-
3
-
-
0026156688
-
-
J.O. Kephart, S.R. White, Directed-graph epidemiological models of computer viruses, in: IEEE Symposium on Security and Privacy, 1991, pp. 343-361
-
-
-
-
4
-
-
84943680959
-
-
J.O. Kephart, D.M. Chess, S.R. White, Computers and epidemiology, in: IEEE Spectrum, 1993, pp. 20-26
-
-
-
-
5
-
-
0027150413
-
-
J.O. Kephart, S.R. White, Measuring and modeling computer virus prevalence, in: Proceedings of the IEEE Symposium on Security and Privacy, 1993, p. 2
-
-
-
-
6
-
-
84949487368
-
-
C. Wang, J.C. Knight, M.C. Elder, On computer viral infection and the effect of immunization, in: ACSAC, 2000, pp. 246-256
-
-
-
-
7
-
-
0013415950
-
Epidemics and immunization scale-free networks
-
Bornholdt S., and Schuster H. (Eds), Wiley-VCH, Berlin
-
Pastor-Satorras R., and Vespignani A. Epidemics and immunization scale-free networks. In: Bornholdt S., and Schuster H. (Eds). Handbook of Graphs and Networks: From the Genome to the Internet (2002), Wiley-VCH, Berlin 113-132
-
(2002)
Handbook of Graphs and Networks: From the Genome to the Internet
, pp. 113-132
-
-
Pastor-Satorras, R.1
Vespignani, A.2
-
9
-
-
33746661522
-
-
C. Zou, D. Towsley, W. Gong, Email virus propagation modeling and analysis, Technical Report CSE-03-04, University of Massachusetts, Amherst, 2002
-
-
-
-
12
-
-
33746720797
-
-
J. Aspnes, J. Feigenbaum, M. Mitzenmacher, D. Parkes, Towards better definitions and measures of Internet security, in: Workshop on Large-Scale Network Security and Deployment Obstacles, 2003
-
-
-
-
13
-
-
33746766175
-
-
K. Hoo, How much is enough? A risk-management approach to computer security, Consortium for Research on Information Security Policy (CRISP), Working Paper, 2000
-
-
-
-
14
-
-
0037599474
-
The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
-
Campbell K., Gordon L.A., Loeb M.P., and Zhou L. The economic cost of publicly announced information security breaches: Empirical evidence from the stock market. J. Comput. Secur. 11 3 (2003) 431-448
-
(2003)
J. Comput. Secur.
, vol.11
, Issue.3
, pp. 431-448
-
-
Campbell, K.1
Gordon, L.A.2
Loeb, M.P.3
Zhou, L.4
-
16
-
-
33746667699
-
-
S.N. Hamilton, W.L. Miller, A. Ott, O.S. Saydjari, The role of game theory in information warfare, in: 4th Information Survivability Workshop, ISW-2001/2002, Vancouver, Canada, 2002
-
-
-
-
17
-
-
33746706711
-
-
S.N. Hamilton, W.L. Miller, A. Ott, O.S. Saydjari, Challenges in applying game theory to the domain of information warfare, in: 4th Information Survivability Workshop, ISW-2001/2002, Vancouver, Canada, 2002
-
-
-
-
19
-
-
0034779787
-
-
M.G.H. Bell, The measurement of reliability in stochastic transport networks, in: Proceedings of 2001 Intelligent Transportation Systems, 2001, pp. 1183-1188
-
-
-
-
20
-
-
0037786763
-
Interdependent security
-
Special Issue on Terrorist Risks
-
Kunreuther H., and Heal G. Interdependent security. Special Issue on Terrorist Risks. J. Risk Uncertainty 26 (2003) 231-249
-
(2003)
J. Risk Uncertainty
, vol.26
, pp. 231-249
-
-
Kunreuther, H.1
Heal, G.2
-
21
-
-
84899006528
-
Algorithms for interdependent security games
-
Thrun S., Saul L., and Schölkopf B. (Eds), MIT Press, Cambridge, MA
-
Kearns M., and Ortiz L. Algorithms for interdependent security games. In: Thrun S., Saul L., and Schölkopf B. (Eds). Advances in Neural Information Processing Systems vol. 16 (2004), MIT Press, Cambridge, MA
-
(2004)
Advances in Neural Information Processing Systems
, vol.16
-
-
Kearns, M.1
Ortiz, L.2
-
22
-
-
0000651166
-
Multicommodity max-flow min-cut theorems and their use in designing approximation algorithms
-
Leighton T., and Rao S. Multicommodity max-flow min-cut theorems and their use in designing approximation algorithms. J. Assoc. Comput. Machinery 46 6 (1999) 787-832
-
(1999)
J. Assoc. Comput. Machinery
, vol.46
, Issue.6
, pp. 787-832
-
-
Leighton, T.1
Rao, S.2
-
23
-
-
4544250512
-
-
S. Arora, S. Rao, U. Vazirani, Expander flows, geometric embeddings and graph partitioning, in: Proceedings of the 36th Annual ACM Symposium on the Theory of Computing, 2004, pp. 222-231
-
-
-
-
24
-
-
0036519752
-
A polylogarithmic approximation of the minimum bisection
-
Feige U., and Krauthgamer R. A polylogarithmic approximation of the minimum bisection. SIAM J. Comput. 31 (2002) 1090-1118
-
(2002)
SIAM J. Comput.
, vol.31
, pp. 1090-1118
-
-
Feige, U.1
Krauthgamer, R.2
-
25
-
-
0033340828
-
Fast approximate graph partitioning algorithms
-
Even G., Naor J., Rao S., and Schieber B. Fast approximate graph partitioning algorithms. SIAM J. Comput. 28 (1999) 2187-2214
-
(1999)
SIAM J. Comput.
, vol.28
, pp. 2187-2214
-
-
Even, G.1
Naor, J.2
Rao, S.3
Schieber, B.4
-
26
-
-
84864657941
-
-
E. Koutsoupias, C. Papadimitriou, Worst-case equilibria, in: Proceedings of the 16th Annual Symposium on Theoretical Aspects of Computer Science, 1999, pp. 403-413
-
-
-
-
27
-
-
34848857660
-
-
A. Agarwal, M. Charikar, K. Makarychev, Y. Makarychev, O(sqrt(log n)) approximation algorithms for min uncut, min 2CNF deletion, and directed cut problems, in: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, 2005, pp. 573-581
-
-
-
-
29
-
-
27644478310
-
-
S. Chawla, R. Krauthgamer, R. Kumar, Y. Rabani, D. Sivakumar, On the hardness of approximating multicut and sparsest-cut, in: IEEE Conference on Computational Complexity, 2005, pp. 144-153
-
-
-
-
30
-
-
85128148829
-
-
1, in: Proceedings of the 46th IEEE Symposium on Foundations of Computer Science, 2005, pp. 53-62
-
-
-
-
31
-
-
0036040281
-
-
S. Khot, On the power of unique 2-prover 1-round games, in: Proceedings of the 34th Annual ACM Symposium on the Theory of Computing, 2002, pp. 767-775
-
-
-
|