-
1
-
-
0033204106
-
On Power-Law Relationships of the Internet Topology
-
September
-
M. Faloutsos, P. Faloutsos, and C. Faloutsos, "On Power-Law Relationships of the Internet Topology", ACM SIGCOIMM Computer Communications Review, Volume 29, Number 4, pp. 251-263, September 1999.
-
(1999)
ACM SIGCOIMM Computer Communications Review
, vol.29
, Issue.4
, pp. 251-263
-
-
Faloutsos, M.1
Faloutsos, P.2
Faloutsos, C.3
-
2
-
-
0034721164
-
Error and Attack Tolerance of Complex Networks
-
July
-
R. Albert, H. Jeong, and A.-L. Barabási, "Error and Attack Tolerance of Complex Networks", Nature, Volume 406, pp. 378-382, July 2000.
-
(2000)
Nature
, vol.406
, pp. 378-382
-
-
Albert, R.1
Jeong, H.2
Barabási, A.-L.3
-
3
-
-
34548173244
-
-
R. J. Ellison, et. al., Survivable Network Systems: An Emerging Discipline, Technical Report CMU/SEI-97-TR-013, Software Engineering Institute, Carnegie Mellon University, November 1997 (Revised: May 1999).
-
R. J. Ellison, et. al., "Survivable Network Systems: An Emerging Discipline", Technical Report CMU/SEI-97-TR-013, Software Engineering Institute, Carnegie Mellon University, November 1997 (Revised: May 1999).
-
-
-
-
4
-
-
34548186456
-
-
th IEEE Hawaii International Conference on System Sciences (HICSS'04), 9, p. 90303.1, January 2004.
-
th IEEE Hawaii International Conference on System Sciences (HICSS'04), Volume 9, p. 90303.1, January 2004.
-
-
-
-
5
-
-
12344275676
-
Model-Based Evaluation: From Dependability to Security
-
January
-
D. M. Nicol, W.H. Sanders, and K.S. Trivedi, "Model-Based Evaluation: from Dependability to Security", IEEE Transactions on Dependable and Secure Computing, Volume 1, Issue 1, pp. 48-65, January 2004.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 48-65
-
-
Nicol, D.M.1
Sanders, W.H.2
Trivedi, K.S.3
-
7
-
-
0004266644
-
On the Definition of Survivability
-
Technical Report CS-TR-33-00, Department of Computer Science, University of Virginia, December
-
J. C. Knight and K. J. Sullivan, "On the Definition of Survivability", Technical Report CS-TR-33-00, Department of Computer Science, University of Virginia, December 2000.
-
(2000)
-
-
Knight, J.C.1
Sullivan, K.J.2
-
8
-
-
33750931423
-
Evaluation of Network Robustness for Given Defense Resource Allocation Strategies
-
April
-
st International Conference on Availability, Reliability and Security (ARES'06), pp. 182-189, April 2006.
-
(2006)
st International Conference on Availability, Reliability and Security (ARES'06)
, pp. 182-189
-
-
Lin, Y.-S.1
Tsang, P.-H.2
Chen, C.-H.3
Tseng, C.-L.4
Lin, Y.-L.5
-
9
-
-
0019477279
-
The Lagrangean Relaxation Method for Solving Integer Programming Problems
-
January
-
M. L. Fisher, "The Lagrangean Relaxation Method for Solving Integer Programming Problems", Management Science, Volume 27, Number 1, pp. 1-18, January 1981.
-
(1981)
Management Science
, vol.27
, Issue.1
, pp. 1-18
-
-
Fisher, M.L.1
-
10
-
-
0016025814
-
Validation of Subgradient Optimization
-
M. Held, P. Wolfe, and H. P. Crowder, "Validation of Subgradient Optimization", Mathematical Programming, Volume 6, pp. 62-88, 1974.
-
(1974)
Mathematical Programming
, vol.6
, pp. 62-88
-
-
Held, M.1
Wolfe, P.2
Crowder, H.P.3
-
11
-
-
34548186220
-
-
Information Assurance Technical Framework (IATF) Release 3.1:2002, National Security Agency
-
"Information Assurance Technical Framework (IATF) Release 3.1:2002", National Security Agency.
-
-
-
|