K-core-based attack to the internet: Is it more malicious than degree-based attack?
暂无分享,去创建一个
Xu Zhang | Ke Xu | Jichang Zhao | Zhiwen Fang | Mingming Chen | Junjie Wu | Junjie Wu | Jichang Zhao | Xu Zhang | Mingming Chen | Zhiwen Fang | Ke Xu
[1] Massimo Marchiori,et al. Error and attacktolerance of complex network s , 2004 .
[2] Jari Saramäki,et al. Emergence of communities in weighted networks. , 2007, Physical review letters.
[3] Guanhua Yan,et al. Criticality analysis of Internet infrastructure , 2010, Comput. Networks.
[4] Stefan Wuchty,et al. Peeling the yeast protein network , 2005, Proteomics.
[5] Martin Everett,et al. Ego network betweenness , 2005, Soc. Networks.
[6] Beom Jun Kim,et al. Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[7] Dmitri V. Krioukov,et al. Evolution of the Internet AS-Level Ecosystem , 2009, Complex.
[8] Shi Xiao,et al. On imperfect node protection in complex communication networks , 2011 .
[9] Benoit Donnet,et al. Internet topology discovery: a survey , 2007, IEEE Communications Surveys & Tutorials.
[10] Yakov Rekhter,et al. A Border Gateway Protocol 4 (BGP-4) , 1994, RFC.
[11] U. Brandes. A faster algorithm for betweenness centrality , 2001 .
[12] Katarzyna Musial,et al. Creation and growth of online social network , 2013, World Wide Web.
[13] Yuval Shavitt,et al. A model of Internet topology using k-shell decomposition , 2007, Proceedings of the National Academy of Sciences.
[14] Cohen,et al. Resilience of the internet to random breakdowns , 2000, Physical review letters.
[15] Richard G. Clegg,et al. A critical look at power law modelling of the Internet , 2009, Comput. Commun..
[16] Ke Xu,et al. Enhancing the robustness of scale-free networks , 2009, ArXiv.
[17] Yougu Yuan,et al. Internet worms and global routing instabilities , 2002, SPIE ITCom.
[18] Marián Boguñá,et al. Percolation in self-similar networks , 2011, Physical review letters.
[19] David Hutchison,et al. Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines , 2010, Comput. Networks.
[20] V Latora,et al. Efficient behavior of small-world networks. , 2001, Physical review letters.
[21] Reuven Cohen,et al. Efficient immunization strategies for computer networks and populations. , 2002, Physical review letters.
[22] Mark E. J. Newman,et al. Power-Law Distributions in Empirical Data , 2007, SIAM Rev..
[23] Sergey N. Dorogovtsev,et al. K-core Organization of Complex Networks , 2005, Physical review letters.
[24] Alessandro Vespignani,et al. K-core Decomposition: a Tool for the Visualization of Large Scale Networks , 2005, ArXiv.
[25] Hai Zhao,et al. Characterizing and modeling the Internet Router-level topology - The hierarchical features and HIR model , 2010, Comput. Commun..
[26] Stephen B. Seidman,et al. Network structure and minimum degree , 1983 .
[27] Hans J. Herrmann,et al. Mitigation of malicious attacks on networks , 2011, Proceedings of the National Academy of Sciences.
[28] Jean-Loup Guillaume,et al. Relevance of massively distributed explorations of the Internet topology: Qualitative results , 2006, Comput. Networks.
[29] Marián Boguñá,et al. Sustaining the Internet with Hyperbolic Mapping , 2010, Nature communications.
[30] Shi Zhou,et al. Accurately modeling the Internet topology , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[31] K. Claffy,et al. Topology discovery by active probing , 2002, Proceedings 2002 Symposium on Applications and the Internet (SAINT) Workshops.
[32] Marco Tomassini,et al. Worldwide spreading of economic crisis , 2010, 1008.3893.
[33] S. Havlin,et al. Optimization of network robustness to waves of targeted and random attacks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[34] Tao Zhou,et al. Evolution of the Internet and its cores , 2008 .
[35] Katarzyna Musial,et al. Social networks on the Internet , 2012, World Wide Web.
[36] Lev Muchnik,et al. Identifying influential spreaders in complex networks , 2010, 1001.5285.
[37] S. Havlin,et al. Breakdown of the internet under intentional attack. , 2000, Physical review letters.
[38] Dongwon Lee,et al. Graph Theoretic Topological Analysis of Web Service Networks , 2009, World Wide Web.
[39] Hai Zhuge,et al. Modeling and navigation of social information networks in metric spaces , 2013, World Wide Web.
[40] Jaideep Srivastava,et al. Exploiting small world property for network clustering , 2013, World Wide Web.
[41] M. Faloutsos. The internet AS-level topology: three data sources and one definitive metric , 2006, CCRV.
[42] Alessandro Vespignani,et al. Immunization of complex networks. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.
[43] Peter V. Marsden,et al. Egocentric and sociocentric measures of network centrality , 2002, Soc. Networks.
[44] Patrick D. McDaniel,et al. A Survey of BGP Security Issues and Solutions , 2010, Proceedings of the IEEE.
[45] Alessandro Vespignani,et al. Epidemic spreading in scale-free networks. , 2000, Physical review letters.
[46] David M. Nicol,et al. A mixed abstraction level simulation model of large-scale Internet worm infestations , 2002, Proceedings. 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems.