-
1
-
-
37349107584
-
-
Abilene. 2005. About Abilene. http://abilene.internet2.edu/about/.
-
(2005)
About Abilene
-
-
-
2
-
-
42749103823
-
Structural vulnerability of the North American power grid
-
Albert, R., I. Albert, and G.L. Nakarado. 2004. Structural vulnerability of the North American power grid. Physical Review E 69: 1-4.
-
(2004)
Physical Review E
, vol.69
, pp. 1-4
-
-
Albert, R.1
Albert, I.2
Nakarado, G.L.3
-
3
-
-
0034721164
-
Error and attack tolerance of complex networks
-
Albert, R., H. Jeong, and A.-L. Barabasi. 2000. Error and attack tolerance of complex networks. Nature 406: 378-82.
-
(2000)
Nature
, vol.406
, pp. 378-382
-
-
Albert, R.1
Jeong, H.2
Barabasi, A.-L.3
-
4
-
-
29844458140
-
Understanding Internet topology: Principles, models and validation
-
Alderson, D., L. Li, W. Willinger, and J.C. Doyle. 2005. Understanding Internet topology: Principles, models and validation. IEEE/ACM Transactions on Networking 13: 1205-18.
-
(2005)
IEEE/ACM Transactions on Networking
, vol.13
, pp. 1205-1218
-
-
Alderson, D.1
Li, L.2
Willinger, W.3
Doyle, J.C.4
-
5
-
-
0342880921
-
Capacity and survivability models for telecommunication networks
-
In Barcelona, Spain: Euro/Informs
-
Alevras, D., M. Grotschel, and R. Wessaly. 1997. Capacity and survivability models for telecommunication networks. In Proceedings of the Euro/Informs Meetings, 187-99. Barcelona, Spain: Euro/Informs.
-
(1997)
Proceedings of the Euro/Informs Meetings
, pp. 187-199
-
-
Alevras, D.1
Grotschel, M.2
Wessaly, R.3
-
8
-
-
0038483826
-
Emergence of scaling in random networks
-
Barabasi, A.L., and R. Albert. 1999. Emergence of scaling in random networks. Science 286: 509.
-
(1999)
Science
, vol.286
, pp. 509
-
-
Barabasi, A.L.1
Albert, R.2
-
10
-
-
0036924741
-
Critical points and transitions in an electric power transmission model for cascading failure blackouts
-
Carreras, B.A., V.E. Lynch, I. Dobson, and D.E. Newman. 2002. Critical points and transitions in an electric power transmission model for cascading failure blackouts. Chaos 12: 985-94.
-
(2002)
Chaos
, vol.12
, pp. 985-994
-
-
Carreras, B.A.1
Lynch, V.E.2
Dobson, I.3
Newman, D.E.4
-
12
-
-
85039422750
-
Analysis of facility systems' reliability when subject to attack or natural disaster
-
In ed. A. T. Murray and T. H. Grubesic Berlin, Germany: Springer Verlag
-
Church, R.L., and M.P. Scaparra. 2007 a. Analysis of facility systems' reliability when subject to attack or natural disaster. In Critical infrastructure: Reliability and vulnerability, ed. A. T. Murray and T. H. Grubesic, 221-42. Berlin, Germany: Springer Verlag.
-
(2007)
Critical Infrastructure: Reliability and Vulnerability
, pp. 221-242
-
-
Church, R.L.1
Scaparra, M.P.2
-
13
-
-
33947208987
-
Protecting critical assets: The r-interdiction median problem with fortification
-
Church, R.L., and M.P. Scaparra. 2007 b. Protecting critical assets: The r-interdiction median problem with fortification. Geographical Analysis 39: 129-46.
-
(2007)
Geographical Analysis
, vol.39
, pp. 129-146
-
-
Church, R.L.1
Scaparra, M.P.2
-
15
-
-
0034323311
-
Resilience of the Internet to random breakdowns
-
Cohen, R., K. Erez, D. ben-Avraham, and S. Havlin. 2000. Resilience of the Internet to random breakdowns. Physical Review Letters 85: 4626-28.
-
(2000)
Physical Review Letters
, vol.85
, pp. 4626-4628
-
-
Cohen, R.1
Erez, K.2
Ben-Avraham, D.3
Havlin, S.4
-
16
-
-
28344448992
-
Finding the n most vital nodes in a flow network
-
Corley, H.W., and H. Chang. 1974. Finding the n most vital nodes in a flow network. Management Science 21: 362-64.
-
(1974)
Management Science
, vol.21
, pp. 362-364
-
-
Corley, H.W.1
Chang, H.2
-
17
-
-
0020175509
-
Most vital links and nodes in weighted networks
-
Corley, H.W., and D.Y. Sha. 1982. Most vital links and nodes in weighted networks. Operations Research Letters 1: 157-60.
-
(1982)
Operations Research Letters
, vol.1
, pp. 157-160
-
-
Corley, H.W.1
Sha, D.Y.2
-
18
-
-
42749099510
-
Reinforcing the resilience of complex networks
-
Costa, L.F. 2004. Reinforcing the resilience of complex networks. Physical Review E 69: 066127.
-
(2004)
Physical Review E
, vol.69
, pp. 066127
-
-
Costa, L.F.1
-
20
-
-
2942527530
-
A topological analysis of the Italian electric power grid
-
Crucitti, P., V. Latora, and M. Marchiori. 2004 b. A topological analysis of the Italian electric power grid. Physica A 338: 92-97.
-
(2004)
Physica A
, vol.338
, pp. 92-97
-
-
Crucitti, P.1
Latora, V.2
Marchiori, M.3
-
21
-
-
3042775719
-
Error and attack tolerance of complex networks
-
Crucitti, P., V. Latora, M. Marchiori, and A. Rapisarda. 2004. Error and attack tolerance of complex networks. Physica A 340: 388-94.
-
(2004)
Physica A
, vol.340
, pp. 388-394
-
-
Crucitti, P.1
Latora, V.2
Marchiori, M.3
Rapisarda, A.4
-
22
-
-
0037250252
-
The effects of badly behaved routers on Internet congestion
-
Curran, K., D. Woods, N. McDermot, and C. Bradley. 2003. The effects of badly behaved routers on Internet congestion. International Journal of Network Management 13: 83-94.
-
(2003)
International Journal of Network Management
, vol.13
, pp. 83-94
-
-
Curran, K.1
Woods, D.2
McDermot, N.3
Bradley, C.4
-
23
-
-
26844525729
-
The "robust yet fragile" nature of the Internet
-
Doyle, J.C., D.L. Alderson, L. Li, S. Low, M. Roughan, S. Shalunov, R. Tanaka, and W. Willinger. 2005. The "robust yet fragile" nature of the Internet. Proceedings of the National Academy of Sciences. http://www.pnas.org/cgi/doi/10.1073/pnas.0501426102.
-
(2005)
Proceedings of the National Academy of Sciences
-
-
Doyle, J.C.1
Alderson, D.L.2
Li, L.3
Low, S.4
Roughan, M.5
Shalunov, S.6
Tanaka, R.7
Willinger, W.8
-
24
-
-
84865730611
-
A set of measures of centrality based on betweenness
-
Freeman, L.C. 1977. A set of measures of centrality based on betweenness. Sociometry 40: 35-41.
-
(1977)
Sociometry
, vol.40
, pp. 35-41
-
-
Freeman, L.C.1
-
25
-
-
33750177351
-
Centrality in social networks: I. Conceptual clarification
-
Freeman, L.C. 1979. Centrality in social networks: I. Conceptual clarification. Social Networks 1: 215-39.
-
(1979)
Social Networks
, vol.1
, pp. 215-239
-
-
Freeman, L.C.1
-
26
-
-
0000096090
-
Maximizing the minimum source-sink path subject to a budget constraint
-
Fulkerson, D.R., and G.C. Harding. 1977. Maximizing the minimum source-sink path subject to a budget constraint. Math Program 13: 116-18.
-
(1977)
Math Program
, vol.13
, pp. 116-118
-
-
Fulkerson, D.R.1
Harding, G.C.2
-
29
-
-
33644815393
-
Vital nodes, interconnected infrastructures and the geographies of network survivability
-
Grubesic, T.H., and A.T. Murray. 2006. Vital nodes, interconnected infrastructures and the geographies of network survivability. Annals of the Association of American Geographer 96: 64-83.
-
(2006)
Annals of the Association of American Geographer
, vol.96
, pp. 64-83
-
-
Grubesic, T.H.1
Murray, A.T.2
-
30
-
-
37349097411
-
Continuity in critical infrastructure: Accounting for nodal disruptions
-
In ed. A. T. Murray and T. H. Grubesic Berlin, Germany: Springer Verlag
-
Grubesic, T.H., A.T. Murray, and J. Mefford. 2007. Continuity in critical infrastructure: Accounting for nodal disruptions. In Critical infrastructure: Reliability and vulnerability, ed. A. T. Murray and T. H. Grubesic, 197-220. Berlin, Germany: Springer Verlag.
-
(2007)
Critical Infrastructure: Reliability and Vulnerability
, pp. 197-220
-
-
Grubesic, T.H.1
Murray, A.T.2
Mefford, J.3
-
33
-
-
24644438234
-
Assessment of economic impacts from unexpected events using an interregional commodity flow and network model
-
Ham, H., T.J. Kim, and D.E. Boyce. 2005. Assessment of economic impacts from unexpected events using an interregional commodity flow and network model. Transportation Research Part A 39: 849-60.
-
(2005)
Transportation Research Part A
, vol.39
, pp. 849-860
-
-
Ham, H.1
Kim, T.J.2
Boyce, D.E.3
-
35
-
-
41349120887
-
Attack vulnerability of complex networks
-
Holme, P., J.K. Beom, C.N. Yoon, and S.K. Han. 2002. Attack vulnerability of complex networks. Physical Review E 65: 056109.
-
(2002)
Physical Review E
, vol.65
, pp. 056109
-
-
Holme, P.1
Beom, J.K.2
Yoon, C.N.3
Han, S.K.4
-
36
-
-
0141764679
-
Shortest-path network interdiction
-
Israeli, E., and R.K. Wood. 2002. Shortest-path network interdiction. Networks 40: 97-111.
-
(2002)
Networks
, vol.40
, pp. 97-111
-
-
Israeli, E.1
Wood, R.K.2
-
37
-
-
0041653086
-
Economic impacts of transportation network changes: Implementation of a combined transportation network and input-output model
-
Kim, T.J., H. Ham, and D.E. Boyce. 2002. Economic impacts of transportation network changes: Implementation of a combined transportation network and input-output model. Papers in Regional Science 81: 223-46.
-
(2002)
Papers in Regional Science
, vol.81
, pp. 223-246
-
-
Kim, T.J.1
Ham, H.2
Boyce, D.E.3
-
38
-
-
37649029427
-
Vulnerability and protection of infrastructure networks
-
Latora, V., and M. Marchiori. 2005. Vulnerability and protection of infrastructure networks. Physical Review E 71: 015103(R).
-
(2005)
Physical Review E
, vol.71
-
-
Latora, V.1
Marchiori, M.2
-
40
-
-
85039429121
-
Bounding network attack vulnerability through cutset identification
-
In ed. A. T. Murray and T. H. Grubesic Berlin, Germany: Springer Verlag
-
Matisziw, T.C., A.T. Murray, and T.H. Grubesic. 2007. Bounding network attack vulnerability through cutset identification. In Critical infrastructure: Reliability and vulnerability, ed. A. T. Murray and T. H. Grubesic, 243-56. Berlin, Germany: Springer Verlag.
-
(2007)
Critical Infrastructure: Reliability and Vulnerability
, pp. 243-256
-
-
Matisziw, T.C.1
Murray, A.T.2
Grubesic, T.H.3
-
42
-
-
0032450039
-
Modelling distance decay effects in Web server information flows
-
Murnion, S., and R.G. Healey. 1998. Modelling distance decay effects in Web server information flows. Geographical Analysis 30: 285-303.
-
(1998)
Geographical Analysis
, vol.30
, pp. 285-303
-
-
Murnion, S.1
Healey, R.G.2
-
43
-
-
37349005600
-
-
Murray, A. T., and T. H. Grubesic, eds. Berlin, Germany: Springer Verlag
-
Murray, A. T., and T. H. Grubesic, eds. 2007. Critical infrastructure: Reliability and vulnerability. Berlin, Germany: Springer Verlag.
-
(2007)
Critical Infrastructure: Reliability and Vulnerability
-
-
-
45
-
-
1642618985
-
A cutting plane algorithm for computing k-edge survivability of a network
-
Myung, Y.-S., and H.-J. Kim. 2004. A cutting plane algorithm for computing k-edge survivability of a network. European Journal of Operational Research 156: 579-89.
-
(2004)
European Journal of Operational Research
, vol.156
, pp. 579-589
-
-
Myung, Y.-S.1
Kim, H.-J.2
-
46
-
-
0038718854
-
The structure and function of complex networks
-
Newman, M.E.J. 2003. The structure and function of complex networks. SIAM Review 45: 167-256.
-
(2003)
SIAM Review
, vol.45
, pp. 167-256
-
-
Newman, M.E.J.1
-
47
-
-
0036071175
-
Backbone topology, access and the commercial Internet
-
O'Kelly, M.E., and T.H. Grubesic. 2002. Backbone topology, access and the commercial Internet. Environment and Planning B 29: 533-52.
-
(2002)
Environment and Planning B
, vol.29
, pp. 533-552
-
-
O'Kelly, M.E.1
Grubesic, T.H.2
-
49
-
-
34250906344
-
Enumeration of paths in digraphs
-
Parthasarathy, K.R. 1964. Enumeration of paths in digraphs. Psychometrika 29: 153-65.
-
(1964)
Psychometrika
, vol.29
, pp. 153-165
-
-
Parthasarathy, K.R.1
-
51
-
-
51249195602
-
Structural properties of communication networks
-
Shimbel, A. 1953. Structural properties of communication networks. Bulletin of Mathematical Biophysics 15: 501-7.
-
(1953)
Bulletin of Mathematical Biophysics
, vol.15
, pp. 501-507
-
-
Shimbel, A.1
-
52
-
-
41349118482
-
Optimization of network robustness to waves of targeted and random attacks
-
Tanizawa, T., G. Paul, R. Cohen, S. Havlin, and H.E. Stanley. 2005. Optimization of network robustness to waves of targeted and random attacks. Physical Review E 71: 047101.
-
(2005)
Physical Review E
, vol.71
, pp. 047101
-
-
Tanizawa, T.1
Paul, G.2
Cohen, R.3
Havlin, S.4
Stanley, H.E.5
-
53
-
-
12844261066
-
Survivability of multiagentbased supply networks: A topological perspective
-
Thadakamalla, H.P., U.N. Raghavan, S. Kumara, and R. Albert. 2004. Survivability of multiagentbased supply networks: A topological perspective. IEEE Intelligent Systems 19: 24-31.
-
(2004)
IEEE Intelligent Systems
, vol.19
, pp. 24-31
-
-
Thadakamalla, H.P.1
Raghavan, U.N.2
Kumara, S.3
Albert, R.4
-
55
-
-
0032482432
-
Collective dynamics of small world networks
-
Watts, D.J., and S. Strogatz. 1998. Collective dynamics of small world networks. Nature 393: 440-42.
-
(1998)
Nature
, vol.393
, pp. 440-442
-
-
Watts, D.J.1
Strogatz, S.2
-
57
-
-
0009075090
-
Removing arcs from a network
-
Wollmer, R. 1964. Removing arcs from a network. Operations Research 12: 934-40.
-
(1964)
Operations Research
, vol.12
, pp. 934-940
-
-
Wollmer, R.1
-
58
-
-
0014780029
-
Algorithms for targeting strikes in a lines-of-communication network
-
Wollmer, R. 1970. Algorithms for targeting strikes in a lines-of-communication network. Operations Research 18: 497-515.
-
(1970)
Operations Research
, vol.18
, pp. 497-515
-
-
Wollmer, R.1
-
59
-
-
38249007197
-
Deterministic network interdiction
-
Wood, R.K. 1993. Deterministic network interdiction. Mathematical Computer Modelling 17: 1-18.
-
(1993)
Mathematical Computer Modelling
, vol.17
, pp. 1-18
-
-
Wood, R.K.1
|