On the Discovery of Critical Links and Nodes for Assessing Network Vulnerability
暂无分享,去创建一个
Nam P. Nguyen | Ying Xuan | My T. Thai | Yilin Shen | M. Thai | Yilin Shen | Ying Xuan
[1] Panos M. Pardalos,et al. On New Approaches of Assessing Network Vulnerability: Hardness and Approximation , 2012, IEEE/ACM Transactions on Networking.
[2] Leslie G. Valiant,et al. Universality considerations in VLSI circuits , 1981, IEEE Transactions on Computers.
[3] Heejo Lee,et al. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets , 2001, SIGCOMM '01.
[4] Aravind Srinivasan,et al. Structural and algorithmic aspects of massive social networks , 2004, SODA '04.
[5] Panos M. Pardalos,et al. Detecting critical nodes in sparse graphs , 2009, Comput. Oper. Res..
[6] J. Håstad. Clique is hard to approximate withinn1−ε , 1999 .
[7] Mihalis Yannakakis,et al. The Complexity of Multiterminal Cuts , 1994, SIAM J. Comput..
[8] G. Nemhauser,et al. Integer Programming , 2020 .
[9] Mark A. Shayman,et al. On pairwise connectivity of wireless multihop networks , 2007, Int. J. Secur. Networks.
[10] L. da F. Costa,et al. Characterization of complex networks: A survey of measurements , 2005, cond-mat/0505185.
[11] Alan T. Murray,et al. Modeling s-t path availability to support disaster vulnerability assessment of network infrastructure , 2010, Comput. Oper. Res..
[12] Richard M. Karp,et al. A n^5/2 Algorithm for Maximum Matchings in Bipartite Graphs , 1971, SWAT.
[13] Réka Albert,et al. Structural vulnerability of the North American power grid. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[14] Marco Di Summa,et al. Complexity of the critical node problem over trees , 2011, Comput. Oper. Res..
[15] Kihong Park,et al. On the Hardness of Optimization in Power Law Graphs , 2007, COCOON.
[16] Lars Engebretsen,et al. Clique Is Hard To Approximate Within , 2000 .
[17] F. S. Hillier,et al. Introduction to Operations Research, 10th ed. , 1986 .
[18] Nam P. Nguyen,et al. Exploiting the Robustness on Power-Law Networks , 2011, COCOON.
[19] Jon M. Kleinberg,et al. The small-world phenomenon: an algorithmic perspective , 2000, STOC '00.
[20] R. Faure,et al. Introduction to operations research , 1968 .
[21] Johan Håstad,et al. Clique is hard to approximate within n1-epsilon , 1996, Electron. Colloquium Comput. Complex..
[22] Richard M. Karp,et al. A n^5/2 Algorithm for Maximum Matchings in Bipartite Graphs , 1971, SWAT.
[23] Ben Sheppard. September 11 attacks , 2008 .
[24] Martin G. Everett,et al. A Graph-theoretic perspective on centrality , 2006, Soc. Networks.
[25] Christos Gkantsidis,et al. Conductance and congestion in power law graphs , 2003, SIGMETRICS '03.
[26] Ibrahim Matta,et al. BRITE: an approach to universal topology generation , 2001, MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.
[27] Albert-László Barabási,et al. Error and attack tolerance of complex networks , 2000, Nature.
[28] Charles J. Colbourn,et al. Unit disk graphs , 1991, Discret. Math..
[29] Valdis E. Krebs,et al. Uncloaking Terrorist Networks , 2002, First Monday.