-
2
-
-
38549147639
-
The laws of vulnerabilities: Six axioms for understanding risk
-
Qualys, 2, Online, Available
-
"The laws of vulnerabilities: Six axioms for understanding risk," Qualys, 2 2006. [Online]. Available: http://www.qualys.com/docs/ laws_of_vulnerabilities.pdf
-
(2006)
-
-
-
4
-
-
38549134573
-
-
August 2006, Online, Available
-
"Worm sparks rise in zombie pes," August 2006. [Online]. Available: http://news.com.com/Worm+sparks+rise+in+zombie+PCs/2100-7349_3- 6108409.html?tag=nefd.top
-
Worm sparks rise in zombie pes
-
-
-
5
-
-
41349118476
-
Halting viruses in scale-free networks
-
May
-
Z. Dezso and A.-L. Barabasi, "Halting viruses in scale-free networks," Phys. Rev. E, vol. 65, no. 5, p. 055103, May 2002.
-
(2002)
Phys. Rev. E
, vol.65
, Issue.5
, pp. 055103
-
-
Dezso, Z.1
Barabasi, A.-L.2
-
7
-
-
38549153903
-
-
September 2006, Online, Available
-
"Cvss database guide," September 2006. [Online]. Available: http://www.first.org/cvss/cvss-guide.html
-
Cvss database guide
-
-
-
9
-
-
0036013593
-
Statistical mechanics of complex networks
-
January
-
R. Albert and A.-L. Barabasi, "Statistical mechanics of complex networks," Reviews of Modern Physics, vol. 74, no. 1, pp. 47-97, January 2002.
-
(2002)
Reviews of Modern Physics
, vol.74
, Issue.1
, pp. 47-97
-
-
Albert, R.1
Barabasi, A.-L.2
-
11
-
-
20744442724
-
On the spread of virases on the internet
-
N. Berger, C. Borgs, J. T. Chayes, and A. Saberi, "On the spread of virases on the internet," in SODA, 2005, pp. 301-310.
-
(2005)
SODA
, pp. 301-310
-
-
Berger, N.1
Borgs, C.2
Chayes, J.T.3
Saberi, A.4
-
12
-
-
29844458140
-
Understanding internet topology: Principles, models, and validation
-
D. Alderson, L. Li, W. Willinger, and J. C. Doyle, "Understanding internet topology: principles, models, and validation," IEEE/ACM Trans. Netw., vol. 13, no. 6, pp. 1205-1218, 2005.
-
(2005)
IEEE/ACM Trans. Netw
, vol.13
, Issue.6
, pp. 1205-1218
-
-
Alderson, D.1
Li, L.2
Willinger, W.3
Doyle, J.C.4
-
13
-
-
2142758072
-
Technological networks and the spread of computer viruses
-
April, Online, Available
-
J. Balthrop, S. Forrest, M. J. Newman, and M. M. Williamson, "Technological networks and the spread of computer viruses," Science, vol. 304, no. 5670, pp. 527-529, April 2004. [Online]. Available: http://www.sciencemag.org/cgi/content/full/304/5670/527
-
(2004)
Science
, vol.304
, Issue.5670
, pp. 527-529
-
-
Balthrop, J.1
Forrest, S.2
Newman, M.J.3
Williamson, M.M.4
-
14
-
-
25844439630
-
The effect of network topology on the spread of epidemics
-
2
-
A. Ganesh, L. Massoulie, and D. Towsley, "The effect of network topology on the spread of epidemics," in INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, vol. 2, 2005, pp. 1455-1466 vol. 2.
-
(2005)
INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE
, vol.2
, pp. 1455-1466
-
-
Ganesh, A.1
Massoulie, L.2
Towsley, D.3
-
15
-
-
84990029315
-
The economics of information security investment
-
L. A. Gordon and M. P. Loeb, "The economics of information security investment," ACM Trans. Inf. Syst. Secur., vol. 5, no. 4, pp. 438-457, 2002.
-
(2002)
ACM Trans. Inf. Syst. Secur
, vol.5
, Issue.4
, pp. 438-457
-
-
Gordon, L.A.1
Loeb, M.P.2
-
16
-
-
38549133598
-
-
K. S. Hoo, How much is enough? a risk-management approach to computer security, Ph.D. dissertation, Stanford University, August 2000. [Online]. Available: iis-db.stanford.edu/pubs/11900/soohoo.pdf
-
K. S. Hoo, "How much is enough? a risk-management approach to computer security," Ph.D. dissertation, Stanford University, August 2000. [Online]. Available: iis-db.stanford.edu/pubs/11900/soohoo.pdf
-
-
-
-
17
-
-
24944458972
-
Including technical and security risks in the management of information systems: A programmatic risk, management model
-
R. L. Dillon and M. E. Pate-Cornell, "Including technical and security risks in the management of information systems: A programmatic risk, management model." Systems Engineering, vol. 8, no. 1, pp. 15-28, 2005.
-
(2005)
Systems Engineering
, vol.8
, Issue.1
, pp. 15-28
-
-
Dillon, R.L.1
Pate-Cornell, M.E.2
-
18
-
-
38549169641
-
-
L. Page, S. Brin, R. Motwani, and T. Winograd, The pagerank citation ranking: Bringing order to the web, Stanford Digital Library Technologies Project, Tech. Rep., 1998. [Online]. Available: citeseer.ist.psu.edu/page98pagerank.html
-
L. Page, S. Brin, R. Motwani, and T. Winograd, "The pagerank citation ranking: Bringing order to the web," Stanford Digital Library Technologies Project, Tech. Rep., 1998. [Online]. Available: citeseer.ist.psu.edu/page98pagerank.html
-
-
-
-
19
-
-
84906232105
-
-
A. N. Langville and C. D. Meyer, Deeper inside pagerank, Internet Mathematics, 1, no. 3, pp. 335-380, 2003.
-
A. N. Langville and C. D. Meyer, "Deeper inside pagerank," Internet Mathematics, vol. 1, no. 3, pp. 335-380, 2003.
-
-
-
|