메뉴 건너뛰기




Volumn 128, Issue , 2009, Pages 175-197

Making telecommunications networks resilient against terrorist attacks

(1) 


Author keywords

Free riding; Game theory; Prisoner's dilemma; Resilient networks; Scale free networks; Survivable networks; Telecommunications; Tipping point

Indexed keywords


EID: 84954565890     PISSN: 08848289     EISSN: None     Source Type: Book Series    
DOI: None     Document Type: Chapter
Times cited : (13)

References (22)
  • 1
    • 0034721164 scopus 로고    scopus 로고
    • Error and attack tolerance of complex networks
    • Albert, R., Jeong, H., and Barabasi, A.-L., 2000, Error and attack tolerance of complex networks. Nature 406:378-382, http://www.nature.com/nature/journal/v406/n6794/full/ 406378a0.html.
    • (2000) Nature , vol.406 , pp. 378-382
    • Albert, R.1    Jeong, H.2    Barabasi, A.-L.3
  • 3
    • 84954512384 scopus 로고    scopus 로고
    • http://citeseer.ist.psu.edu/730763.html.
  • 10
    • 33847109724 scopus 로고    scopus 로고
    • Adversarial deletion in a scale-free random graph process, Combinatorics
    • Flaxman, A. D., Frieze, A. M., and Vera, J., 2007, Adversarial deletion in a scale-free random graph process, Combinatorics, Probability and Computing 16:261-270.
    • (2007) Probability and Computing , vol.16 , pp. 261-270
    • Flaxman, A.D.1    Frieze, A.M.2    Vera, J.3
  • 11
    • 27144491076 scopus 로고    scopus 로고
    • Stability and topology of scale-free networks under attack and defense strategies
    • Gallos, L. K., Cohen, R., Argyrakis, P., Bunde, A., and Havlin, S., 2005, Stability and topology of scale-free networks under attack and defense strategies, Physical Review Letters 94(18):188701.
    • (2005) Physical Review Letters , vol.94 , Issue.18 , pp. 188701
    • Gallos, L.K.1    Cohen, R.2    Argyrakis, P.3    Bunde, A.4    Havlin, S.5
  • 12
    • 41349120887 scopus 로고    scopus 로고
    • Attack vulnerability of complex networks
    • Holme, P., Kim, B. J., Yoon, C. N., and Han, S. K., 2002, Attack vulnerability of complex networks, Physical Review E 65(5 Pt 2):056109, http://arxiv.org/ftp/cond-mat/papers/0202/0202410.pdf.
    • (2002) Physical Review E , vol.65 , Issue.5
    • Holme, P.1    Kim, B.J.2    Yoon, C.N.3    Han, S.K.4
  • 13
    • 0027580496 scopus 로고
    • Bandwidth packing: A tabu search approach
    • Laguna, M., and Glover, F., 1993, Bandwidth packing: A tabu search approach, Management Science 39:492-500.
    • (1993) Management Science , vol.39 , pp. 492-500
    • Laguna, M.1    Glover, F.2
  • 14
    • 0036298367 scopus 로고    scopus 로고
    • Optical network survivability: Protection techniques in the WDM layer
    • Maier, G., Pattavina, A., De Patre, S., and Martinelli, M., 2002, Optical network survivability: protection techniques in the WDM layer, Photonic Network Communications 4(3):251-269, http://citeseer.ist.psu.edu/maier02optical.html.
    • (2002) Photonic Network Communications , vol.4 , Issue.3 , pp. 251-269
    • Maier, G.1    Pattavina, A.2    De Patre, S.3    Martinelli, M.4
  • 15
    • 0000095026 scopus 로고
    • A column generation algorithm for bandwidth packing
    • Parker, M., and Ryan, J., 1994, A column generation algorithm for bandwidth packing, Telecommunications Systems 2:185-196.
    • (1994) Telecommunications Systems , vol.2 , pp. 185-196
    • Parker, M.1    Ryan, J.2
  • 16
    • 3042611526 scopus 로고    scopus 로고
    • A directed cycle-based column-and-cut generation method for capacitated survivable network design
    • Rajan, D., and Atamturk, A., 2004, A directed cycle-based column-and-cut generation method for capacitated survivable network design, Networks 43(4):201-211, http://citeseer.ist.psu.edu/760600.html.
    • (2004) Networks , vol.43 , Issue.4 , pp. 201-211
    • Rajan, D.1    Atamturk, A.2
  • 18
    • 2242427318 scopus 로고    scopus 로고
    • Design and dimensioning of survivable SDH/SONET networks
    • Sanso, B., and Soriano, P., eds., Kluwer Academic Publishers
    • Soriano, P., Wynants, C., Seguin, R., Labbe, M., Gendreau, M., and Fortz, B., 1998, Design and dimensioning of survivable SDH/SONET networks, in Sanso, B., and Soriano, P., eds., Telecommunications Network Planning, Kluwer Academic Publishers, pp. 147-168.
    • (1998) Telecommunications Network Planning , pp. 147-168
    • Soriano, P.1    Wynants, C.2    Seguin, R.3    Labbe, M.4    Gendreau, M.5    Fortz, B.6
  • 21
    • 50249101303 scopus 로고    scopus 로고
    • Vulnerability of complex networks under intentional attack with incomplete information
    • Wu, J., Deng, H. Z., Tan, Y. J., and Zhu, D. Z., 2007, Vulnerability of complex networks under intentional attack with incomplete information, Journal of Physics A 40:2665-2671.
    • (2007) Journal of Physics A , vol.40 , pp. 2665-2671
    • Wu, J.1    Deng, H.Z.2    Tan, Y.J.3    Zhu, D.Z.4
  • 22
    • 42749106697 scopus 로고    scopus 로고
    • Attack vulnerability of scale-free networks due to cascading breakdown
    • Zhao, L., Park, K., and Lai, Y.-C., 2004, Attack vulnerability of scale-free networks due to cascading breakdown, Physical Review E 70:035101.
    • (2004) Physical Review E , vol.70 , pp. 035101
    • Zhao, L.1    Park, K.2    Lai, Y.-C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.