메뉴 건너뛰기




Volumn , Issue , 2014, Pages

Worst-case scenarios for greedy, centrality-based network protection strategies

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION SCIENCE; MATHEMATICAL PROGRAMMING; VIRUSES;

EID: 84901391105     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CISS.2014.6814076     Document Type: Conference Paper
Times cited : (5)

References (15)
  • 2
    • 0942268259 scopus 로고    scopus 로고
    • Efficient immunization strategies for computer networks and populations
    • Reuven Cohen, Shlomo Havlin, and Daniel Ben-Avraham. Efficient immunization strategies for computer networks and populations. Physical Review Letters, 91(24):247901, 2003.
    • (2003) Physical Review Letters , vol.91 , Issue.24 , pp. 247901
    • Cohen, R.1    Havlin, S.2    Ben-Avraham, D.3
  • 4
    • 78650885364 scopus 로고    scopus 로고
    • Distributing antidote using pagerank vectors
    • Fan Chung, Paul Horn, and Alexander Tsiatas. Distributing antidote using pagerank vectors. Internet Mathematics, 6(2):237-254, 2009.
    • (2009) Internet Mathematics , vol.6 , Issue.2 , pp. 237-254
    • Chung, F.1    Horn, P.2    Tsiatas, A.3
  • 6
    • 84883479955 scopus 로고    scopus 로고
    • Models and algorithms for network immunization
    • Department of Computer Science, University of Helsinki
    • George Giakkoupis, Aristides Gionis, Evimaria Terzi, and Panayiotis Tsaparas. Models and algorithms for network immunization. Technical report, Technical Report C-2005-75, Department of Computer Science, University of Helsinki, 2005.
    • (2005) Technical Report, Technical Report C-2005-75
    • Giakkoupis, G.1    Gionis, A.2    Terzi, E.3    Tsaparas, P.4
  • 12
    • 0002618815 scopus 로고
    • On the asymptotic behavior of the stochastic and deterministic models of an epidemic
    • George H Weiss and Menachem Dishon. On the asymptotic behavior of the stochastic and deterministic models of an epidemic. Mathematical Biosciences, 11(3):261-265, 1971.
    • (1971) Mathematical Biosciences , vol.11 , Issue.3 , pp. 261-265
    • Weiss, G.H.1    Dishon, M.2
  • 13
    • 69249240176 scopus 로고    scopus 로고
    • Cascade-based attack vulnerability on the us power grid
    • Jian-Wei Wang and Li-Li Rong. Cascade-based attack vulnerability on the us power grid. Safety Science, 47(10):1332-1336, 2009.
    • (2009) Safety Science , vol.47 , Issue.10 , pp. 1332-1336
    • Wang, J.1    Rong, L.2
  • 15
    • 84945181426 scopus 로고
    • Continuity and location of zeroes of linear combinations of polynomials
    • Mishael Zedek. Continuity and location of zeroes of linear combinations of polynomials. Proc. Amer. Math. Soc., 16:78-84, 1965.
    • (1965) Proc. Amer. Math. Soc , vol.16 , pp. 78-84
    • Zedek, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.