메뉴 건너뛰기




Volumn , Issue , 2010, Pages

On approximation of new optimization methods for assessing network vulnerability

Author keywords

[No Author keywords available]

Indexed keywords

CRITICAL EDGES; CRITICAL NODE; DISRUPTIVE EVENT; EXTENSIVE SIMULATIONS; GENERAL NETWORKS; HEURISTIC SOLUTIONS; INAPPROXIMABILITY; INHOMOGENEOUS PROPERTY; LARGE-SCALE NETWORK; MALICIOUS ATTACK; NATURAL DISASTERS; NETWORK CONNECTIVITY; NETWORK PLANNING; NETWORK VULNERABILITY; NODE DEGREE; NP-COMPLETENESS; OPTIMIZATION METHOD; OPTIMIZATION PROBLEMS; PERFORMANCE GUARANTEES; VULNERABILITY ASSESSMENTS;

EID: 77953295879     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2010.5462098     Document Type: Conference Paper
Times cited : (67)

References (23)
  • 2
    • 26044461304 scopus 로고    scopus 로고
    • Identifying critical infrastructure: The median and covering facility interdiction problems
    • R. Church, M. Scaparra, and R. Middleton. Identifying critical infrastructure: the median and covering facility interdiction problems. Ann Assoc Am Geogr, 94(3):491-502, 2004.
    • (2004) Ann Assoc Am Geogr , vol.94 , Issue.3 , pp. 491-502
    • Church, R.1    Scaparra, M.2    Middleton, R.3
  • 3
    • 67349200138 scopus 로고    scopus 로고
    • Multimethodological approaches to network vulnerability analysis
    • A. Murray, T. Matisziw, and T. Grubesic. Multimethodological approaches to network vulnerability analysis. Growth Change, 2008.
    • (2008) Growth Change
    • Murray, A.1    Matisziw, T.2    Grubesic, T.3
  • 4
    • 33746192198 scopus 로고    scopus 로고
    • A graph-theoretic perspective on centrality
    • October
    • Stephen P. Borgatti and Martin G. Everett. A graph-theoretic perspective on centrality. Social Networks, 28(4):466-484, October 2006.
    • (2006) Social Networks , vol.28 , Issue.4 , pp. 466-484
    • Borgatti, S.P.1    Everett, M.G.2
  • 5
    • 84883856631 scopus 로고    scopus 로고
    • Partitioning avoidance in mobile ad hoc networks using network survivability concepts
    • D. Goyal and J. Caffery. Partitioning avoidance in mobile ad hoc networks using network survivability concepts. 7th IEEE Symp. on Compu. and Comm. 2002.
    • 7th IEEE Symp. on Compu. and Comm. 2002
    • Goyal, D.1    Caffery, J.2
  • 10
    • 33645330416 scopus 로고    scopus 로고
    • Dragon: A framework for service provisioning in heterogeneous grid networks
    • T. Lehman, J. Sobieski, and B. Jabbari. Dragon: a framework for service provisioning in heterogeneous grid networks. IEEE Comm. Magazines, 2006.
    • (2006) IEEE Comm. Magazines
    • Lehman, T.1    Sobieski, J.2    Jabbari, B.3
  • 11
    • 4143083941 scopus 로고    scopus 로고
    • Homogeneous vs heterogeneous clustered sensor networks: A comparative study
    • V. Mhatre and C. Rosenberg. Homogeneous vs heterogeneous clustered sensor networks: a comparative study. IEEE Inter. Conf. on Commu., 2004.
    • IEEE Inter. Conf. on Commu., 2004
    • Mhatre, V.1    Rosenberg, C.2
  • 12
    • 0031176702 scopus 로고    scopus 로고
    • A simple min-cut algorithm
    • M. Stoer and F. Wagner. A simple min-cut algorithm. J. ACM, 1997.
    • (1997) J. ACM
    • Stoer, M.1    Wagner, F.2
  • 14
    • 29844440416 scopus 로고    scopus 로고
    • On the hardness of approximating minimum vertex cover
    • I. Dinur and S. Safra. On the hardness of approximating minimum vertex cover. Annals of Mathematics, 162:2005, 2004.
    • (2004) Annals of Mathematics , vol.162 , pp. 2005
    • Dinur, I.1    Safra, S.2
  • 16
    • 0001545727 scopus 로고    scopus 로고
    • Divide-and-conquer approximation algorithms via spreading metrics
    • G. Even, J. S. Naor, S. Rao, and B. Schieber. Divide-and-conquer approximation algorithms via spreading metrics. Journal of ACM, 47(4):585-616, 2000.
    • (2000) Journal of ACM , vol.47 , Issue.4 , pp. 585-616
    • Even, G.1    Naor, J.S.2    Rao, S.3    Schieber, B.4
  • 19
    • 10044223607 scopus 로고    scopus 로고
    • Techniques from combinatorial approximation algorithms yield efficient algorithms for random 2ksat
    • A. Coja-Oghlan, A. Goerdt, A. Lanka, and F. Schädlich. Techniques from combinatorial approximation algorithms yield efficient algorithms for random 2ksat. Theor. Comput. Sci., 329(1-3):1-45, 2004.
    • (2004) Theor. Comput. Sci. , vol.329 , Issue.1-3 , pp. 1-45
    • Coja-Oghlan, A.1    Goerdt, A.2    Lanka, A.3    Schädlich, F.4
  • 21
    • 33646385629 scopus 로고    scopus 로고
    • Identifying sets of key players in a social network
    • S. P. Borgatti. Identifying sets of key players in a social network. Comput. Math. Organiz. Theor., 12:21-34, 2006
    • (2006) Comput. Math. Organiz. Theor. , vol.12 , pp. 21-34
    • Borgatti, S.P.1
  • 22
    • 74549171036 scopus 로고    scopus 로고
    • On pairwise connectivity of wireless multihop networks
    • F. Sun and M. A. Shayman On pairwise connectivity of wireless multihop networks Inter. J. Security and Networks, 2(2) 37-49, 2007
    • (2007) Inter. J. Security and Networks , vol.2 , Issue.2 , pp. 37-49
    • Sun, F.1    Shayman, M.A.2
  • 23
    • 77953319756 scopus 로고    scopus 로고
    • On New Approaches of Assessing Network Vulnerability: Hardness and Approximation
    • T. N. Dinh, Y. Xuan, M. T. Thai, E. K. Park and T. Znati On New Approaches of Assessing Network Vulnerability: Hardness and Approximation. Manuscript, 2009.
    • (2009) Manuscript
    • Dinh, T.N.1    Xuan, Y.2    Thai, M.T.3    Park, E.K.4    Znati, T.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.