-
2
-
-
66249147541
-
A survey of botnet technology and defenses
-
Bailey, M.; Cooke, E.; Jahanian, F.; Xu, Y.; & Karir, M. (2009). A survey of botnet technology and defenses. In Conference for homeland security, cybersecurity applications & technology (pp. 299-304).
-
(2009)
Conference for Homeland Security, Cybersecurity Applications & Technology
, pp. 299-304
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Xu, Y.4
Karir, M.5
-
3
-
-
33745154114
-
Algebraic gossip: A network coding approach to optimal multiple rumor mongering
-
S. Deb, M. Médard, and C. Choute Algebraic gossip: a network coding approach to optimal multiple rumor mongering IEEE Transactions on Information Theory 52 6 2006 2486 2507
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.6
, pp. 2486-2507
-
-
Deb, S.1
Médard, M.2
Choute, C.3
-
4
-
-
0038516887
-
Generic properties and control of linear structured systems: A survey
-
J.-M. Dion, C. Commault, and J. van der Woude Generic properties and control of linear structured systems: a survey Automatica 39 7 2003 1125 1144
-
(2003)
Automatica
, vol.39
, Issue.7
, pp. 1125-1144
-
-
Dion, J.-M.1
Commault, C.2
Van Der Woude, J.3
-
8
-
-
45249101743
-
Resilient network coding in the presence of Byzantine adversaries
-
S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, M. Médard, and M. Effros Resilient network coding in the presence of Byzantine adversaries IEEE Transactions on Information Theory 54 6 2008 2596 2603
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.6
, pp. 2596-2603
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
Médard, M.6
Effros, M.7
-
15
-
-
64149119332
-
Consensus and cooperation in networked multi-agent systems
-
R. Olfati-Saber, J.A. Fax, and R.M. Murray Consensus and cooperation in networked multi-agent systems Proceedings of the IEEE 95 1 2007 215 233
-
(2007)
Proceedings of the IEEE
, vol.95
, Issue.1
, pp. 215-233
-
-
Olfati-Saber, R.1
Fax, J.A.2
Murray, R.M.3
-
20
-
-
85012686025
-
Discrete Riccati equations: Alternative algorithms, asymptotic properties and system theory interpretations
-
C.T. Leondes, Academic Press
-
L.M. Silverman Discrete Riccati equations: alternative algorithms, asymptotic properties and system theory interpretations C.T. Leondes, Control and dynamic systems, Vol. 12 1976 Academic Press 313 386
-
(1976)
Control and Dynamic Systems, Vol. 12
, pp. 313-386
-
-
Silverman, L.M.1
-
21
-
-
43349106879
-
Distributed function calculation and consensus using linear iterative strategies
-
S. Sundaram, and C.N. Hadjicostis Distributed function calculation and consensus using linear iterative strategies IEEE Journal on Selected Areas in Communications 26 4 2008 650 660
-
(2008)
IEEE Journal on Selected Areas in Communications
, vol.26
, Issue.4
, pp. 650-660
-
-
Sundaram, S.1
Hadjicostis, C.N.2
-
22
-
-
79960124958
-
Distributed function calculation via linear iterative strategies in the presence of malicious agents
-
S. Sundaram, and C.N. Hadjicostis Distributed function calculation via linear iterative strategies in the presence of malicious agents IEEE Transactions on Automatic Control 56 7 2011 1495 1508
-
(2011)
IEEE Transactions on Automatic Control
, vol.56
, Issue.7
, pp. 1495-1508
-
-
Sundaram, S.1
Hadjicostis, C.N.2
-
25
-
-
0003736078
-
-
Prentice-Hall Inc. Upper Saddle River, New Jersey
-
D.B. West Introduction to graph theory 2001 Prentice-Hall Inc. Upper Saddle River, New Jersey
-
(2001)
Introduction to Graph Theory
-
-
West, D.B.1
-
26
-
-
33745147272
-
Network coding theory
-
Now Publishers Inc
-
R.W. Yeung, S.-Y.R. Li, N. Cai, and Z. Zhang Network coding theory Foundations and trends in communications and information theory, Vol. 2 2005 Now Publishers Inc. 241 381
-
(2005)
Foundations and Trends in Communications and Information Theory, Vol. 2
, pp. 241-381
-
-
Yeung, R.W.1
Li, S.-Y.R.2
Cai, N.3
Zhang, Z.4
-
27
-
-
84860623814
-
Robustness of information diffusion algorithms to locally bounded adversaries
-
Zhang, H.; & Sundaram, S. (2012). Robustness of information diffusion algorithms to locally bounded adversaries. In Proceedings of the American control conference (pp. 5855-5861).
-
(2012)
Proceedings of the American Control Conference
, pp. 5855-5861
-
-
Zhang, H.1
Sundaram, S.2
|