-
1
-
-
84924124042
-
-
Available online
-
[1] D. Aitel. “Nematodes—Beneficial Worms.” Available online (http://www.immunityinc.com/ downloads/nematodes.pdf), September 2005.
-
(2005)
Nematodes—Beneficial Worms
, Issue.September
-
-
Aitel, D.1
-
2
-
-
0034721164
-
Error and Attack Tolerance of Complex Networks
-
[2] R. Albert, H. Jeong, and A. Barabasi. “Error and Attack Tolerance of Complex Networks.” Nature 406 (2000), 378-482
-
(2000)
Nature
, vol.406
, pp. 378-482
-
-
Albert, R.1
Jeong, H.2
Barabasi, A.3
-
3
-
-
74749095540
-
Threshold Behaviour and Final Outcome of an Epidemic on a Random Network with Household Structure
-
[3] F. Ball, D. Sirl, and P. Trapman. “Threshold Behaviour and Final Outcome of an Epidemic on a Random Network with Household Structure.” Adv. in Appl. Probab 41:3 (2009), 765-796.
-
(2009)
Adv. In Appl. Probab
, vol.41
, Issue.3
, pp. 765-796
-
-
Ball, F.1
Sirl, D.2
Trapman, P.3
-
4
-
-
77549085667
-
Analysis of a Stochastic {SIR} Epidemic on a Random Network Incorporating Household Structure
-
[4] F. Ball, D. Sirl, and P. Trapman. “Analysis of a Stochastic {SIR} Epidemic on a Random Network Incorporating Household Structure.” Mathematical Biosciences 224:2 (2010), 53-73.
-
(2010)
Mathematical Biosciences
, vol.224
, Issue.2
, pp. 53-73
-
-
Ball, F.1
Sirl, D.2
Trapman, P.3
-
5
-
-
0038483826
-
Emergence of Scaling in Random Networks
-
[5] A. Barabasi and R. Albert. “Emergence of Scaling in Random Networks.” Science 286 (1999), 509-512.
-
(1999)
Science
, vol.286
, pp. 509-512
-
-
Barabasi, A.1
Albert, R.2
-
6
-
-
20744442724
-
On the Spread of Viruses on the Internet
-
[6] N. Berger, C. Borgs, J. Chayes, and A. Saberi. “On the Spread of Viruses on the Internet.” In Proceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA’05, pp. 301-310, 2005.
-
(2005)
Proceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA’05,
, pp. 301-310
-
-
Berger, N.1
Borgs, C.2
Chayes, J.3
Saberi, A.4
-
8
-
-
39349087037
-
Epidemic Thresholds in Real Networks
-
[8] D. Chakrabarti, Y. Wang, C. Wang, J. Leskovec, and C. Faloutsos. “Epidemic Thresholds in Real Networks.” ACM Trans. Inf. Syst. Secur. 10:4 (2008), 1-26.
-
(2008)
ACM Trans. Inf. Syst. Secur.
, vol.10
, Issue.4
, pp. 1-26
-
-
Chakrabarti, D.1
Wang, Y.2
Wang, C.3
Leskovec, J.4
Faloutsos, C.5
-
9
-
-
77049093438
-
Contact Processes on Random Graphs with Power Law Degree Distributions Have Critical Value 0
-
[9] S. Chatterjee and R. Durrett. “Contact Processes on Random Graphs with Power Law Degree Distributions Have Critical Value 0.” Ann. Probab. 37:6 (2009), 2332-2356.
-
(2009)
Ann. Probab
, vol.37
, Issue.6
, pp. 2332-2356
-
-
Chatterjee, S.1
Durrett, R.2
-
11
-
-
77952878812
-
. Complex Graphs and Networks, CBMS Regional Conference Series in Mathematics
-
[11] F. Chung and L. Lu. Complex Graphs and Networks, CBMS Regional Conference Series in Mathematics. American Mathematical Society, 2006.
-
(2006)
American Mathematical Society
-
-
Chung, F.1
Lu, L.2
-
14
-
-
0034486891
-
The Mathematics of Infectious Diseases
-
[14] H. Hethcote. “The Mathematics of Infectious Diseases.” SIAM Rev. 42:4 (2000), 599-653.
-
(2000)
SIAM Rev
, vol.42
, Issue.4
, pp. 599-653
-
-
Hethcote, H.1
-
16
-
-
0026156688
-
Directed-Graph Epidemiological Models of Computer Viruses
-
[16] J. Kephart and S. White. “Directed-Graph Epidemiological Models of Computer Viruses.” In IEEE Symposium on Security and Privacy, pp. 343-361, 1991.
-
(1991)
IEEE Symposium on Security and Privacy,
, pp. 343-361
-
-
Kephart, J.1
White, S.2
-
18
-
-
0000998185
-
A Contribution to the Mathematical Theory of Epidemics
-
[18] W. Kermack and A. McKendrick. “A Contribution to the Mathematical Theory of Epidemics.” Proc. of Roy. Soc. Lond. A 115 (1927), 700-721.
-
(1927)
Proc. Of Roy. Soc. Lond. A
, vol.115
, pp. 700-721
-
-
Kermack, W.1
McKendrick, A.2
-
19
-
-
84880943273
-
Mitigative Counterstriking: Self-Defense and Deterrence in Cyberspace
-
[19] J. Kesan and C. Hayes. “Mitigative Counterstriking: Self-Defense and Deterrence in Cyberspace.” Harv. J. L. & Tech. 25:2 (2012), 417-527.
-
(2012)
Harv. J. L. &Amp; Tech.
, vol.25
, Issue.2
, pp. 417-527
-
-
Kesan, J.1
Hayes, C.2
-
21
-
-
70349325889
-
Lifting the Veil on Cyber Offense
-
[21] H. Lin. “Lifting the Veil on Cyber Offense.” IEEE Security & Privacy 7:4 (2009), 15-21.
-
(2009)
IEEE Security &Amp; Privacy
, vol.7
, Issue.4
, pp. 15-21
-
-
Lin, H.1
-
22
-
-
74549172891
-
-
Available online
-
[22] L. Lovasz. “Eigenvalues of Graphs.” Available online (http://www.cs.elte.hu/∼lovasz/ eigenvals-x.pdf), 2007.
-
(2007)
Eigenvalues of Graphs
-
-
Lovasz, L.1
-
25
-
-
84860215339
-
Applications of Mathematics to Medical Problems
-
[25] A. McKendrick. “Applications of Mathematics to Medical Problems.” Proc. of Edin. Math. Society 14 (1926), 98-130.
-
(1926)
Proc. Of Edin. Math. Society
, vol.14
, pp. 98-130
-
-
McKendrick, A.1
-
26
-
-
0042474173
-
Internet Quarantine: Requirements for Containing Self-Propagating Code
-
[26] D. Moore, C. Shannon, G. Voelker, and S. Savage. “Internet Quarantine: Requirements for Containing Self-Propagating Code.” In INFOCOM’03, 2003.
-
(2003)
INFOCOM’03
-
-
Moore, D.1
Shannon, C.2
Voelker, G.3
Savage, S.4
-
30
-
-
81455139102
-
-
Available online, August 19, 2003
-
[30] R. Naraine. “’Friendly’ Welchia Worm Wreaking Havoc.” Available online (http://www.internetnews.com/ent-news/article.php/3065761/Friendly-Welchia-Worm-Wreaking-Havoc. htm), August 19, 2003.
-
’Friendly’ Welchia Worm Wreaking Havoc
-
-
Naraine, R.1
-
32
-
-
0035794256
-
Epidemic Spreading in Scale-Free Networks
-
[32] R. Pastor-Satorras and A. Vespignani. “Epidemic Spreading in Scale-Free Networks.” Phys. Rev. Lett. 86:14 (2001), 3200-3203.
-
(2001)
Phys. Rev. Lett.
, pp. 3200-3203
-
-
Pastor-Satorras, R.1
Vespignani, A.2
-
33
-
-
78651339088
-
Heterogeneous Pair Approximation for Voter Models on Networks
-
[33] E. Pugliese and C. Castellano. “Heterogeneous Pair Approximation for Voter Models on Networks.” Europhysics Letters 88:5 (2009), 58004.
-
(2009)
Europhysics Letters
, vol.88
, Issue.5
, pp. 58004
-
-
Pugliese, E.1
Castellano, C.2
-
34
-
-
84893354825
-
-
Available online, February 19, 2008
-
[34] B. Schneier. “Benevolent worms.” Available online (http://www.schneier.com/blog/archives/ 2008/02/benevolent worm 1.html), February 19, 2008.
-
Benevolent Worms
-
-
Schneier, B.1
-
35
-
-
67349127238
-
Nonlinear Voter Models: The Transition from Invasion to Coexistence
-
[35] F. Schweitzer and L. Behera. “Nonlinear Voter Models: The Transition from Invasion to Coexistence.” European Physical Journal B 67 (2009), 301-318.
-
(2009)
European Physical Journal B
, vol.67
, pp. 301-318
-
-
Schweitzer, F.1
Behera, L.2
-
39
-
-
14944380936
-
The Top Speed of Flash Worms
-
. ACM Press,
-
[39] S. Staniford, D. Moore, V. Paxson, and N. Weaver. “The Top Speed of Flash Worms.” In Proceedings of the 2004 ACM Workshop on Rapid Malcode (WORM’04), pp. 33-42. ACM Press, 2004.
-
(2004)
Proceedings of the 2004 ACM Workshop on Rapid Malcode (WORM’04),
, pp. 33-42
-
-
Staniford, S.1
Moore, D.2
Paxson, V.3
Weaver, N.4
-
41
-
-
54549088710
-
On the Race of Worms, Alerts, and Patches
-
[41] M. Vojnovic and A. Ganesh. “On the Race of Worms, Alerts, and Patches.” IEEE/ACM Trans. Netw. 16 (2008), 1066-1079.
-
(2008)
IEEE/ACM Trans. Netw.
, vol.16
, pp. 1066-1079
-
-
Vojnovic, M.1
Ganesh, A.2
-
42
-
-
27644462218
-
Epidemic Spreading in Real Networks: An Eigenvalue Viewpoint
-
[42] Y. Wang, D. Chakrabarti, C. Wang, and C. Faloutsos. “Epidemic Spreading in Real Networks: An Eigenvalue Viewpoint.” In Proc. of the 22nd IEEE Symposium on Reliable Distributed Systems (SRDS’03), pp. 25-34, 2003.
-
(2003)
Proc. Of the 22Nd IEEE Symposium on Reliable Distributed Systems (SRDS’03),
, pp. 25-34
-
-
Wang, Y.1
Chakrabarti, D.2
Wang, C.3
Faloutsos, C.4
-
45
-
-
84893392443
-
-
Available online, November 7, 2011
-
[45] J. Wolf. “Update 2-U.S. Says Will Boost Its Cyber Arsenal.” Available online (http://www. reuters.com/article/2011/11/07/cyber-usa-offensive-idUSN1E7A61YQ20111107), November 7, 2011.
-
Update 2-U.S. Says Will Boost Its Cyber Arsenal
-
-
Wolf, J.1
|