Resistance maximization principle for defending networks against virus attack
暂无分享,去创建一个
[1] Jure Leskovec,et al. Learning to Discover Social Circles in Ego Networks , 2012, NIPS.
[2] R. May,et al. Infectious Diseases of Humans: Dynamics and Control , 1991, Annals of Internal Medicine.
[3] Haifeng Li,et al. Error aware multiple vertical planes based visual localization for mobile robots in urban environments , 2015, Science China Information Sciences.
[4] Duncan J Watts,et al. A simple model of global cascades on random networks , 2002, Proceedings of the National Academy of Sciences of the United States of America.
[5] S. Havlin,et al. Optimization of network robustness to waves of targeted and random attacks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[6] Angsheng Li,et al. Three-Dimensional Gene Map of Cancer Cell Types: Structural Entropy Minimisation Principle for Defining Tumour Subtypes , 2016, Scientific Reports.
[7] S. Havlin,et al. Breakdown of the internet under intentional attack. , 2000, Physical review letters.
[8] Angsheng Li,et al. Homophyly/Kinship Model: Naturally Evolving Networks , 2015, Scientific Reports.
[9] Lin Liu,et al. Low temperature deformation behavior of an electromagnetically bulged 5052 aluminum alloy , 2016, Scientific Reports.
[10] Wei Zhang,et al. Strategies for network security , 2014, Science China Information Sciences.
[11] Angsheng Li,et al. A Theory of Network Security: Principles of Natural Selection and Combinatorics , 2016, Internet Math..
[12] B. Bollobás. The evolution of random graphs , 1984 .
[13] Albert-László Barabási,et al. Universal resilience patterns in complex networks , 2016, Nature.
[14] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[15] Albert-László Barabási,et al. Error and attack tolerance of complex networks , 2000, Nature.
[16] Abhijit Sarkar,et al. Two-peak and three-peak optimal complex networks. , 2004, Physical review letters.
[17] Angsheng Li,et al. Resistance and Security Index of Networks: Structural Information Perspective of Network Security , 2016, Scientific Reports.
[18] Angsheng Li,et al. Discovering natural communities in networks , 2015 .
[19] Albert-László Barabási,et al. Scale-Free Networks: A Decade and Beyond , 2009, Science.
[20] Reuven Cohen,et al. Efficient immunization strategies for computer networks and populations. , 2002, Physical review letters.
[21] Éva Tardos,et al. Influential Nodes in a Diffusion Model for Social Networks , 2005, ICALP.
[22] Adilson E Motter. Cascade control and defense in complex networks. , 2004, Physical review letters.
[23] Alessandro Vespignani,et al. Epidemic spreading in scale-free networks. , 2000, Physical review letters.
[24] Jon Kleinberg,et al. Maximizing the spread of influence through a social network , 2003, KDD '03.
[25] Angsheng Li,et al. Structural Information and Dynamical Complexity of Networks , 2016, IEEE Transactions on Information Theory.
[26] Hans J. Herrmann,et al. Mitigation of malicious attacks on networks , 2011, Proceedings of the National Academy of Sciences.
[27] Tingting Li,et al. A Dual Role of Graphene Oxide Sheet Deposition on Titanate Nanowire Scaffolds for Osteo-implantation: Mechanical Hardener and Surface Activity Regulator , 2015, Scientific Reports.