-
1
-
-
0032482432
-
Collective dynamics of small-world networks
-
Watts DJ, Strogatz SH. Collective dynamics of small-world networks. Nature 1998; 393: 440-442.
-
(1998)
Nature
, vol.393
, pp. 440-442
-
-
Watts, D.J.1
Strogatz, S.H.2
-
6
-
-
77954343569
-
Davis social links: Integrating social networks with internet routing
-
Kyoto, Japan, August
-
Banks L, Ye S, Huang Y, Wu SF. Davis social links: Integrating social networks with internet routing. In Proceedings of ACM SIGCOMM Workshop on Large-Scale Attack Defense, Kyoto, Japan, August 2007.
-
(2007)
In Proceedings of Acm Sigcomm Workshop On Large-scale Attack Defense
-
-
Banks, L.1
Ye, S.2
Huang, Y.3
Wu, S.F.4
-
7
-
-
11244303741
-
Dynamic classification of groups through social network analysis and hmms
-
Austin, TX, USA, March
-
Coffman T, Marcus S. Dynamic classification of groups through social network analysis and hmms. In Proceedings of the 2004 IEEE Aerospace Conference, Vol. 5, Austin, TX, USA, March 2004; 3197-3205.
-
(2004)
In Proceedings of The 2004 Ieee Aerospace Conference, Vol
, vol.5
, pp. 3197-3205
-
-
Coffman, T.1
Marcus, S.2
-
8
-
-
11244311871
-
Pattern classification in social network analysis: A case study
-
Austin, TX, USA
-
Coffman T, Marcus S. Pattern classification in social network analysis: a case study. In Proceedings of the 2004 IEEE Aerospace Conference, Vol. 5, Austin, TX, USA, March 2004; 3162-3175.
-
(2004)
In Proceedings of The 2004 Ieee Aerospace Conference
, vol.5
, pp. 3162-3175
-
-
Coffman, T.1
Marcus, S.2
-
9
-
-
31044446956
-
Scan statistics on enron graphs
-
Priebe CE, Conroy JM, Marchette DJ, Park Y. Scan statistics on enron graphs. Computational and Mathematical Organization Theory 2005; 11(3): 229-247.
-
(2005)
Computational and Mathematical Organization Theory
, vol.11
, Issue.3
, pp. 229-247
-
-
Priebe, C.E.1
Conroy, J.M.2
Marchette, D.J.3
Park, Y.4
-
16
-
-
0037629724
-
Cross-feature analysis for detecting ad-hoc routing anomalies
-
Huang Y, Fan W, Lee W, Yu PS. Cross-feature analysis for detecting ad-hoc routing anomalies. In 23rd International Conference on Distributed Computing System (ICDCS 2003), 2003; 478-787.
-
(2003)
In 23rd International Conference On Distributed Computing System (icdcs
, vol.2003
, pp. 478-787
-
-
Huang, Y.1
Fan, W.2
Lee, W.3
Yu, P.S.4
-
17
-
-
34548048170
-
Detecting blackhole attack on aodv-based mobile ad hoc net-works by dynamic learning
-
Kurosawal S, Nakayama H, Katol N, Jamalipour A, Nemoto Y. Detecting blackhole attack on aodv-based mobile ad hoc net-works by dynamic learning. International Journal of Network Security 2007; 5: 338-346.
-
(2007)
International Journal of Network Security
, vol.5
, pp. 338-346
-
-
Kurosawal, S.1
Nakayama, H.2
Katol, N.3
Jamalipour, A.4
Nemoto, Y.5
-
18
-
-
39049125168
-
Gupta R. Temporal analysis of routing activity for anomaly detection in ad hoc networks. In
-
Liu H, Gupta R. Temporal analysis of routing activity for anomaly detection in ad hoc networks. In 2006 IEEE International Conference on Mobile Adhoc and Sensor Systems(MASS), 2006; 505-508.
-
(2006)
Ieee International Conference On Mobile Adhoc and Sensor Systems(mass)
, vol.2006
, pp. 505-508
-
-
Liu, H.1
-
20
-
-
84944714533
-
Mishra A. Collaborativesecurityarchitectureforblack hole attack prevention in mobile ad hoc networks
-
2003. RAWCON'03. Proceedings
-
Patcha A, Mishra A. Collaborativesecurityarchitectureforblack hole attack prevention in mobile ad hoc networks. In Radio and Wireless Conference, 2003. RAWCON'03. Proceedings, 2003; 75-78.
-
(2003)
In Radio and Wireless Conference
, pp. 75-78
-
-
Patcha, A.1
-
22
-
-
84865730611
-
A set of measures of centrality based on betweeness
-
Freeman LC. A set of measures of centrality based on betweeness. Sociometry 1977; 40: 35-40.
-
(1977)
Sociometry
, vol.40
, pp. 35-40
-
-
Freeman, L.C.1
-
23
-
-
0001492480
-
Centrality in valued graphs: A measure of betweenness based on network flow
-
Freeman LC, Borgattis SP, White DR. Centrality in valued graphs: a measure of betweenness based on network flow. Social Networks 1991; 3: 141-154.
-
(1991)
Social Networks
, vol.3
, pp. 141-154
-
-
Freeman, L.C.1
Borgattis, S.P.2
White, D.R.3
-
24
-
-
0036788699
-
Egocentric and sociocentric measures of network centrality
-
Marsden PV. Egocentric and sociocentric measures of network centrality. Social Networks 2002; 24(4): 407-422.
-
(2002)
Social Networks
, vol.24
, Issue.4
, pp. 407-422
-
-
Marsden, P.V.1
-
25
-
-
0001316531
-
Factoring and weighting approaches to status scores and clique identification
-
Bonacich P. Factoring and weighting approaches to status scores and clique identification. Journal of Mathematical Sociology 1972; 2: 113-120.
-
(1972)
Journal of Mathematical Sociology
, vol.2
, pp. 113-120
-
-
Bonacich, P.1
-
26
-
-
27544491841
-
Network vulnerability assessment using Bayesian networks.
-
Liu Y, Man H. Network vulnerability assessment using Bayesian networks. In Proceedings of SPIE DataMining, IntrusionDetection, Information Assurance, and Data Networks Security, Vol. 5812, March 2005; 61-71.
-
(2005)
In Proceedings of SPIE DataMining, IntrusionDetection, Information Assurance, and Data Networks Security
, vol.5812
, pp. 61-71
-
-
Liu, Y.1
Man, H.2
-
27
-
-
34249315078
-
Validation of the random way-point mobility model through a real world mobility trace
-
Rojas A, Branch P, Armitage G. Validation of the random way-point mobility model through a real world mobility trace. In IEEE Region 10 (TENCON 2005), 2005; 1-6.
-
(2005)
In IEEE Region 10 (tencon 2005)
, pp. 1-6
-
-
Rojas, A.1
Branch, P.2
Armitage, G.3
-
29
-
-
74849109674
-
Gateway discovery and routing in ad hoc networks with nat-based internet connectivity
-
2004 (VTC 2004-Fall), 2004 IEEE 60th
-
Shin J, Lee H, Na J, Park A, Kim S. Gateway discovery and routing in ad hoc networks with nat-based internet connectivity. In Proceedings of the Vehicular Technology Conference, 2004 (VTC 2004-Fall), 2004 IEEE 60th, Vol. 4, 2004; 26-29.
-
(2004)
In Proceedings of The Vehicular Technology Conference
, vol.4
, pp. 26-29
-
-
Shin, J.1
Lee, H.2
Na, J.3
Park, A.4
Kim, S.5
-
37
-
-
33750953996
-
Defending the sybil attack in p2p networks: Taxonomy, challenges, and a proposal for self-registration
-
Dinger J, Hartenstein H. Defending the sybil attack in p2p networks: taxonomy, challenges, and a proposal for self-registration. In International Conference on Availability, Re-liability and Security. IEEE Computer Society, 2006; 756-763.
-
(2006)
In International Conference On Availability, Re-liability and Security. Ieee Computer Society
, pp. 756-763
-
-
Dinger, J.1
Hartenstein, H.2
-
38
-
-
77951438838
-
Defending against eclipse attacks on overlay networks
-
ACM Press: New York, USA
-
Singh A, Castro M, Druschel P, Rowstron AIT. Defending against eclipse attacks on overlay networks. In proceedings of the 11th Workshop on ACM SIGOPS European Workshop. ACM Press: New York, USA, 2004; 115-120.
-
(2004)
In Proceedings of The 11th Workshop On Acm Sigops European Workshop
, pp. 115-120
-
-
Singh, A.1
Castro, M.2
Druschel, P.3
Rowstron, A.I.T.4
|