Strategies for network security
暂无分享,去创建一个
[1] S. Havlin,et al. Breakdown of the internet under intentional attack. , 2000, Physical review letters.
[2] Reuven Cohen,et al. Efficient immunization strategies for computer networks and populations. , 2002, Physical review letters.
[3] Hans J. Herrmann,et al. Mitigation of malicious attacks on networks , 2011, Proceedings of the National Academy of Sciences.
[4] Paul Erdös,et al. On random graphs, I , 1959 .
[5] Moti Yung,et al. Proceedings of the 32nd international conference on Automata, Languages and Programming , 2005 .
[6] Reuven Cohen,et al. Cohen, Erez, ben-Avraham, and Havlin Reply: , 2001 .
[7] Massimo Marchiori,et al. Error and attacktolerance of complex network s , 2004 .
[8] Abhijit Sarkar,et al. Two-peak and three-peak optimal complex networks. , 2004, Physical review letters.
[9] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[10] Éva Tardos,et al. Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..
[11] Adilson E Motter. Cascade control and defense in complex networks. , 2004, Physical review letters.
[12] Alessandro Vespignani,et al. Epidemic spreading in scale-free networks. , 2000, Physical review letters.
[13] S. Havlin,et al. Optimization of network robustness to waves of targeted and random attacks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[14] Albert-László Barabási,et al. Scale-Free Networks: A Decade and Beyond , 2009, Science.
[15] E. Young. Contagion , 2015, New Scientist.
[16] Reuven Cohen,et al. Reply: Cohen, Erez, ben-Avraham, and Havlin , 2001 .
[17] R. May,et al. Infectious Diseases of Humans: Dynamics and Control , 1991, Annals of Internal Medicine.
[18] Duncan J Watts,et al. A simple model of global cascades on random networks , 2002, Proceedings of the National Academy of Sciences of the United States of America.
[19] S N Dorogovtsev,et al. Comment on "breakdown of the Internet under intentional attack". , 2001, Physical review letters.
[20] P. Kaye. Infectious diseases of humans: Dynamics and control , 1993 .
[21] B. Bollobás. The evolution of random graphs , 1984 .
[22] David D. Jensen,et al. Navigating networks by using homophily and degree , 2008, Proceedings of the National Academy of Sciences.
[23] Éva Tardos,et al. Influential Nodes in a Diffusion Model for Social Networks , 2005, ICALP.
[24] N. Stanietsky,et al. The interaction of TIGIT with PVR and PVRL2 inhibits human NK cell cytotoxicity , 2009, Proceedings of the National Academy of Sciences.
[25] Sun Tzu. Sun Tzu - The Art of War , 2008 .
[26] P. Erdos,et al. On the evolution of random graphs , 1984 .