메뉴 건너뛰기




Volumn 72, Issue 6, 2006, Pages 1077-1093

Inoculation strategies for victims of viruses and the sum-of-squares partition problem

Author keywords

Computer virus model; Economics of security; Price of anarchy; Security externalities; Sum of squares partition

Indexed keywords

COMBINATORIAL MATHEMATICS; COMPUTATIONAL COMPLEXITY; COMPUTER SOFTWARE; GAME THEORY; GRAPH THEORY; PROBLEM SOLVING;

EID: 33746689683     PISSN: 00220000     EISSN: 10902724     Source Type: Journal    
DOI: 10.1016/j.jcss.2006.02.003     Document Type: Article
Times cited : (103)

References (31)
  • 3
    • 0026156688 scopus 로고    scopus 로고
    • J.O. Kephart, S.R. White, Directed-graph epidemiological models of computer viruses, in: IEEE Symposium on Security and Privacy, 1991, pp. 343-361
  • 4
    • 84943680959 scopus 로고    scopus 로고
    • J.O. Kephart, D.M. Chess, S.R. White, Computers and epidemiology, in: IEEE Spectrum, 1993, pp. 20-26
  • 5
    • 0027150413 scopus 로고    scopus 로고
    • J.O. Kephart, S.R. White, Measuring and modeling computer virus prevalence, in: Proceedings of the IEEE Symposium on Security and Privacy, 1993, p. 2
  • 6
    • 84949487368 scopus 로고    scopus 로고
    • C. Wang, J.C. Knight, M.C. Elder, On computer viral infection and the effect of immunization, in: ACSAC, 2000, pp. 246-256
  • 9
    • 33746661522 scopus 로고    scopus 로고
    • C. Zou, D. Towsley, W. Gong, Email virus propagation modeling and analysis, Technical Report CSE-03-04, University of Massachusetts, Amherst, 2002
  • 12
    • 33746720797 scopus 로고    scopus 로고
    • J. Aspnes, J. Feigenbaum, M. Mitzenmacher, D. Parkes, Towards better definitions and measures of Internet security, in: Workshop on Large-Scale Network Security and Deployment Obstacles, 2003
  • 13
    • 33746766175 scopus 로고    scopus 로고
    • K. Hoo, How much is enough? A risk-management approach to computer security, Consortium for Research on Information Security Policy (CRISP), Working Paper, 2000
  • 14
    • 0037599474 scopus 로고    scopus 로고
    • The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
    • Campbell K., Gordon L.A., Loeb M.P., and Zhou L. The economic cost of publicly announced information security breaches: Empirical evidence from the stock market. J. Comput. Secur. 11 3 (2003) 431-448
    • (2003) J. Comput. Secur. , vol.11 , Issue.3 , pp. 431-448
    • Campbell, K.1    Gordon, L.A.2    Loeb, M.P.3    Zhou, L.4
  • 16
    • 33746667699 scopus 로고    scopus 로고
    • S.N. Hamilton, W.L. Miller, A. Ott, O.S. Saydjari, The role of game theory in information warfare, in: 4th Information Survivability Workshop, ISW-2001/2002, Vancouver, Canada, 2002
  • 17
    • 33746706711 scopus 로고    scopus 로고
    • S.N. Hamilton, W.L. Miller, A. Ott, O.S. Saydjari, Challenges in applying game theory to the domain of information warfare, in: 4th Information Survivability Workshop, ISW-2001/2002, Vancouver, Canada, 2002
  • 18
  • 19
    • 0034779787 scopus 로고    scopus 로고
    • M.G.H. Bell, The measurement of reliability in stochastic transport networks, in: Proceedings of 2001 Intelligent Transportation Systems, 2001, pp. 1183-1188
  • 20
    • 0037786763 scopus 로고    scopus 로고
    • Interdependent security
    • Special Issue on Terrorist Risks
    • Kunreuther H., and Heal G. Interdependent security. Special Issue on Terrorist Risks. J. Risk Uncertainty 26 (2003) 231-249
    • (2003) J. Risk Uncertainty , vol.26 , pp. 231-249
    • Kunreuther, H.1    Heal, G.2
  • 21
    • 84899006528 scopus 로고    scopus 로고
    • Algorithms for interdependent security games
    • Thrun S., Saul L., and Schölkopf B. (Eds), MIT Press, Cambridge, MA
    • Kearns M., and Ortiz L. Algorithms for interdependent security games. In: Thrun S., Saul L., and Schölkopf B. (Eds). Advances in Neural Information Processing Systems vol. 16 (2004), MIT Press, Cambridge, MA
    • (2004) Advances in Neural Information Processing Systems , vol.16
    • Kearns, M.1    Ortiz, L.2
  • 22
    • 0000651166 scopus 로고    scopus 로고
    • Multicommodity max-flow min-cut theorems and their use in designing approximation algorithms
    • Leighton T., and Rao S. Multicommodity max-flow min-cut theorems and their use in designing approximation algorithms. J. Assoc. Comput. Machinery 46 6 (1999) 787-832
    • (1999) J. Assoc. Comput. Machinery , vol.46 , Issue.6 , pp. 787-832
    • Leighton, T.1    Rao, S.2
  • 23
    • 4544250512 scopus 로고    scopus 로고
    • S. Arora, S. Rao, U. Vazirani, Expander flows, geometric embeddings and graph partitioning, in: Proceedings of the 36th Annual ACM Symposium on the Theory of Computing, 2004, pp. 222-231
  • 24
    • 0036519752 scopus 로고    scopus 로고
    • A polylogarithmic approximation of the minimum bisection
    • Feige U., and Krauthgamer R. A polylogarithmic approximation of the minimum bisection. SIAM J. Comput. 31 (2002) 1090-1118
    • (2002) SIAM J. Comput. , vol.31 , pp. 1090-1118
    • Feige, U.1    Krauthgamer, R.2
  • 25
    • 0033340828 scopus 로고    scopus 로고
    • Fast approximate graph partitioning algorithms
    • Even G., Naor J., Rao S., and Schieber B. Fast approximate graph partitioning algorithms. SIAM J. Comput. 28 (1999) 2187-2214
    • (1999) SIAM J. Comput. , vol.28 , pp. 2187-2214
    • Even, G.1    Naor, J.2    Rao, S.3    Schieber, B.4
  • 26
    • 84864657941 scopus 로고    scopus 로고
    • E. Koutsoupias, C. Papadimitriou, Worst-case equilibria, in: Proceedings of the 16th Annual Symposium on Theoretical Aspects of Computer Science, 1999, pp. 403-413
  • 27
    • 34848857660 scopus 로고    scopus 로고
    • A. Agarwal, M. Charikar, K. Makarychev, Y. Makarychev, O(sqrt(log n)) approximation algorithms for min uncut, min 2CNF deletion, and directed cut problems, in: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, 2005, pp. 573-581
  • 29
    • 27644478310 scopus 로고    scopus 로고
    • S. Chawla, R. Krauthgamer, R. Kumar, Y. Rabani, D. Sivakumar, On the hardness of approximating multicut and sparsest-cut, in: IEEE Conference on Computational Complexity, 2005, pp. 144-153
  • 30
    • 85128148829 scopus 로고    scopus 로고
    • 1, in: Proceedings of the 46th IEEE Symposium on Foundations of Computer Science, 2005, pp. 53-62
  • 31
    • 0036040281 scopus 로고    scopus 로고
    • S. Khot, On the power of unique 2-prover 1-round games, in: Proceedings of the 34th Annual ACM Symposium on the Theory of Computing, 2002, pp. 767-775


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.