-
1
-
-
84863745739
-
Why Rumors Spread so Quickly in Social Networks
-
Jun.
-
B. Doerr, M. Fouz, and T. Friedrich, "Why Rumors Spread so Quickly in Social Networks, " Commun. ACM, vol. 55, no. 6, Jun. 2012, pp. 70-75.
-
(2012)
Commun. ACM
, vol.55
, Issue.6
, pp. 70-75
-
-
Doerr, B.1
Fouz, M.2
Friedrich, T.3
-
4
-
-
78149283685
-
Identification of influential spreaders in complex networks
-
Aug
-
M. Kitsak et al., "Identification of Influential Spreaders in Complex Networks, " Nature Physics, vol. 6, no. 11, Aug 2010, pp. 888-93.
-
(2010)
Nature Physics
, vol.6
, Issue.11
, pp. 888-893
-
-
Kitsak, M.1
-
5
-
-
79955879494
-
Controllability of complex networks
-
Y. Y. Liu, J. J. Slotine, and A. Laszlo Barabasi, "Controllability of Complex Networks, " Nature, vol. 473, 2011, pp. 167-73.
-
(2011)
Nature
, vol.473
, pp. 167-173
-
-
Liu, Y.Y.1
Slotine, J.J.2
Laszlo Barabasi, A.3
-
6
-
-
20444504323
-
Uncovering the overlapping community structure of complex networks in nature and society
-
G. Palla et al., "Uncovering the Overlapping Community Structure of Complex Networks in Nature and Society, " Nature, vol. 435, 2005, pp. 814-18.
-
(2005)
Nature
, vol.435
, pp. 814-818
-
-
Palla, G.1
-
7
-
-
70349659420
-
A social network based patching scheme for worm containment in cellular networks
-
Z. Zhu et al., "A Social Network Based Patching Scheme for Worm Containment in Cellular Networks, " Proc. IEEE INFOCOM, 2009, pp. 1476-84.
-
(2009)
Proc. IEEE INFOCOM
, pp. 1476-1484
-
-
Zhu, Z.1
-
8
-
-
34547413871
-
From the cover: A model of internet topology using k-shell decomposition
-
S. Carmi et al., "From the Cover: A Model of Internet Topology Using K-Shell Decomposition, " Proc. National Academy of Sciences, PNAS, vol. 104, no. 27, 2007, pp. 11150-54.
-
(2007)
Proc. National Academy of Sciences, PNAS
, vol.104
, Issue.27
, pp. 11150-11154
-
-
Carmi, S.1
-
9
-
-
85027286362
-
Epidemics on networks
-
Oxford University Press ch. 17
-
M. E. J. Newman, Networks: An Introduction, Oxford University Press, 2010, ch. 17, "Epidemics on Networks, " pp. 700-50.
-
(2010)
Networks: An Introduction
, pp. 700-750
-
-
Newman, M.E.J.1
-
10
-
-
34248995311
-
Modeling and simulation study of the propagation and defense of internet e-mail worms
-
C. C. Zou, D. Towsley, and W. Gong, "Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms, " IEEE Trans. Dependable Secure Computing, vol. 4, no. 2, 2007, pp. 105-18.
-
(2007)
IEEE Trans. Dependable Secure Computing
, vol.4
, Issue.2
, pp. 105-118
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
-
11
-
-
26844473415
-
Spatial-temporal modeling of malware propagation in networks
-
Z. Chen and C. Ji, "Spatial-Temporal Modeling of Malware Propagation in Networks, " IEEE Trans. Neural Netw., vol. 16, no. 5, 2005, pp. 1291-1303.
-
(2005)
IEEE Trans. Neural Netw.
, vol.16
, Issue.5
, pp. 1291-1303
-
-
Chen, Z.1
Ji, C.2
-
12
-
-
84880054920
-
Modeling propagation dynamics of social network worms
-
S. Wen et al., "Modeling Propagation Dynamics of Social Network Worms, " IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 8, 2013, pp. 1633-43.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.8
, pp. 1633-1643
-
-
Wen, S.1
-
13
-
-
84904668804
-
Modeling and analysis on the propagation dynamics of modern email malware
-
July/Aug.
-
S. Wen et al., "Modeling and Analysis on the Propagation Dynamics of Modern Email Malware, " IEEE Trans. Dependable Secure Computing, vol. 11, no. 4, July/Aug. 2014, pp. 361-374.
-
(2014)
IEEE Trans. Dependable Secure Computing
, vol.11
, Issue.4
, pp. 361-374
-
-
Wen, S.1
-
14
-
-
85067750299
-
A sword with two edges: Propagation studies on both positive and negative information in online social networks
-
accepted 5/12/2013, in press
-
S. Wen et al., "A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks, " IEEE Trans. Comput., accepted 5/12/2013, in press.
-
IEEE Trans. Comput
-
-
Wen, S.1
-
15
-
-
84891429894
-
Modeling botnet propagation using time zones
-
D. Dagon, C. Zou, and W. Lee, "Modeling Botnet Propagation Using Time Zones, " Proc. 13th Network and Distributed System Security Symp. (NDSS), USA, 2006.
-
(2006)
Proc. 13th Network and Distributed System Security Symp. (NDSS), USA
-
-
Dagon, D.1
Zou, C.2
Lee, W.3
-
16
-
-
33747172362
-
Maximizing the spread of influence through a social network
-
D. Kempe, J. Kleinberg, and E. Tardos, "Maximizing the Spread of Influence Through a Social Network, " Proc. Ninth ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining, ser. KDD '03, 2003, pp. 137-46.
-
(2003)
Proc. Ninth ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining, Ser. KDD '03
, pp. 137-146
-
-
Kempe, D.1
Kleinberg, J.2
Tardos, E.3
-
17
-
-
80052722917
-
Limiting the spread of misinformation in social networks
-
C. Budak, D. Agrawal, and A. El Abbadi, "Limiting the Spread of Misinformation in Social Networks, " Proc. 20th Int'l Conf. World Wide Web, ser. WWW '11. ACM, 2011, pp. 665-74.
-
(2011)
Proc. 20th Int'l Conf. World Wide Web, Ser. WWW '11. ACM
, pp. 665-674
-
-
Budak, C.1
Agrawal, D.2
El Abbadi, A.3
|