-
1
-
-
58849159858
-
-
NCSA:Overview of NCSA Consumer Research Study (April 2008), http://staysafeonline.org/pdf/NSCA-quickquery-survey.pdf
-
NCSA:Overview of NCSA Consumer Research Study (April 2008), http://staysafeonline.org/pdf/NSCA-quickquery-survey.pdf
-
-
-
-
2
-
-
58849148786
-
-
McAfee-NCSA: Online Safety Study (October 2007), http://staysafeonline. org/pdf/McAfee-NCSA-analysis.pdf
-
McAfee-NCSA: Online Safety Study (October 2007), http://staysafeonline. org/pdf/McAfee-NCSA-analysis.pdf
-
-
-
-
3
-
-
58849151551
-
-
Communication Technologies, I.: Technical information bulletin 04-1: Supervisory control and data acquisition (scada) systems (October 2004), http://www.ncs.gov/library/tech-bulletins/2004/tib-04-1.pdf
-
Communication Technologies, I.: Technical information bulletin 04-1: Supervisory control and data acquisition (scada) systems (October 2004), http://www.ncs.gov/library/tech-bulletins/2004/tib-04-1.pdf
-
-
-
-
4
-
-
2942547426
-
The revenge of distance: Vulnerability analysis of critical information infrastructure
-
Gorman, S.R, Schintler, L., Kulkarni, R., Stough, R.: The revenge of distance: Vulnerability analysis of critical information infrastructure. Journal of Contingencies and Crisis Management 12, 48-63 (2004)
-
(2004)
Journal of Contingencies and Crisis Management
, vol.12
, pp. 48-63
-
-
Gorman, S.R.1
Schintler, L.2
Kulkarni, R.3
Stough, R.4
-
5
-
-
58849158980
-
-
Yegneswaran, V., Barford, P, Jha, S.: Global intrusion detection in the domino overlay system. In: NDSS (2004)
-
Yegneswaran, V., Barford, P, Jha, S.: Global intrusion detection in the domino overlay system. In: NDSS (2004)
-
-
-
-
6
-
-
0036088115
-
Stateful intrusion detection for high-speed networks
-
May
-
Kruegel, C., Valeur, F., Vigna, G., Kemmerer, R.: Stateful intrusion detection for high-speed networks. In: IEEE Symposium on Security and Privacy, pp. 285-294 (May 2002)
-
(2002)
IEEE Symposium on Security and Privacy
, pp. 285-294
-
-
Kruegel, C.1
Valeur, F.2
Vigna, G.3
Kemmerer, R.4
-
7
-
-
20844436808
-
Collaborative internet worm containment
-
Cai, M., Hwang, K., Kwok, Y.K., Song, S., Chen, Y.: Collaborative internet worm containment. IEEE Security and Privacy 3(3), 25-33 (2005)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
, pp. 25-33
-
-
Cai, M.1
Hwang, K.2
Kwok, Y.K.3
Song, S.4
Chen, Y.5
-
8
-
-
33746192198
-
A graph-theoretic perspective on centrality
-
Borgatti, S.P., Everett, M.G.: A graph-theoretic perspective on centrality. Social Networks 28(4), 466-484 (2006)
-
(2006)
Social Networks
, vol.28
, Issue.4
, pp. 466-484
-
-
Borgatti, S.P.1
Everett, M.G.2
-
10
-
-
0033204166
-
The end-to-end effects of internet path selection
-
Savage, S., Collins, A., Hoffman, E., Snell, J., Anderson, T.: The end-to-end effects of internet path selection. SIGCOMM Comput. Commun. Rev. 29(4), 289-299 (1999)
-
(1999)
SIGCOMM Comput. Commun. Rev
, vol.29
, Issue.4
, pp. 289-299
-
-
Savage, S.1
Collins, A.2
Hoffman, E.3
Snell, J.4
Anderson, T.5
-
11
-
-
0026156688
-
Directed-graph epidemiological models of computer viruses
-
Oakland, California, pp, May
-
Kephart, J.O., White, S.R.: Directed-graph epidemiological models of computer viruses. In: Proceedings of the 1991 IEEE Computer Society Symposium on research in Security and Privacy, Oakland, California, pp. 343-359 (May 1991)
-
(1991)
Proceedings of the 1991 IEEE Computer Society Symposium on research in Security and Privacy
, pp. 343-359
-
-
Kephart, J.O.1
White, S.R.2
-
12
-
-
18844367440
-
Simulating realistic network worm traffic for worm warning system design and testing
-
ACM, New York
-
Liljenstam, M., Nicol, D.M., Berk, V.H., Gray, R.S.: Simulating realistic network worm traffic for worm warning system design and testing. In: WORM 2003: Proceedings of the 2003 ACM workshop on Rapid malcode, pp. 24-33. ACM, New York (2003)
-
(2003)
WORM 2003: Proceedings of the 2003 ACM workshop on Rapid malcode
, pp. 24-33
-
-
Liljenstam, M.1
Nicol, D.M.2
Berk, V.H.3
Gray, R.S.4
-
13
-
-
16244379554
-
-
Riley, G.F., Sharif, M.I., Lee, W.: Simulating internet worms. In: MASCOTS 2004: Proceedings of the The IEEE Computer Society's 12fh Annual International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, Washington, DC, USA, pp. 268-274. IEEE Computer Society, Los Alamitos (2004)
-
Riley, G.F., Sharif, M.I., Lee, W.: Simulating internet worms. In: MASCOTS 2004: Proceedings of the The IEEE Computer Society's 12fh Annual International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, Washington, DC, USA, pp. 268-274. IEEE Computer Society, Los Alamitos (2004)
-
-
-
-
14
-
-
33751017682
-
Behaviors of susceptible-infected epidemics on scale-free networks with identical infectivity
-
Zhou, T., Liu, J.G., Bai, W.J., Chen, G., Wang, B.H.: Behaviors of susceptible-infected epidemics on scale-free networks with identical infectivity. Phys. Rev. E 74, 056109 (2006)
-
(2006)
Phys. Rev. E
, vol.74
, pp. 056109
-
-
Zhou, T.1
Liu, J.G.2
Bai, W.J.3
Chen, G.4
Wang, B.H.5
-
16
-
-
0037097390
-
Effects of immunization in small-world epidemics
-
Zanette, D.H., Kuperman, M.: Effects of immunization in small-world epidemics. Physica A 309, 445-452 (2002)
-
(2002)
Physica A
, vol.309
, pp. 445-452
-
-
Zanette, D.H.1
Kuperman, M.2
-
18
-
-
46749123526
-
-
Jackson, A., Milliken, W., Santivanez, C., Condell, M., Strayer, W.: A topological analysis of monitor placement. In: Sixth IEEE International Symposium on Network Computing and Applications, NCA 2007, pp. 169-178 (July 2007)
-
Jackson, A., Milliken, W., Santivanez, C., Condell, M., Strayer, W.: A topological analysis of monitor placement. In: Sixth IEEE International Symposium on Network Computing and Applications, NCA 2007, pp. 169-178 (July 2007)
-
-
-
-
19
-
-
33748427096
-
Scalable protection against ddos and worm attacks
-
F30602-01-2-0530, Purdue University, West LaFayette
-
Park, K.: Scalable protection against ddos and worm attacks. DARPA ATO FTN project AFRL contract F30602-01-2-0530, Purdue University, West LaFayette (2004)
-
(2004)
DARPA ATO FTN project AFRL contract
-
-
Park, K.1
-
20
-
-
0002721363
-
Parametrized computational feasibility
-
Downey, R.G., Fellows, M.R.: Parametrized computational feasibility. Feasible Mathematics 2, 219-244 (1995)
-
(1995)
Feasible Mathematics
, vol.2
, pp. 219-244
-
-
Downey, R.G.1
Fellows, M.R.2
-
21
-
-
0038483826
-
Emergence of scaling in random networks
-
Barabasi, A.L., Albert, R.: Emergence of scaling in random networks. Science 286, 509-512 (1999)
-
(1999)
Science
, vol.286
, pp. 509-512
-
-
Barabasi, A.L.1
Albert, R.2
-
22
-
-
84906244198
-
Robustness and vulnerability of scale-free random graphs
-
Bollobas, B., Riordan, O.: Robustness and vulnerability of scale-free random graphs. Internet Mathematics 1(1), 1-35 (2003)
-
(2003)
Internet Mathematics
, vol.1
, Issue.1
, pp. 1-35
-
-
Bollobas, B.1
Riordan, O.2
-
23
-
-
0033204106
-
On power-law relationships of the internet topology. SIGCOMM
-
Faloutsos, M., Faloutsos, P., Faloutsos, C.: On power-law relationships of the internet topology. SIGCOMM Comput. Comm. Rev. 29(4), 251-262 (1999)
-
(1999)
Comput. Comm. Rev
, vol.29
, Issue.4
, pp. 251-262
-
-
Faloutsos, M.1
Faloutsos, P.2
Faloutsos, C.3
-
24
-
-
4944247593
-
Congestion and centrality in traffic flow on complex networks
-
Holme, P.: Congestion and centrality in traffic flow on complex networks. Advances in Complex Systems 6(2), 163-176 (2003)
-
(2003)
Advances in Complex Systems
, vol.6
, Issue.2
, pp. 163-176
-
-
Holme, P.1
-
25
-
-
84865730611
-
A set of measures of centrality based on betweenness
-
Freeman, L.C.: A set of measures of centrality based on betweenness. Sociometry 40(1), 35-41 (1977)
-
(1977)
Sociometry
, vol.40
, Issue.1
, pp. 35-41
-
-
Freeman, L.C.1
-
27
-
-
0033245711
-
The centrality of groups and classes
-
Everett, M.G., Borgatti, S.P.: The centrality of groups and classes. Mathematical Sociology 23(3), 181-201 (1999)
-
(1999)
Mathematical Sociology
, vol.23
, Issue.3
, pp. 181-201
-
-
Everett, M.G.1
Borgatti, S.P.2
-
28
-
-
36749033067
-
Fast algorithm for successive computation of group betweenness centrality
-
Puzis, R., Elovici, Y., Dolev, S.: Fast algorithm for successive computation of group betweenness centrality. Phys. Rev. E 76(5), 056709 (2007)
-
(2007)
Phys. Rev. E
, vol.76
, Issue.5
, pp. 056709
-
-
Puzis, R.1
Elovici, Y.2
Dolev, S.3
-
29
-
-
0035648637
-
A faster algorithm for betweenness centrality
-
Brandes, U.: A faster algorithm for betweenness centrality. Mathematical Sociology 25(2), 163-177 (2001)
-
(2001)
Mathematical Sociology
, vol.25
, Issue.2
, pp. 163-177
-
-
Brandes, U.1
-
30
-
-
41549097717
-
On variants of shortest-path betweenness centrality and their generic computation
-
Brandes, U.: On variants of shortest-path betweenness centrality and their generic computation. Social Networks 30(2), 136-145 (2008)
-
(2008)
Social Networks
, vol.30
, Issue.2
, pp. 136-145
-
-
Brandes, U.1
-
31
-
-
58449085741
-
Collaborative attack on internet users' anonymity
-
submitted
-
Puzis, R., Yagil, D., Elovici, Y, Braha, D.: Collaborative attack on internet users' anonymity. Internet Research (submitted)
-
Internet Research
-
-
Puzis, R.1
Yagil, D.2
Elovici, Y.3
Braha, D.4
-
32
-
-
43049167460
-
Malware filtering for network security using weighted optimality measures
-
Singapore
-
Bloem, M., Alpcan, T., Schmidt, S., Basar, T.: Malware filtering for network security using weighted optimality measures. In: IEEE Conference on Control Applications, Singapore (2007)
-
(2007)
IEEE Conference on Control Applications
-
-
Bloem, M.1
Alpcan, T.2
Schmidt, S.3
Basar, T.4
-
33
-
-
33745258968
-
Locating network monitors: Complexity, heuristics, and coverage
-
Suh, K., Guo, Y, Kurose, J., Towsley, D.: Locating network monitors: Complexity, heuristics, and coverage. Computer Communications 29, 1564-1577 (2006)
-
(2006)
Computer Communications
, vol.29
, pp. 1564-1577
-
-
Suh, K.1
Guo, Y.2
Kurose, J.3
Towsley, D.4
-
34
-
-
77952414108
-
Optimal positioning of active and passive monitoring devices
-
ACM, New York
-
Chaudet, C., Fleury, E., Lassous, I.G., Rivano, H., Voge, M.E.: Optimal positioning of active and passive monitoring devices. In: CoNEXT 2005: Proceedings of the 2005 ACM conference on Emerging network experiment and technology, pp. 71-82. ACM, New York (2005)
-
(2005)
CoNEXT 2005: Proceedings of the 2005 ACM conference on Emerging network experiment and technology
, pp. 71-82
-
-
Chaudet, C.1
Fleury, E.2
Lassous, I.G.3
Rivano, H.4
Voge, M.E.5
-
35
-
-
0042635247
-
Scientific collaboration networks, ii. shortest paths, weighted networks, and centrality
-
Newman, M.E.J.: Scientific collaboration networks, ii. shortest paths, weighted networks, and centrality. Phys. Rev. E 64, 016132 (2001)
-
(2001)
Phys. Rev. E
, vol.64
, pp. 016132
-
-
Newman, M.E.J.1
-
36
-
-
0032482432
-
Collective dynamics of 'small-world' networks
-
Watts, D.J., Strogatz, S.H.: Collective dynamics of 'small-world' networks. Nature 393, 440-442 (1998)
-
(1998)
Nature
, vol.393
, pp. 440-442
-
-
Watts, D.J.1
Strogatz, S.H.2
|