-
2
-
-
33746689683
-
Inoculation strategies for victims of viruses and the sum-of-squares partition problem
-
Sept
-
J. Aspnes, K. Chang, and A. Yampolskiy. Inoculation strategies for victims of viruses and the sum-of-squares partition problem. Journal of Computer and System Sciences, 72(6):1077-1093, Sept. 2006.
-
(2006)
Journal of Computer and System Sciences
, vol.72
, Issue.6
, pp. 1077-1093
-
-
Aspnes, J.1
Chang, K.2
Yampolskiy, A.3
-
3
-
-
67749140118
-
Scale-free networks: A decade and beyond
-
July
-
A.-L. Barabási. Scale-free networks: A decade and beyond. Science, 325(5939):412-413, July 2009.
-
(2009)
Science
, vol.325
, Issue.5939
, pp. 412-413
-
-
Barabási, A.-L.1
-
4
-
-
0038483826
-
Emergence of scaling in random networks
-
Oct.
-
A.-L. Barabási and R. Albert. Emergence of scaling in random networks. Science, 286(5439):509-512, Oct. 1999.
-
(1999)
Science
, vol.286
, Issue.5439
, pp. 509-512
-
-
Barabási, A.-L.1
Albert, R.2
-
5
-
-
60049087267
-
The monoculture risk put into context
-
Jan.
-
K. Birman and F. Schneider. The monoculture risk put into context. IEEE Security and Privacy, 7(1):14-17, Jan. 2009.
-
(2009)
IEEE Security and Privacy
, vol.7
, Issue.1
, pp. 14-17
-
-
Birman, K.1
Schneider, F.2
-
6
-
-
81755167566
-
Towards insurable network architectures
-
Sept
-
R. Böhme. Towards insurable network architectures. it - Information Technology, 52(5):290-293, Sept. 2010.
-
(2010)
It - Information Technology
, vol.52
, Issue.5
, pp. 290-293
-
-
Böhme, R.1
-
10
-
-
80051749786
-
Correlated failures, diversification, and information security risk management
-
June
-
P.-Y. Chen, G. Kataria, and R. Krishnan. Correlated failures, diversification, and information security risk management. MIS Quarterly, 35(2):397-422, June 2011.
-
(2011)
MIS Quarterly
, vol.35
, Issue.2
, pp. 397-422
-
-
Chen, P.-Y.1
Kataria, G.2
Krishnan, R.3
-
12
-
-
80053638242
-
Practical recommendations on crawling online social networks
-
Oct.
-
M. Gjoka, M. Kurant, C. Butts, and A. Markopoulou. Practical recommendations on crawling online social networks. IEEE Journal on Selected Areas in Communications, 29(9):1872-1892, Oct. 2011.
-
(2011)
IEEE Journal on Selected Areas in Communications
, vol.29
, Issue.9
, pp. 1872-1892
-
-
Gjoka, M.1
Kurant, M.2
Butts, C.3
Markopoulou, A.4
-
13
-
-
0344899914
-
Sharing information on computer systems security: An economic analysis
-
November-December
-
L. Gordon, M. Loeb, and W. Lucyshyn. Sharing information on computer systems security: An economic analysis. Journal of Accounting and Public Policy, 22(6):461-485, November-December 2003.
-
(2003)
Journal of Accounting and Public Policy
, vol.22
, Issue.6
, pp. 461-485
-
-
Gordon, L.1
Loeb, M.2
Lucyshyn, W.3
-
17
-
-
78650721633
-
Uncertainty in interdependent security games
-
B. Johnson, J. Grossklags, N. Christin, and J. Chuang. Uncertainty in interdependent security games. Decision and Game Theory for Security, pages 234-244, 2010.
-
(2010)
Decision and Game Theory for Security
, pp. 234-244
-
-
Johnson, B.1
Grossklags, J.2
Christin, N.3
Chuang, J.4
-
19
-
-
84899006528
-
Algorithms for interdependent security games
-
S. Thrun, L. Saul, and B. Schölkopf, editors. MIT Press
-
M. Kearns and L. Ortiz. Algorithms for interdependent security games. In S. Thrun, L. Saul, and B. Schölkopf, editors, Advances in Neural Information Processing Systems 16, pages 561-568. MIT Press, 2004.
-
(2004)
Advances in Neural Information Processing Systems
, vol.16
, pp. 561-568
-
-
Kearns, M.1
Ortiz, L.2
-
22
-
-
84910012094
-
A survey of interdependent security games
-
Nov.
-
A. Laszka, M. Felegyhazi, and L. Buttyán. A survey of interdependent security games. Technical Report CRYSYS-TR-2012-11-15, CrySyS Lab, Budapest University of Technology and Economics, Nov 2012.
-
(2012)
Technical Report CRYSYS-TR-2012-11-15, CrySyS Lab, Budapest University of Technology and Economics
-
-
Laszka, A.1
Felegyhazi, M.2
Buttyán, L.3
-
24
-
-
84924181828
-
Towards a theory of scale-free graphs: Definition, properties, and implications
-
L. Li, D. Alderson, J. Doyle, and W. Willinger. Towards a theory of scale-free graphs: Definition, properties, and implications. Internet Mathematics, 2(4):431-523, 2005.
-
(2005)
Internet Mathematics
, vol.2
, Issue.4
, pp. 431-523
-
-
Li, L.1
Alderson, D.2
Doyle, J.3
Willinger, W.4
-
25
-
-
42149117427
-
Measurement and analysis of online social networks
-
A. Mislove, M. Marcon, K. Gummadi, P. Druschel, and B. Bhattacharjee. Measurement and analysis of online social networks. In Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, pages 29-42, 2007.
-
(2007)
Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement
, pp. 29-42
-
-
Mislove, A.1
Marcon, M.2
Gummadi, K.3
Druschel, P.4
Bhattacharjee, B.5
-
28
-
-
15444372528
-
Subnets of scale-free networks are not scale-free: Sampling properties of networks
-
M. Stumpf, C. Wiuf, and R. May. Subnets of scale-free networks are not scale-free: Sampling properties of networks. Proceedings of the National Academy of Sciences of the United States of America, 102(12):4221-4224, 2005.
-
(2005)
Proceedings of the National Academy of Sciences of the United States of America
, vol.102
, Issue.12
, pp. 4221-4224
-
-
Stumpf, M.1
Wiuf, C.2
May, R.3
-
29
-
-
33750482906
-
System reliability and free riding
-
J. Camp and S. Lewis, editors. Kluwer Academic Publishers, Dordrecht, The Netherlands
-
H. Varian. System reliability and free riding. In J. Camp and S. Lewis, editors, Economics of Information Security, pages 1-15. Kluwer Academic Publishers, Dordrecht, The Netherlands, 2004.
-
(2004)
Economics of Information Security
, pp. 1-15
-
-
Varian, H.1
|