-
1
-
-
84906997104
-
Firm is accused of sending spam, and fight jams Internet
-
March
-
Markoff, J., Perlroth, N.: Firm is accused of sending spam, and fight jams Internet. The New York Times, 26 March 2013
-
(2013)
The New York Times
, pp. 26
-
-
Markoff, J.1
Perlroth, N.2
-
3
-
-
84939614161
-
The complexity of estimating systematic risk in networks
-
Johnson, B., Laszka, A., Grossklags, J.: The complexity of estimating systematic risk in networks. In: Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF), pp. 325–336 (2014)
-
(2014)
Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF)
, pp. 325-336
-
-
Johnson, B.1
Laszka, A.2
Grossklags, J.3
-
4
-
-
84907442807
-
A survey of interdependent information security games
-
Laszka, A., Felegyhazi, M., Buttyエan, L.: A survey of interdependent information security games. ACM Comput. Surv. 47(2), 23:1–23:38 (2014)
-
(2014)
ACM Comput. Surv
, vol.47
, Issue.2
, pp. 23:1-23:38
-
-
Laszka, A.1
Felegyhazi, M.2
Buttyan, L.3
-
5
-
-
33750482906
-
System reliability and free riding
-
Camp, L., Lewis, S. (eds.), Kluwer Academic, Dordrecht
-
Varian, H.: System reliability and free riding. In: Camp, L., Lewis, S. (eds.) Economics of Information Security. Advances in Information Security, vol. 12, pp. 1–15. Kluwer Academic, Dordrecht (2004)
-
(2004)
Economics of Information Security. Advances in Information Security
, vol.12
, pp. 1-15
-
-
Varian, H.1
-
6
-
-
57349198694
-
Secure or insure? A game-theoretic analysis of information security games
-
Grossklags, J., Christin, N., Chuang, J.: Secure or insure? A game-theoretic analysis of information security games. In: Proceedings of the 17th International World Wide Web Conference (WWW), pp. 209–218 (2008)
-
(2008)
Proceedings of the 17th International World Wide Web Conference (WWW)
, pp. 209-218
-
-
Grossklags, J.1
Christin, N.2
Chuang, J.3
-
7
-
-
70350389209
-
Blue versus red: Towards a model of distributed security attacks
-
Dingledine, R., Golle, P. (eds.), Springer, Heidelberg
-
Fultz, N., Grossklags, J.: Blue versus red: Towards a model of distributed security attacks. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 167–183. Springer, Heidelberg (2009)
-
(2009)
FC 2009. LNCS
, vol.5628
, pp. 167-183
-
-
Fultz, N.1
Grossklags, J.2
-
8
-
-
77955321664
-
When information improves information security
-
Sion, R. (ed.), Springer, Heidelberg
-
Grossklags, J., Johnson, B., Christin, N.: When information improves information security. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 416–423. Springer, Heidelberg (2010)
-
(2010)
FC 2010. LNCS
, vol.6052
, pp. 416-423
-
-
Grossklags, J.1
Johnson, B.2
Christin, N.3
-
9
-
-
81755188455
-
Security games with market insurance
-
Baras, J.S., Katz, J., Altman, E. (eds.), Springer, Heidelberg
-
Johnson, B., Bィohme, R., Grossklags, J.: Security games with market insurance. In: Baras, J.S., Katz, J., Altman, E. (eds.) GameSec 2011. LNCS, vol. 7037, pp. 117–130. Springer, Heidelberg (2011)
-
(2011)
GameSec 2011. LNCS
, vol.7037
, pp. 117-130
-
-
Johnson, B.1
Bohme, R.2
Grossklags, J.3
-
10
-
-
33746689683
-
Inoculation strategies for victims of viruses and the sum-of-squares partition problem
-
Aspnes, J., Chang, K., Yampolskiy, A.: Inoculation strategies for victims of viruses and the sum-of-squares partition problem. J. Comput. Syst. Sci. 72(6), 1077–1093 (2006)
-
(2006)
J. Comput. Syst. Sci
, vol.72
, Issue.6
, pp. 1077-1093
-
-
Aspnes, J.1
Chang, K.2
Yampolskiy, A.3
-
11
-
-
33748677680
-
When selfish meets evil: Byzantine players in a virus inoculation game
-
Moscibroda, T., Schmid, S., Wattenhofer, R.: When selfish meets evil: Byzantine players in a virus inoculation game. In: Proceedings of the Twenty-Fifth Annual ACM Symposium on Principles of Distributed Computing, pp. 35–44 (2006)
-
(2006)
Proceedings of the Twenty-Fifth Annual ACM Symposium on Principles of Distributed Computing
, pp. 35-44
-
-
Moscibroda, T.1
Schmid, S.2
Wattenhofer, R.3
-
13
-
-
0035794256
-
Epidemic spreading in scale-free networks. Phys
-
Pastor-Satorras, R., Vespignani, A.: Epidemic spreading in scale-free networks. Phys. Rev. Lett. 86(14), 3200–3203 (2001)
-
(2001)
Rev. Lett
, vol.86
, Issue.14
, pp. 3200-3203
-
-
Pastor-Satorras, R.1
Vespignani, A.2
-
14
-
-
4043049130
-
Epidemic threshold in structured scale-free networks
-
Article No. 108701
-
Eguエıluz, V., Klemm, K.: Epidemic threshold in structured scale-free networks. Phys. Rev. Lett. 89(10), Article No. 108701 (2002)
-
(2002)
Phys. Rev. Lett
, vol.89
, Issue.10
-
-
Eguıluz, V.1
Klemm, K.2
-
15
-
-
41349112686
-
Epidemic dynamics in finite size scale-free networks
-
Article No. 035108(R)
-
Pastor-Satorras, R., Vespignani, A.: Epidemic dynamics in finite size scale-free networks. Phys. Rev. E 65(3), Article No. 035108(R) (2002)
-
(2002)
Phys. Rev. E
, vol.65
, Issue.3
-
-
Pastor-Satorras, R.1
Vespignani, A.2
-
16
-
-
0037786763
-
Interdependent security
-
Kunreuther, H., Heal, G.: Interdependent security. J. Risk Uncertain. 26(2), 231–249 (2003)
-
(2003)
J. Risk Uncertain
, vol.26
, Issue.2
, pp. 231-249
-
-
Kunreuther, H.1
Heal, G.2
-
18
-
-
84899006528
-
Algorithms for interdependent security games
-
Thrun, S., Saul, L., Schィolkopf, B. (eds.), MIT Press, Cambridge
-
Kearns, M., Ortiz, L.: Algorithms for interdependent security games. In: Thrun, S., Saul, L., Schィolkopf, B. (eds.) Advances in Neural Information Processing Systems, vol. 16, pp. 561–568. MIT Press, Cambridge (2004)
-
(2004)
Advances in Neural Information Processing Systems
, vol.16
, pp. 561-568
-
-
Kearns, M.1
Ortiz, L.2
-
19
-
-
78650721633
-
Uncertainty in interdependent security games
-
Alpcan, T., Buttyエan, L., Baras, J.S. (eds.), Springer, Heidelberg
-
Johnson, B., Grossklags, J., Christin, N., Chuang, J.: Uncertainty in interdependent security games. In: Alpcan, T., Buttyエan, L., Baras, J.S. (eds.) GameSec 2010. LNCS, vol. 6442, pp. 234–244. Springer, Heidelberg (2010)
-
(2010)
GameSec 2010. LNCS
, vol.6442
, pp. 234-244
-
-
Johnson, B.1
Grossklags, J.2
Christin, N.3
Chuang, J.4
-
20
-
-
84886075365
-
Interdependent defense games: Modeling interdependent security under deliberate attacks
-
Catalina Island, CA,, August
-
Chan, H., Ceyko, M., Ortiz, L.: Interdependent defense games: Modeling interdependent security under deliberate attacks. In: Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence (UAI), Catalina Island, CA, pp. 152–162, August 2012
-
(2012)
Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence (UAI)
, pp. 152-162
-
-
Chan, H.1
Ceyko, M.2
Ortiz, L.3
-
22
-
-
67749140118
-
Scale-free networks: A decade and beyond
-
Barabエasi, A.L.: Scale-free networks: A decade and beyond. Science 325(5939), 412–413 (2009)
-
(2009)
Science
, vol.325
, Issue.5939
, pp. 412-413
-
-
Barabasi, A.L.1
-
23
-
-
0038483826
-
Emergence of scaling in random networks
-
Barabエasi, A.L., Albert, R.: Emergence of scaling in random networks. Science 286(5439), 509–512 (1999)
-
(1999)
Science
, vol.286
, Issue.5439
, pp. 509-512
-
-
Barabasi, A.L.1
Albert, R.2
-
24
-
-
84924181828
-
Towards a theory of scale-free graphs: Definition, properties, and implications
-
Li, L., Alderson, D., Doyle, J.C., Willinger, W.: Towards a theory of scale-free graphs: Definition, properties, and implications. Internet Math. 2(4), 431–523 (2005)
-
(2005)
Internet Math
, vol.2
, Issue.4
, pp. 431-523
-
-
Li, L.1
Alderson, D.2
Doyle, J.C.3
Willinger, W.4
-
25
-
-
15444372528
-
Subnets of scale-free networks are not scale-free: Sampling properties of networks
-
Stumpf, M., Wiuf, C., May, R.: Subnets of scale-free networks are not scale-free: Sampling properties of networks. Proc. Natl. Acad. Sci. USA 102(12), 4221–4224 (2005)
-
(2005)
Proc. Natl. Acad. Sci. USA
, vol.102
, Issue.12
, pp. 4221-4224
-
-
Stumpf, M.1
Wiuf, C.2
May, R.3
-
27
-
-
81755167566
-
Towards insurable network architectures. IT - Inf
-
Bィohme, R.: Towards insurable network architectures. IT - Inf. Technol. 52(5), 290–293 (2010)
-
(2010)
Technol
, vol.52
, Issue.5
, pp. 290-293
-
-
Bohme, R.1
-
28
-
-
60049087267
-
The monoculture risk put into context
-
Birman, K., Schneider, F.: The monoculture risk put into context. IEEE Secur. Priv. 7(1), 14–17 (2009)
-
(2009)
IEEE Secur. Priv
, vol.7
, Issue.1
, pp. 14-17
-
-
Birman, K.1
Schneider, F.2
-
29
-
-
14844282642
-
Cyberinsecurity: The cost of monopoly. How the dominance of Microsoft’s products poses a risk to society
-
Washington, DC
-
Geer, D., Pfleeger, C., Schneier, B., Quarterman, J., Metzger, P., Bace, R., Gutmann, P.: Cyberinsecurity: The cost of monopoly. How the dominance of Microsoft’s products poses a risk to society. Computer & Communications Industry Association, Washington, DC (2003)
-
(2003)
Computer & Communications Industry Association
-
-
Geer, D.1
Pfleeger, C.2
Schneier, B.3
Quarterman, J.4
Metzger, P.5
Bace, R.6
Gutmann, P.7
-
31
-
-
80051749786
-
Correlated failures, diversification, and information security risk management
-
Chen, P.Y., Kataria, G., Krishnan, R.: Correlated failures, diversification, and information security risk management. MIS Q. 35(2), 397–422 (2011)
-
(2011)
MIS Q
, vol.35
, Issue.2
, pp. 397-422
-
-
Chen, P.Y.1
Kataria, G.2
Krishnan, R.3
-
32
-
-
85069343044
-
-
Springer, Heidelberg
-
ˇCエıˇzek, P., Hィardle, W., Weron, R.: Statistical Tools for Finance and Insurance. Springer, Heidelberg (2005)
-
(2005)
Statistical Tools for Finance and Insurance
-
-
ˇcıˇzek, P.1
Hardle, W.2
Weron, R.3
-
33
-
-
78049282538
-
Premium calculation and insurance pricing
-
Melnick, E.L., Everitt, B.S. (eds.), Wiley, Chichester
-
Laeven, R., Goovaerts, M.: Premium calculation and insurance pricing. In: Melnick, E.L., Everitt, B.S. (eds.) Encyclopedia of Quantitative Risk Analysis and Assessment. Wiley, Chichester (2008)
-
(2008)
Encyclopedia of Quantitative Risk Analysis and Assessment
-
-
Laeven, R.1
Goovaerts, M.2
-
34
-
-
84980092818
-
Capital asset prices: A theory of market equilibrium under conditions of risk
-
Sharpe, W.: Capital asset prices: A theory of market equilibrium under conditions of risk. J. Finance 19(3), 425–442 (1964)
-
(1964)
J. Finance
, vol.19
, Issue.3
, pp. 425-442
-
-
Sharpe, W.1
-
35
-
-
84950308062
-
-
The Cooperative Association for Internet Data Analysis (CAIDA): AS rank and AS relationship datasets
-
The Cooperative Association for Internet Data Analysis (CAIDA): AS rank and AS relationship datasets. http://as-rank.caida.org/, http://www.caida.org/data/active/as-relationships/index.xml
-
-
-
-
36
-
-
77953303843
-
Walking in Facebook: A case study of unbiased sampling of OSNs
-
Gjoka, M., Kurant, M., Butts, C., Markopoulou, A.: Walking in Facebook: A case study of unbiased sampling of OSNs. In: Proceedings of the 29th IEEE Conference on Computer Communications (INFOCOM) (2010)
-
(2010)
Proceedings of the 29th IEEE Conference on Computer Communications (INFOCOM)
-
-
Gjoka, M.1
Kurant, M.2
Butts, C.3
Markopoulou, A.4
-
37
-
-
80053638242
-
Practical recommendations on crawling online social networks
-
Gjoka, M., Kurant, M., Butts, C., Markopoulou, A.: Practical recommendations on crawling online social networks. IEEE J. Sel. Areas Commun. 29(9), 1872–1892 (2011)
-
(2011)
IEEE J. Sel. Areas Commun
, vol.29
, Issue.9
, pp. 1872-1892
-
-
Gjoka, M.1
Kurant, M.2
Butts, C.3
Markopoulou, A.4
-
38
-
-
84984863583
-
How many down? Toward understanding systematic risk in networks
-
Johnson, B., Laszka, A., Grossklags, J.: How many down? Toward understanding systematic risk in networks. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS), pp. 495–500 (2014)
-
(2014)
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS)
, pp. 495-500
-
-
Johnson, B.1
Laszka, A.2
Grossklags, J.3
|