[38] T. Killingback,et al. Attack Robustness and Centrality of Complex Networks , 2013, PloS one.
[39] Harry Eugene Stanley,et al. Robustness of interdependent networks under targeted attack , 2010, Physical review. E, Statistical, nonlinear, and soft matter physics.
[40] Yilun Shang,et al. Vulnerability of networks: fractional percolation on random graphs. , 2014, Physical review. E, Statistical, nonlinear, and soft matter physics.
[41] H. Stanley,et al. Breakdown of interdependent directed networks , 2016, Proceedings of the National Academy of Sciences.
[42] H E Stanley,et al. Classes of small-world networks. , 2000, Proceedings of the National Academy of Sciences of the United States of America.
[43] M. Newman,et al. Random graphs with arbitrary degree distributions and their applications. , 2000, Physical review. E, Statistical, nonlinear, and soft matter physics.
[44] Yilun Shang,et al. Degree distribution dynamics for disease spreading with individual awareness , 2015, J. Syst. Sci. Complex..
[45] Piet Van Mieghem,et al. Epidemic processes in complex networks , 2014, ArXiv.