메뉴 건너뛰기




Volumn 55, Issue 1, 2011, Pages 61-73

Optimal response to attacks on the open science grid

Author keywords

Cybersecurity; Integer optimization; Multiobjective; Network; Optimization

Indexed keywords

ATTACK SCENARIOS; COLLABORATION NETWORK; CYBER SECURITY; GRID ENVIRONMENTS; INTEGER OPTIMIZATION; MIXED-INTEGER PROGRAMS; MULTI OBJECTIVE; NETWORK; OPEN SCIENCE GRID; OPTIMAL RESPONSE; SCIENCE EXPERIMENTS; SCIENTIFIC PRODUCTIONS; SECURITY THREATS; SOCIAL NETWORKS; THREAT LEVELS;

EID: 78651388756     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2010.07.012     Document Type: Article
Times cited : (15)

References (37)
  • 1
    • 78651408829 scopus 로고    scopus 로고
    • Open Science Grid
    • Open Science Grid, .
  • 2
    • 78651398313 scopus 로고    scopus 로고
    • TeraGrid
    • TeraGrid, .
  • 3
    • 78651387135 scopus 로고    scopus 로고
    • Earth System Grid
    • Earth System Grid, .
  • 9
    • 70350043927 scopus 로고    scopus 로고
    • A new worm exploiting IPv6 and IPv4-IPv6 dual-stack networks: Experiment, modeling, simulation, and defense
    • 101109/MNET20095274918
    • T. Liu, X. Guan, Q. Zheng, and Y. Qu A new worm exploiting IPv6 and IPv4-IPv6 dual-stack networks: experiment, modeling, simulation, and defense IEEE Network 23 5 2009 22 29 10.1109/MNET.2009.5274918
    • (2009) IEEE Network , vol.23 , Issue.5 , pp. 22-29
    • Liu, T.1    Guan, X.2    Zheng, Q.3    Qu, Y.4
  • 10
    • 70349871422 scopus 로고    scopus 로고
    • A distributed immunization strategy based on autonomy-oriented computing
    • J. Rauch, ZW. Ras, P. Berka, T. Elomaa (Eds.) Lecture Notes in Computer Science, vol. 5722, Czech Republic, Prague
    • J. Liu, C. Gao, N. Zhong, A distributed immunization strategy based on autonomy-oriented computing, in: J. Rauch, ZW. Ras, P. Berka, T. Elomaa (Eds.), Proceedings of the 18th International Symposium on Methodologies for Intelligent Systems (ISMIS 2009), Lecture Notes in Computer Science, vol. 5722, Czech Republic, Prague, 2009, pp. 503-512.
    • (2009) Proceedings of the 18th International Symposium on Methodologies for Intelligent Systems (ISMIS 2009) , pp. 503-512
    • Liu, J.1    Gao, C.2    Zhong, N.3
  • 11
    • 70350654402 scopus 로고    scopus 로고
    • Virus propagation and immunization strategies in email networks
    • R. Huang, Q. Yang, J. Pei, J. Gama, X.F. Meng, X. Li (Eds.) Lecture Notes in Computer Science, vol. 5678, Beijing, Peoples Republic of China
    • J. Liu, C. Gao, N. Zhong, Virus propagation and immunization strategies in email networks, in: R. Huang, Q. Yang, J. Pei, J. Gama, X.F. Meng, X. Li (Eds.), Proceedings of the 5th International Conference on Advanced Data Mining and Applications, Lecture Notes in Computer Science, vol. 5678, Beijing, Peoples Republic of China, 2009, pp. 222-233.
    • (2009) Proceedings of the 5th International Conference on Advanced Data Mining and Applications , pp. 222-233
    • Liu, J.1    Gao, C.2    Zhong, N.3
  • 12
    • 70350439982 scopus 로고    scopus 로고
    • Research of malware propagation in complex networks based on 1-D cellular automata
    • S. Yu-Rong, and J. Guo-Ping Research of malware propagation in complex networks based on 1-D cellular automata Acta Physica Sinica 58 9 2009 5911 5918
    • (2009) Acta Physica Sinica , vol.58 , Issue.9 , pp. 5911-5918
    • Yu-Rong, S.1    Guo-Ping, J.2
  • 13
    • 58349119150 scopus 로고    scopus 로고
    • A new susceptible-infected model of malware propagation in the Internet
    • G.J. Wang, J. Chen, M.R. Fellows, H.D. Ma (Eds.) Zhangjiajie, Peoples Republic of China
    • Y. Gu, Y. Song, G. Jiang, S. Wang, A new susceptible-infected model of malware propagation in the Internet, in: G.J. Wang, J. Chen, M.R. Fellows, H.D. Ma (Eds.), Proceedings of the 9th International Conference for Young Computer Scientists, vols. 1-5, Zhangjiajie, Peoples Republic of China, 2008, pp. 2771-2775.
    • (2008) Proceedings of the 9th International Conference for Young Computer Scientists , vol.1-5 , pp. 2771-2775
    • Gu, Y.1    Song, Y.2    Jiang, G.3    Wang, S.4
  • 14
    • 67650642299 scopus 로고    scopus 로고
    • Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications
    • 101016/jadho200904003
    • B. Sun, G. Yan, Y. Xiao, and T.A. Yang Self-propagating mal-packets in wireless sensor networks: dynamics and defense implications Ad hoc Networks 7 8, Special Issue 2009 1489 1500 10.1016/j.adhoc.2009.04.003
    • (2009) Ad Hoc Networks , vol.7 , Issue.8 , pp. 1489-1500
    • Sun, B.1    Yan, G.2    Xiao, Y.3    Yang, T.A.4
  • 15
    • 68949183354 scopus 로고    scopus 로고
    • A quasi-species model for the propagation and containment of polymorphic worms
    • 101109/T200963
    • B. Stephenson, and B. Sikdar A quasi-species model for the propagation and containment of polymorphic worms IEEE Transactions on Computers 58 9 2009 1289 1296 10.1109/TC.2009.63
    • (2009) IEEE Transactions on Computers , vol.58 , Issue.9 , pp. 1289-1296
    • Stephenson, B.1    Sikdar, B.2
  • 18
    • 59049100560 scopus 로고    scopus 로고
    • An improved SIR model for analyzing the dynamics of worm propagation in wireless sensor networks
    • W. Xiaoming, and L. Yingshu An improved SIR model for analyzing the dynamics of worm propagation in wireless sensor networks Chinese Journal of Electronics 18 1 2009 8 12
    • (2009) Chinese Journal of Electronics , vol.18 , Issue.1 , pp. 8-12
    • Xiaoming, W.1    Yingshu, L.2
  • 19
    • 54949092786 scopus 로고    scopus 로고
    • Peer-to-peer system-based active worm attacks: Modeling, analysis and defense
    • 101016/jcomcom200808008
    • W. Yu, S. Chellappan, X. Wang, and D. Xuan Peer-to-peer system-based active worm attacks: modeling, analysis and defense Computer Communications 3 17 2008 4005 4017 10.1016/j.comcom.2008.08.008
    • (2008) Computer Communications , vol.3 , Issue.17 , pp. 4005-4017
    • Yu, W.1    Chellappan, S.2    Wang, X.3    Xuan, D.4
  • 20
    • 34047139459 scopus 로고    scopus 로고
    • Modeling the spread of worm epidemics in vehicular ad hoc networks
    • Melbourne, Australia
    • M. Nekovee, Modeling the spread of worm epidemics in vehicular ad hoc networks, in: Proceedings of the 63rd IEEE Vehicular Technology Conference, vols. 1-6, Melbourne, Australia, 2006, pp. 841-845.
    • (2006) Proceedings of the 63rd IEEE Vehicular Technology Conference , vol.1-6 , pp. 841-845
    • Nekovee, M.1
  • 21
    • 48649108112 scopus 로고    scopus 로고
    • HoneyIM: Fast detection and suppression of instant messaging malware in enterprise-like networks
    • Miami Beach, FL
    • M. Me, Z. Wu, H. Wang, HoneyIM: fast detection and suppression of instant messaging malware in enterprise-like networks, in: Proceedings of the 23rd Annual Computer Security Applications Conference, Miami Beach, FL, 2007, pp. 64-73.
    • (2007) Proceedings of the 23rd Annual Computer Security Applications Conference , pp. 64-73
    • Me, M.1    Wu, Z.2    Wang, H.3
  • 22
    • 34248995311 scopus 로고    scopus 로고
    • Modeling and simulation study of the propagation and defense of internet e-mail worms
    • 101109/TDS20071001
    • C.C. Zou, D. Towsley, and W. Gong Modeling and simulation study of the propagation and defense of internet e-mail worms IEEE Transactions on Dependable and Secure Computing 4 2 2007 105 118 10.1109/TDSC.2007.1001
    • (2007) IEEE Transactions on Dependable and Secure Computing , vol.4 , Issue.2 , pp. 105-118
    • Zou, C.C.1    Towsley, D.2    Gong, W.3
  • 25
    • 14544292384 scopus 로고    scopus 로고
    • From gridmap-file to VOMS: Managing authorization in a grid environment
    • 101016/jfuture200410006
    • R. Alfieri, R. Cecchini, V. Ciaschini, L. dell'Agnello, A. Frohner, K. Lorentey, and F. Spataro From gridmap-file to VOMS: managing authorization in a grid environment Future Generation Computer Systems 21 4 2005 549 558 10.1016/j.future.2004.10.006 High-Speed Networks and Services for Data-Intensive Grids: The DataTAG Project
    • (2005) Future Generation Computer Systems , vol.21 , Issue.4 , pp. 549-558
    • Alfieri, R.1    Cecchini, R.2    Ciaschini, V.3    Dell'Agnello, L.4    Frohner, A.5    Lorentey, K.6    Spataro, F.7
  • 28
    • 33744935671 scopus 로고    scopus 로고
    • Globus toolkit version 4: Software for service-oriented systems
    • I.T. Foster Globus toolkit version 4: software for service-oriented systems H. Jin, D.A. Reed, W. Jiang, NPC Lecture Notes in Computer Science vol. 3779 2005 Springer 2 13
    • (2005) Lecture Notes in Computer Science , vol.3779 , pp. 2-13
    • Foster, I.T.1
  • 30
    • 0000266549 scopus 로고    scopus 로고
    • Some analyses of erdös collaboration graph
    • V. Batagelj, and A. Mrvar Some analyses of erdös collaboration graph Social Networks 22 2 2000 173 186
    • (2000) Social Networks , vol.22 , Issue.2 , pp. 173-186
    • Batagelj, V.1    Mrvar, A.2
  • 31
    • 78651397085 scopus 로고    scopus 로고
    • Gratia
    • Gratia, .
  • 34
    • 9344245047 scopus 로고    scopus 로고
    • GAMS Developments Corporation, 1217 Potomac Street, NW, Washington, DC 20007, USA (Dec.)
    • A. Brooke, D. Kendrick, A. Meeraus, R. Raman, GAMS A user's guide, GAMS Developments Corporation, 1217 Potomac Street, NW, Washington, DC 20007, USA (Dec. 1998).
    • (1998) GAMS A User's Guide
    • Brooke, A.1    Kendrick, D.2    Meeraus, A.3    Raman, R.4
  • 35
    • 78651384961 scopus 로고    scopus 로고
    • GAMS Corporation, CPLEX 11, 2008
    • GAMS Corporation, CPLEX 11, 2008.
  • 37
    • 84976501077 scopus 로고    scopus 로고
    • Complementarity constraints as nonlinear equations: Theory and numerical experience
    • S. Leyffer Complementarity constraints as nonlinear equations: theory and numerical experience S. Dempe, V. Kalashnikov, Optimization and Multivalued Mappings 2006 Springer Berlin 169 208
    • (2006) Optimization and Multivalued Mappings , pp. 169-208
    • Leyffer, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.