Effective immunization of online networks: a self-similar selection approach
暂无分享,去创建一个
[1] P. Erdos,et al. On the evolution of random graphs , 1984 .
[2] Albert-László Barabási,et al. Error and attack tolerance of complex networks , 2000, Nature.
[3] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[4] D S Callaway,et al. Network robustness and fragility: percolation on random graphs. , 2000, Physical review letters.
[5] Reuven Cohen,et al. Efficient immunization strategies for computer networks and populations. , 2002, Physical review letters.
[6] Albert-László Barabási,et al. Internet: Diameter of the World-Wide Web , 1999, Nature.
[7] Cohen,et al. Resilience of the internet to random breakdowns , 2000, Physical review letters.
[8] Winfried Gleissner,et al. A mathematical theory for the spread of computer viruses , 1989, Comput. Secur..
[9] Mark E. J. Newman,et al. Technological Networks and the Spread of Computer Viruses , 2004, Science.
[10] Edoardo M. Airoldi,et al. An entropy approach to disclosure risk assessment: Lessons from real applications and simulated domains , 2011, Decis. Support Syst..
[11] K. Goh,et al. Fractality and self-similarity in scale-free networks , 2007 .
[12] Wonseok Oh,et al. Membership Herding and Network Stability in the Open Source Community: The Ising Perspective , 2007, Manag. Sci..
[13] Tridas Mukhopadhyay,et al. The Effect of Liability and Patch Release on Software Security: The Monopoly Case , 2011 .
[14] Christos Faloutsos,et al. Scalable modeling of real graphs using Kronecker multiplication , 2007, ICML '07.
[15] Christos Faloutsos,et al. RTG: a recursive realistic graph generator using random typing , 2009, Data Mining and Knowledge Discovery.
[16] Christos Faloutsos,et al. Epidemic thresholds in real networks , 2008, TSEC.
[17] B. Bollobás. The evolution of random graphs , 1984 .
[18] Stephanie Forrest,et al. Email networks and the spread of computer viruses. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[19] B. Kahng,et al. Geometric fractal growth model for scale-free networks. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.
[20] S. Redner,et al. Connectivity of growing random networks. , 2000, Physical review letters.
[21] S. Havlin,et al. Self-similarity of complex networks , 2005, Nature.
[22] William Hugh Murray,et al. The application of epidemiology to computer viruses , 1988, Comput. Secur..
[23] Insu Park,et al. Short Term and Total Life Impact analysis of email worms in computer systems , 2007, Decis. Support Syst..
[24] Bernard P. Zajac. Dial-up communication lines: Can they be secured? , 1988, Comput. Secur..
[25] Matthew Sellars,et al. Hyperfine interaction in ground and excited states of praseodymium-doped yttrium orthosilicate , 2002 .
[26] Hernán A Makse,et al. Small-world to fractal transition in complex networks: a renormalization group approach. , 2009, Physical review letters.
[27] C. Sparrow. The Fractal Geometry of Nature , 1984 .
[28] Hui Xiong,et al. Towards controlling virus propagation in information systems with point-to-group information sharing , 2009, Decis. Support Syst..
[29] Matthew C. Elder,et al. On computer viral infection and the effect of immunization , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[30] Tridas Mukhopadhyay,et al. An Economic Analysis of the Software Market with a Risk-Sharing Mechanism , 2009, Int. J. Electron. Commer..
[31] Hernán A. Makse,et al. Fractal and Transfractal Scale-Free Networks , 2008, Encyclopedia of Complexity and Systems Science.
[32] Donald F. Towsley,et al. The effect of network topology on the spread of epidemics , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[33] Christos Faloutsos,et al. On the Vulnerability of Large Graphs , 2010, 2010 IEEE International Conference on Data Mining.