Aviation Transportation, Cyber Threats, and Network-of-Networks: Modeling Perspectives for Translating Theory to Practice
暂无分享,去创建一个
Ramakrishna Tipireddy | Mahantesh Halappanavar | Kevin Clark | Samrat Chatterjee | Jianxi Gao | Udit Bhatia | Matthew Oster | Auroop Ratan Ganguly | Robert Brigantic
[1] Rami Puzis,et al. Finding the most prominent group in complex networks , 2007, AI Commun..
[2] H. Stanley,et al. Breakdown of interdependent directed networks , 2016, Proceedings of the National Academy of Sciences.
[3] Hernán A. Makse,et al. Influence maximization in complex networks through optimal percolation , 2015, Nature.
[4] Auroop R. Ganguly,et al. Resilience of the U.S. National Airspace System Airport Network , 2018, IEEE Transactions on Intelligent Transportation Systems.
[5] Jon Kleinberg,et al. Maximizing the spread of influence through a social network , 2003, KDD '03.
[6] Game Theory and Uncertainty Quantification for Cyber Defense Applications , .
[7] Harry Eugene Stanley,et al. Catastrophic cascade of failures in interdependent networks , 2009, Nature.
[8] A. Barabasi,et al. Universal resilience patterns in complex networks , 2016, Nature.
[9] Fei Tan,et al. The robust-yet-fragile nature of interdependent networks , 2014, Physical review. E, Statistical, nonlinear, and soft matter physics.
[10] A. Ganguly,et al. Network Science Based Quantification of Resilience Demonstrated on the Indian Railways Network , 2015, PloS one.
[11] Mahantesh Halappanavar,et al. Accelerating the mining of influential nodes in complex networks through community detection , 2016, Conf. Computing Frontiers.
[12] Mark Rice,et al. Towards Efficient N-x Contingency Selection Using Group betweenness Centrality , 2012, 2012 SC Companion: High Performance Computing, Networking Storage and Analysis.
[13] Éva Tardos,et al. Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..
[14] Ramakrishna Tipireddy,et al. Quantifying mixed uncertainties in cyber attacker payoffs , 2015, 2015 IEEE International Symposium on Technologies for Homeland Security (HST).
[15] Kushal Mukherjee,et al. Statistical Mechanics-Inspired Modeling of Heterogeneous Packet Transmission in Communication Networks , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[16] Stephen P. Borgatti,et al. Identifying sets of key players in a social network , 2006, Comput. Math. Organ. Theory.