-
1
-
-
0020335555
-
Coevolution of hosts and parasites
-
RM Anderson and RM May. Coevolution of hosts and parasites. Parasitology, 85(02):411-426, 1982.
-
(1982)
Parasitology
, vol.85
, Issue.2
, pp. 411-426
-
-
Anderson, R.M.1
May, R.M.2
-
2
-
-
0038483826
-
Emergence of scaling random networks
-
October
-
A. L. Barabasi and R. Albert. Emergence of scaling in random networks. Science, 286(5439):509-512, October 1999.
-
(1999)
Science
, vol.286
, Issue.5439
, pp. 509-512
-
-
Barabasi, A.L.1
Albert, R.2
-
4
-
-
0033721503
-
Graph structure in the web
-
A. Broder, R. Kumar, F. Maghoul, P. Raghavan, S. Rajagopalan, R. Stata, A. Tomkins, and J. Wiener. Graph structure in the web. WWW9 / Computer Networks, 33(1-6):309-320, 2000.
-
(2000)
WWW9 / Computer Networks
, vol.33
, Issue.1-6
, pp. 309-320
-
-
Broder, A.1
Kumar, R.2
Maghoul, F.3
Raghavan, P.4
Rajagopalan, S.5
Stata, R.6
Tomkins, A.7
Wiener, J.8
-
5
-
-
85064176806
-
Measuring pay-per-install: The commoditization of malware distribution
-
USENIX Association
-
Juan Caballero, Chris Grier, Christian Kreibich, and Vern Paxson. Measuring pay-per-install: The commoditization of malware distribution. In USENIX Security Symposium. USENIX Association, 2011.
-
(2011)
USENIX Security Symposium
-
-
Caballero, J.1
Grier, C.2
Kreibich, C.3
Paxson, V.4
-
6
-
-
79958708897
-
-
Jun
-
Jean Camp, Lorrie Cranor, Nick Feamster, Joan Feigenbaum, Stephanie Forrest, Dave Kotz, Wenke Lee, Patrick Lincoln, Vern Paxson, Mike Reiter, Ron Rivest, William Sanders, Stefan Savage, Sean Smith, Eugene Spafford, and Sal Stolfo. Data for cybersecurity research: Process and "wish list". http://www.gtisc.gatech.edu/files-nsf10/data-wishlist.pdf, Jun 2009.
-
(2009)
Data for Cybersecurity Research: Process and "wish List"
-
-
Camp, J.1
Cranor, L.2
Feamster, N.3
Feigenbaum, J.4
Forrest, S.5
Kotz, D.6
Lee, W.7
Lincoln, P.8
Paxson, V.9
Reiter, M.10
Rivest, R.11
Sanders, W.12
Savage, S.13
Smith, S.14
Spafford, E.15
Stolfo, S.16
-
7
-
-
80052678930
-
Polonium: Tera-scale graph mining and inference for malware detection
-
D.H. Chau, C. Nachenberg, J. Wilhelm, A. Wright, and C. Faloutsos. Polonium: Tera-scale graph mining and inference for malware detection. SIAM International Conference on Data Mining, 2011.
-
(2011)
SIAM International Conference on Data Mining
-
-
Chau, D.H.1
Nachenberg, C.2
Wilhelm, J.3
Wright, A.4
Faloutsos, C.5
-
8
-
-
57349194232
-
Robust dynamic classes revealed by measuring the response function of a social system
-
R. Crane and D. Sornette. Robust dynamic classes revealed by measuring the response function of a social system. Proceedings of the National Academy of Sciences, 105(41):15649-15653, 2008.
-
(2008)
Proceedings of the National Academy of Sciences
, vol.105
, Issue.41
, pp. 15649-15653
-
-
Crane, R.1
Sornette, D.2
-
9
-
-
0030149554
-
Self-similarity in world wide web traffic, evidence and possible causes
-
M. Crovella and A. Bestavros. Self-similarity in world wide web traffic, evidence and possible causes. Sigmetrics, pages 160-169, 1996.
-
(1996)
Sigmetrics
, pp. 160-169
-
-
Crovella, M.1
Bestavros, A.2
-
11
-
-
0033204106
-
On powerlaw relationships of the internet topology
-
Aug-Sept
-
Michalis Faloutsos, Petros Faloutsos, and Christos Faloutsos. On powerlaw relationships of the internet topology. SIGCOMM, pages 251-262, Aug-Sept. 1999.
-
(1999)
SIGCOMM
, pp. 251-262
-
-
Faloutsos, M.1
Faloutsos, P.2
Faloutsos, C.3
-
12
-
-
33750322737
-
Planet scale software updates
-
In Luigi Rizzo, Thomas E. Anderson, and Nick McKeown, editors ACM
-
Christos Gkantsidis, Thomas Karagiannis, and Milan Vojnovic. Planet scale software updates. In Luigi Rizzo, Thomas E. Anderson, and Nick McKeown, editors, SIGCOMM, pages 423-434. ACM, 2006.
-
(2006)
SIGCOMM
, pp. 423-434
-
-
Gkantsidis, C.1
Karagiannis, T.2
Vojnovic, M.3
-
13
-
-
0034486891
-
The mathematics of infectious diseases
-
H.W. Hethcote. The mathematics of infectious diseases. SIAM review, 42(4):599-653, 2000.
-
(2000)
SIAM Review
, vol.42
, Issue.4
, pp. 599-653
-
-
Hethcote, H.W.1
-
14
-
-
65449171667
-
Microscopic evolution of social networks
-
ACM
-
J. Leskovec, L. Backstrom, R. Kumar, and A. Tomkins. Microscopic evolution of social networks. In Proceeding of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 462-470. ACM, 2008.
-
(2008)
Proceeding of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 462-470
-
-
Leskovec, J.1
Backstrom, L.2
Kumar, R.3
Tomkins, A.4
-
15
-
-
70349085053
-
-
arXiv preprint arXiv:0704. 2803
-
J. Leskovec, M. McGlohon, C. Faloutsos, N. Glance, and M. Hurst. Cascading behavior in large blog graphs. arXiv preprint arXiv:0704.2803, 2007.
-
(2007)
Cascading Behavior in Large Blog Graphs
-
-
Leskovec, J.1
McGlohon, M.2
Faloutsos, C.3
Glance, N.4
Hurst, M.5
-
16
-
-
0000873069
-
A method for the solution of certain non-linear problems in least squares
-
K. Levenberg. A method for the solution of certain non-linear problems in least squares. Quarterly Journal of Applied Mathmatics, II(2):164-168, 1944.
-
(1944)
Quarterly Journal of Applied Mathmatics
, vol.2
, Issue.2
, pp. 164-168
-
-
Levenberg, K.1
-
17
-
-
84893257277
-
-
Personal communication
-
Bruce Maggs. Personal communication, 2012.
-
(2012)
-
-
Maggs, B.1
-
19
-
-
84866023367
-
Rise and fall patterns of information diffusion: Model and implications
-
ACM
-
Y. Matsubara, Y. Sakurai, B. Aditya Prakash, L. Li, and C. Faloutsos. Rise and fall patterns of information diffusion: Model and implications. In Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 6-14. ACM, 2012.
-
(2012)
Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 6-14
-
-
Matsubara, Y.1
Sakurai, Y.2
Aditya Prakash, B.3
Li, L.4
Faloutsos, C.5
-
20
-
-
0742276097
-
Inside the Slammer worm
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the Slammer worm. Security & Privacy, IEEE, 1(4):33-39, 2003.
-
(2003)
Security & Privacy, IEEE
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
21
-
-
0141762461
-
Code-red: A case study on the spread and victims of an internet worm
-
ACM
-
David Moore, Colleen Shannon, and Kimberly C. Claffy. Code-red: a case study on the spread and victims of an internet worm. In Internet Measurement Workshop, pages 273-284. ACM, 2002.
-
(2002)
Internet Measurement Workshop
, pp. 273-284
-
-
Moore, D.1
Shannon, C.2
Claffy, K.C.3
-
22
-
-
24744469980
-
Power laws, pareto distributions and zipf's law
-
M. E. J. Newman. Power laws, pareto distributions and zipf's law. Contemporary Physics, 46, 2005.
-
(2005)
Contemporary Physics
, vol.46
-
-
Newman, M.E.J.1
-
23
-
-
79958736290
-
Toward a standard benchmark for computer security research: The Worldwide Intelligence Network Environment (WINE)
-
Salzburg, Austria Apr
-
Tudor Dumitraş and Darren Shou. Toward a standard benchmark for computer security research: The Worldwide Intelligence Network Environment (WINE). In EuroSys BADGERS Workshop, Salzburg, Austria, Apr 2011.
-
(2011)
EuroSys BADGERS Workshop
-
-
Dumitras, T.1
Shou, D.2
-
24
-
-
0032686283
-
A multifractal wavelet model with application to network traffic
-
April
-
Ruldolf H. Riedi, Matthew S. Crouse, Vinay J. Ribeiro, and Richard G. Baraniuk. A multifractal wavelet model with application to network traffic. In IEEE Transactions on Information Theory, number 3, April 1999.
-
(1999)
IEEE Transactions on Information Theory
, Issue.3
-
-
Riedi, R.H.1
Crouse, M.S.2
Ribeiro, V.J.3
Baraniuk, R.G.4
-
25
-
-
0003932737
-
-
W. H. Freeman, New York, 6 edition
-
Manfred Schroeder. Fractals, Chaos, Power Laws. W. H. Freeman, New York, 6 edition, 1991.
-
(1991)
Fractals, Chaos, Power Laws
-
-
Schroeder, M.1
-
26
-
-
14944380936
-
The top speed of flash worms
-
In Vern Paxson, editor, ACM Press
-
Stuart Staniford, David Moore, Vern Paxson, and Nicholas Weaver. The top speed of flash worms. In Vern Paxson, editor, WORM, pages 33-42. ACM Press, 2004.
-
(2004)
WORM
, pp. 33-42
-
-
Staniford, S.1
Moore, D.2
Paxson, V.3
Weaver, N.4
-
27
-
-
85084162258
-
How to 0wn the internet in your spare time
-
Berkeley, CA, USA. USENIX Association
-
Stuart Staniford, Vern Paxson, and Nicholas Weaver. How to 0wn the internet in your spare time. In Proceedings of the 11th USENIX Security Symposium, pages 149-167, Berkeley, CA, USA, 2002. USENIX Association.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 149-167
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
29
-
-
1642303213
-
Capturing the spatio-temporal behavior of real traffic data
-
Mengzhi Wang, Anastassia Ailamaki, and Christos Faloutsos. Capturing the spatio-temporal behavior of real traffic data. Perform. Eval., 49(1/4):147-163, 2002.
-
(2002)
Perform. Eval
, vol.49
, Issue.1-4
, pp. 147-163
-
-
Wang, M.1
Ailamaki, A.2
Faloutsos, C.3
-
30
-
-
0036206378
-
Data mining meets performance evaluation: Fast algorithms for modeling bursty traffic
-
February
-
Mengzhi Wang, Tara Madhyastha, Ngai Hang Chang, Spiros Papadimitriou, and Christos Faloutsos. Data mining meets performance evaluation: Fast algorithms for modeling bursty traffic. ICDE, February 2002.
-
(2002)
ICDE
-
-
Wang, M.1
Madhyastha, T.2
Hang Chang, N.3
Papadimitriou, S.4
Faloutsos, C.5
-
31
-
-
14944365100
-
Reflections on witty: Analyzing the attacker
-
June
-
Nicholas Weaver and Dan Ellis. Reflections on Witty: Analyzing the attacker. ;login: The USENIX Magazine, 29(3):34-37, June 2004.
-
(2004)
Login: The USENIX Magazine
, vol.29
, Issue.3
, pp. 34-37
-
-
Weaver, N.1
Ellis, D.2
|