-
1
-
-
84863745739
-
Why rumors spread so quickly in social networks
-
Jun.
-
B. Doerr, M. Fouz, and T. Friedrich, "Why rumors spread so quickly in social networks," Commun. ACM, vol. 55, no. 6, pp. 70-75, Jun. 2012.
-
(2012)
Commun. ACM
, vol.55
, Issue.6
, pp. 70-75
-
-
Doerr, B.1
Fouz, M.2
Friedrich, T.3
-
2
-
-
84901195399
-
Modeling the propagation of worms in networks: A survey
-
2nd Quart.
-
Y. Wang, S. Wen, Y. Xiang, and W. Zhou, "Modeling the propagation of worms in networks: A survey," IEEE Commun. Surveys Tuts., vol. 16, no. 2, pp. 942-960, 2nd Quart., 2013.
-
(2013)
IEEE Commun. Surveys Tuts.
, vol.16
, Issue.2
, pp. 942-960
-
-
Wang, Y.1
Wen, S.2
Xiang, Y.3
Zhou, W.4
-
3
-
-
84873743210
-
A survey on smart grid communication infrastructures: Motivations, requirements and challenges
-
1st Quart.
-
Y. Yan, Y. Qian, H. Sharif, and D. Tipper, "A survey on smart grid communication infrastructures: Motivations, requirements and challenges," IEEE Commun. Surveys Tuts., vol. 15, no. 1, pp. 5-20, 1st Quart., 2013.
-
(2013)
IEEE Commun. Surveys Tuts.
, vol.15
, Issue.1
, pp. 5-20
-
-
Yan, Y.1
Qian, Y.2
Sharif, H.3
Tipper, D.4
-
4
-
-
77954795581
-
-
San Francisco, CA, USA: Comput. Security Inst.
-
R. Richardson and C. Director, CSI Computer Crime and Security Survey, vol. 1. San Francisco, CA, USA: Comput. Security Inst., 2008, pp. 1-30.
-
(2008)
CSI Computer Crime and Security Survey
, vol.1
, pp. 1-30
-
-
Richardson, R.1
Director, C.2
-
5
-
-
0033650584
-
Practical network support for IP traceback
-
S. Savage, D. Wetherall, A. Karlin, and T. E. Anderson, "Practical network support for IP traceback," ACM SIGCOMM Comput. Commun. Rev., vol. 30, no. 4, pp. 295-306, 2000.
-
(2000)
ACM SIGCOMM Comput. Commun. Rev.
, vol.30
, Issue.4
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.E.4
-
6
-
-
27544467640
-
Toward a framework for Internet forensic analysis
-
San Diego, CA, USA
-
V. Sekar, Y. Xie, D. A. Maltz, M. K. Reiter, and H. Zhang, "Toward a framework for Internet forensic analysis," in Proc. ACM HotNets-III, San Diego, CA, USA, 2004.
-
(2004)
Proc. ACM HotNets-III
-
-
Sekar, V.1
Xie, Y.2
Maltz, D.A.3
Reiter, M.K.4
Zhang, H.5
-
7
-
-
27544495684
-
Worm origin identification using random moonwalks
-
Oakland, CA, USA
-
Y. Xie, V. Sekar, D. A. Maltz, M. K. Reiter, and H. Zhang, "Worm origin identification using random moonwalks," in Proc. IEEE Symp. Security Privacy, Oakland, CA, USA, 2005, pp. 242-256.
-
(2005)
Proc. IEEE Symp. Security Privacy
, pp. 242-256
-
-
Xie, Y.1
Sekar, V.2
Maltz, D.A.3
Reiter, M.K.4
Zhang, H.5
-
8
-
-
77956207032
-
Finding effectors in social networks
-
Washington, DC, USA
-
T. Lappas, E. Terzi, D. Gunopulos, and H. Mannila, "Finding effectors in social networks," in Proc. 16th ACM SIGKDD Int. Conf. Knowl. Disc. Data Min., Washington, DC, USA, 2010, pp. 1059-1068.
-
(2010)
Proc. 16th ACM SIGKDD Int. Conf. Knowl. Disc. Data Min.
, pp. 1059-1068
-
-
Lappas, T.1
Terzi, E.2
Gunopulos, D.3
Mannila, H.4
-
9
-
-
84901393183
-
Detecting multiple information sources in networks under the SIR model
-
Princeton, NJ, USA
-
Z. Chen, K. Zhu, and L. Ying, "Detecting multiple information sources in networks under the SIR model," in Proc. 48th Annu. Conf. Inf. Sci. Syst. (CISS), Princeton, NJ, USA, 2014, pp. 1-4.
-
(2014)
Proc. 48th Annu. Conf. Inf. Sci. Syst. (CISS)
, pp. 1-4
-
-
Chen, Z.1
Zhu, K.2
Ying, L.3
-
10
-
-
84864659856
-
Rumor centrality: A universal source detector
-
Jun.
-
D. Shah and T. Zaman, "Rumor centrality: A universal source detector," SIGMETRICS Perform. Eval. Rev., vol. 40, no. 1, pp. 199-210, Jun. 2012.
-
(2012)
SIGMETRICS Perform. Eval. Rev.
, vol.40
, Issue.1
, pp. 199-210
-
-
Shah, D.1
Zaman, T.2
-
11
-
-
84890424404
-
Rumor source detection under probabilistic sampling
-
Istanbul, Turkey
-
N. Karamchandani and M. Franceschetti, "Rumor source detection under probabilistic sampling," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Istanbul, Turkey, 2013, pp. 2184-2188.
-
(2013)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 2184-2188
-
-
Karamchandani, N.1
Franceschetti, M.2
-
12
-
-
84877888089
-
Identifying infection sources and regions in large networks
-
Jun.
-
W. Luo, W. P. Tay, and M. Leng, "Identifying infection sources and regions in large networks," IEEE Trans. Signal Process., vol. 61, no. 11, pp. 2850-2865, Jun. 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.11
, pp. 2850-2865
-
-
Luo, W.1
Tay, W.P.2
Leng, M.3
-
13
-
-
84874339922
-
Sources of misinformation in online social networks: Who to suspect?
-
Orlando, FL, USA
-
D. T. Nguyen, N. P. Nguyen, and M. T. Thai, "Sources of misinformation in online social networks: Who to suspect?" in Proc. IEEE Milit. Commun. Conf. (MILCOM), Orlando, FL, USA, 2012, pp. 1-6.
-
(2012)
Proc. IEEE Milit. Commun. Conf. (MILCOM)
, pp. 1-6
-
-
Nguyen, D.T.1
Nguyen, N.P.2
Thai, M.T.3
-
14
-
-
84911432372
-
Information source detection in the sir model: A sample-path-based approach
-
Feb.
-
K. Zhu and L. Ying, "Information source detection in the sir model: A sample-path-based approach," IEEE/ACM Trans. Netw., vol. 24, no. 1, pp. 408-421, Feb. 2016.
-
(2016)
IEEE/ACM Trans. Netw.
, vol.24
, Issue.1
, pp. 408-421
-
-
Zhu, K.1
Ying, L.2
-
15
-
-
84904661062
-
How to identify an infection source with limited observations
-
Aug.
-
W. Luo, W. P. Tay, and M. Leng, "How to identify an infection source with limited observations," IEEE J. Sel. Topics Signal Process., vol. 8, no. 4, pp. 586-597, Aug. 2014.
-
(2014)
IEEE J. Sel. Topics Signal Process.
, vol.8
, Issue.4
, pp. 586-597
-
-
Luo, W.1
Tay, W.P.2
Leng, M.3
-
16
-
-
84867928438
-
Identifying infection sources in large tree networks
-
Seoul, South Korea
-
W. Luo and W. P. Tay, "Identifying infection sources in large tree networks," in Proc. 9th Annu. IEEE Commun. Soc. Conf. Sensor Mesh Ad Hoc Commun. Netw. (SECON), Seoul, South Korea, 2012, pp. 281-289.
-
(2012)
Proc. 9th Annu. IEEE Commun. Soc. Conf. Sensor Mesh Ad Hoc Commun. Netw. (SECON)
, pp. 281-289
-
-
Luo, W.1
Tay, W.P.2
-
17
-
-
84914163557
-
Predicting the sources of an outbreak with a spectral technique
-
V. Fioriti, M. Chinnici, and J. Palomo, "Predicting the sources of an outbreak with a spectral technique," Appl. Math. Sci., vol. 8, no. 135, pp. 6775-6782, 2014.
-
(2014)
Appl. Math. Sci.
, vol.8
, Issue.135
, pp. 6775-6782
-
-
Fioriti, V.1
Chinnici, M.2
Palomo, J.3
-
18
-
-
84874077870
-
Spotting culprits in epidemics: How many and which ones?
-
Brussels, Belgium
-
B. A. Prakash, J. Vreeken, and C. Faloutsos, "Spotting culprits in epidemics: How many and which ones?" in Proc. IEEE 12th Int. Conf. Data Min. (ICDM), Brussels, Belgium, 2012, pp. 11-20.
-
(2012)
Proc. IEEE 12th Int. Conf. Data Min. (ICDM)
, pp. 11-20
-
-
Prakash, B.A.1
Vreeken, J.2
Faloutsos, C.3
-
19
-
-
84876274461
-
Identifying multiple infection sources in a network
-
Pacific Grove, CA, USA
-
W. Luo and W.-P. Tay, "Identifying multiple infection sources in a network," in Proc. Conf. Rec. 46th Asilomar Conf. Signals Syst. Comput. (ASILOMAR), Pacific Grove, CA, USA, 2012, pp. 1483-1489.
-
(2012)
Proc. Conf. Rec. 46th Asilomar Conf. Signals Syst. Comput. (ASILOMAR)
, pp. 1483-1489
-
-
Luo, W.1
Tay, W.-P.2
-
20
-
-
84888996841
-
A fast Monte Carlo algorithm for source localization on graphs
-
San Diego, CA, USA
-
A. Agaskar and Y. M. Lu, "A fast Monte Carlo algorithm for source localization on graphs," in Proc. SPIE Opt. Eng. Appl., San Diego, CA, USA, 2013, Art. no. 88581N.
-
(2013)
Proc. SPIE Opt. Eng. Appl.
-
-
Agaskar, A.1
Lu, Y.M.2
-
21
-
-
84864870003
-
Locating the source of diffusion in large-scale networks
-
Aug.
-
P. C. Pinto, P. Thiran, and M. Vetterli, "Locating the source of diffusion in large-scale networks," Phys. Rev. Lett., vol. 109, no. 6, Aug. 2012, Art. no. 068702.
-
(2012)
Phys. Rev. Lett.
, vol.109
, Issue.6
-
-
Pinto, P.C.1
Thiran, P.2
Vetterli, M.3
-
22
-
-
84874807257
-
Identifying rumors and their sources in social networks
-
Baltimore, MD, USA
-
E. Seo, P. Mohapatra, and T. Abdelzaher, "Identifying rumors and their sources in social networks," in Proc. SPIE Defense Security Sens., Baltimore, MD, USA, 2012.
-
(2012)
Proc. SPIE Defense Security Sens.
-
-
Seo, E.1
Mohapatra, P.2
Abdelzaher, T.3
-
23
-
-
84946067589
-
A robust information source estimator with sparse observations
-
K. Zhu and L. Ying, "A robust information source estimator with sparse observations," Comput. Soc. Netw., vol. 1, no. 1, p. 1, 2014.
-
(2014)
Comput. Soc. Netw.
, vol.1
, Issue.1
, pp. 1
-
-
Zhu, K.1
Ying, L.2
-
24
-
-
78649316131
-
Modeling and analyzing of botnet interactions
-
L.-P. Song, Z. Jin, and G.-Q. Sun, "Modeling and analyzing of botnet interactions," Phys. A Stat. Mech. Appl., vol. 390, no. 2, pp. 347-358, 2011.
-
(2011)
Phys. A Stat. Mech. Appl.
, vol.390
, Issue.2
, pp. 347-358
-
-
Song, L.-P.1
Jin, Z.2
Sun, G.-Q.3
-
25
-
-
34547593039
-
Research of a potential worm propagation model based on pure P2P principle
-
Guilin, China
-
Y. Yao, X. Luo, F. Gao, and S. Ai, "Research of a potential worm propagation model based on pure P2P principle," in Proc. Int. Conf. Commun. Technol. (ICCT), Guilin, China, 2006, pp. 1-4.
-
(2006)
Proc. Int. Conf. Commun. Technol. (ICCT)
, pp. 1-4
-
-
Yao, Y.1
Luo, X.2
Gao, F.3
Ai, S.4
-
26
-
-
0034486891
-
The mathematics of infectious diseases
-
H. W. Hethcote, "The mathematics of infectious diseases," SIAM Rev., vol. 42, no. 4, pp. 599-653, 2000.
-
(2000)
SIAM Rev.
, vol.42
, Issue.4
, pp. 599-653
-
-
Hethcote, H.W.1
-
27
-
-
0030318519
-
Analysis of an SEIRS epidemic model with two delays
-
K. L. Cooke and P. van den Driessche, "Analysis of an SEIRS epidemic model with two delays," J. Math. Biol., vol. 35, no. 2, pp. 240-260, 1996.
-
(1996)
J. Math. Biol.
, vol.35
, Issue.2
, pp. 240-260
-
-
Cooke, K.L.1
Van Den Driessche, P.2
-
28
-
-
73449125776
-
Propagation of active worms: A survey
-
Y. Xiang, X. Fan, and W. T. Zhu, "Propagation of active worms: A survey," Int. J. Comput. Syst. Sci. Eng., vol. 24, no. 3, pp. 157-172, 2009.
-
(2009)
Int. J. Comput. Syst. Sci. Eng.
, vol.24
, Issue.3
, pp. 157-172
-
-
Xiang, Y.1
Fan, X.2
Zhu, W.T.3
-
29
-
-
0034721164
-
Error and attack tolerance of complex networks
-
Jul.
-
R. Albert, H. Jeong, and A.-L. Barabási, "Error and attack tolerance of complex networks," Nature, vol. 406, no. 6794, pp. 378-382, Jul. 2000.
-
(2000)
Nature
, vol.406
, Issue.6794
, pp. 378-382
-
-
Albert, R.1
Jeong, H.2
Barabási, A.-L.3
-
30
-
-
0033204106
-
On power-law relationships of the Internet topology
-
Cambridge, MA, USA
-
M. Faloutsos, P. Faloutsos, and C. Faloutsos, "On power-law relationships of the Internet topology," in Proc. Conf. Appl. Technol. Architect. Protocols Comput. Commun. (SIGCOMM), Cambridge, MA, USA, 1999, pp. 251-262.
-
(1999)
Proc. Conf. Appl. Technol. Architect. Protocols Comput. Commun. (SIGCOMM)
, pp. 251-262
-
-
Faloutsos, M.1
Faloutsos, P.2
Faloutsos, C.3
-
31
-
-
85027286362
-
Epidemics on networks
-
Oxford, U.K.: Oxford Univ. Press, ch. 17
-
M. E. J. Newman, "Epidemics on networks," in Networks: An Introduction. Oxford, U.K.: Oxford Univ. Press, 2010, ch. 17, pp. 700-750.
-
(2010)
Networks: An Introduction.
, pp. 700-750
-
-
Newman, M.E.J.1
-
32
-
-
33750177351
-
Centrality in social networks conceptual clarification
-
L. C. Freeman, "Centrality in social networks conceptual clarification," Soc. Netw., vol. 1, no. 3, pp. 215-239, 1978.
-
(1978)
Soc. Netw.
, vol.1
, Issue.3
, pp. 215-239
-
-
Freeman, L.C.1
-
33
-
-
41349120887
-
Attack vulnerability of complex networks
-
P. Holme, B. J. Kim, C. N. Yoon, and S. K. Han, "Attack vulnerability of complex networks," Phys. Rev. E, vol. 65, no. 5, 2002, Art. no. 056109.
-
(2002)
Phys. Rev. E
, vol.65
, Issue.5
-
-
Holme, P.1
Kim, B.J.2
Yoon, C.N.3
Han, S.K.4
-
34
-
-
79955879494
-
Controllability of complex networks
-
Y.-Y. Liu, J.-J. Slotine, and A.-L. Barabási, "Controllability of complex networks," Nature, vol. 473, no. 7346, pp. 167-173, 2011.
-
(2011)
Nature
, vol.473
, Issue.7346
, pp. 167-173
-
-
Liu, Y.-Y.1
Slotine, J.-J.2
Barabási, A.-L.3
-
35
-
-
77954890040
-
Detecting sources of computer viruses in networks: Theory and experiment
-
New York, NY, USA, Dec.
-
D. Shah and T. Zaman, "Detecting sources of computer viruses in networks: Theory and experiment," in Proc. ACM SIGMETRICS Int. Conf. Measur. Model. Comput. Syst. (SIGMETRICS), New York, NY, USA, Dec. 2010, pp. 203-214.
-
(2010)
Proc. ACM SIGMETRICS Int. Conf. Measur. Model. Comput. Syst. (SIGMETRICS)
, pp. 203-214
-
-
Shah, D.1
Zaman, T.2
-
36
-
-
0007265820
-
Eccentricity and centrality in networks
-
P. Hage and F. Harary, "Eccentricity and centrality in networks," Soc. Netw., vol. 17, no. 1, pp. 57-63, 1995.
-
(1995)
Soc. Netw.
, vol.17
, Issue.1
, pp. 57-63
-
-
Hage, P.1
Harary, F.2
-
37
-
-
84858808016
-
Centrality in social networks: Theoretical and simulation approaches
-
Melbourne, VIC, Australia
-
A. H. Dekker, "Centrality in social networks: Theoretical and simulation approaches," in Proc. SimTecT, Melbourne, VIC, Australia, 2008, pp. 12-15.
-
(2008)
Proc. SimTecT
, pp. 12-15
-
-
Dekker, A.H.1
-
38
-
-
22444454497
-
A linear-time algorithm to find four independent spanning trees in four-connected planar graphs
-
K. Miura, D. Takahashi, S. Nakano, and T. Nishizeki, "A linear-time algorithm to find four independent spanning trees in four-connected planar graphs," in Proc. 24th Workshop Graph Theor. Concepts Comput. Sci., 1998, pp. 310-323.
-
(1998)
Proc. 24th Workshop Graph Theor. Concepts Comput. Sci.
, pp. 310-323
-
-
Miura, K.1
Takahashi, D.2
Nakano, S.3
Nishizeki, T.4
-
39
-
-
84936824655
-
Power and centrality: A family of measures
-
P. Bonacich, "Power and centrality: A family of measures," Amer. J. Sociol., vol. 92, no. 5, pp. 1170-1182, 1987.
-
(1987)
Amer. J. Sociol.
, vol.92
, Issue.5
, pp. 1170-1182
-
-
Bonacich, P.1
-
40
-
-
47849108625
-
The mathematics of networks
-
Basingstoke, U.K.: Palgrave Macmillan
-
M. E. Newman, "The mathematics of networks," in The New Palgrave Encyclopedia of Economics, vol. 2. Basingstoke, U.K.: Palgrave Macmillan, 2008, pp. 1-12.
-
(2008)
The New Palgrave Encyclopedia of Economics
, vol.2
, pp. 1-12
-
-
Newman, M.E.1
-
41
-
-
79961005336
-
Rumors in a network: Who's the culprit?
-
Aug.
-
D. Shah and T. Zaman, "Rumors in a network: Who's the culprit?" IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 5163-5181, Aug. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.8
, pp. 5163-5181
-
-
Shah, D.1
Zaman, T.2
-
42
-
-
84904299069
-
Rumor source detection with multiple observations: Fundamental limits and algorithms
-
Austin, TX, USA
-
Z. Wang, W. Dong, W. Zhang, and C. W. Tan, "Rumor source detection with multiple observations: Fundamental limits and algorithms," in Proc. ACM Int. Conf. Measur. Model. Comput. Syst. (SIGMETRICS), Austin, TX, USA, 2014, pp. 1-13.
-
(2014)
Proc. ACM Int. Conf. Measur. Model. Comput. Syst. (SIGMETRICS)
, pp. 1-13
-
-
Wang, Z.1
Dong, W.2
Zhang, W.3
Tan, C.W.4
-
43
-
-
84890365660
-
Rooting out the rumor culprit from suspects
-
Istanbul, Turkey
-
W. Dong, W. Zhang, and C. W. Tan, "Rooting out the rumor culprit from suspects," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Istanbul, Turkey, 2013, pp. 2671-2675.
-
(2013)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 2671-2675
-
-
Dong, W.1
Zhang, W.2
Tan, C.W.3
-
44
-
-
0026923819
-
The Voronoi partition of a network and its implications in location theory
-
S. L. Hakimi, M. L. Labbé, and E. Schmeichel, "The Voronoi partition of a network and its implications in location theory," ORSA J. Comput., vol. 4, no. 4, pp. 412-417, 1992.
-
(1992)
ORSA J. Comput.
, vol.4
, Issue.4
, pp. 412-417
-
-
Hakimi, S.L.1
Labbé, M.L.2
Schmeichel, E.3
-
45
-
-
84902778846
-
Discovering multiple diffusion source nodes in social networks
-
Dec.
-
W. Zang, P. Zhang, C. Zhou, and L. Guo, "Discovering multiple diffusion source nodes in social networks," Proc. Comput. Sci., vol. 29, pp. 443-452, Dec. 2014.
-
(2014)
Proc. Comput. Sci.
, vol.29
, pp. 443-452
-
-
Zang, W.1
Zhang, P.2
Zhou, C.3
Guo, L.4
-
46
-
-
84892434861
-
Efficiently spotting the starting points of an epidemic in a large graph
-
B. A. Prakash, J. Vreeken, and C. Faloutsos, "Efficiently spotting the starting points of an epidemic in a large graph," Knowl. Inf. Syst., vol. 38, no. 1, pp. 35-59, 2014.
-
(2014)
Knowl. Inf. Syst.
, vol.38
, Issue.1
, pp. 35-59
-
-
Prakash, B.A.1
Vreeken, J.2
Faloutsos, C.3
-
48
-
-
84859067538
-
Uncovering evolutionary ages of nodes in complex networks
-
G.-M. Zhu et al., "Uncovering evolutionary ages of nodes in complex networks," Eur. Phys. J. B, vol. 85, no. 3, pp. 1-6, 2012.
-
(2012)
Eur. Phys. J. B
, vol.85
, Issue.3
, pp. 1-6
-
-
Zhu, G.-M.1
-
49
-
-
33748335612
-
Characterizing the dynamical importance of network nodes and links
-
Sep.
-
J. G. Restrepo, E. Ott, and B. R. Hunt, "Characterizing the dynamical importance of network nodes and links," Phys. Rev. Lett., vol. 97, no. 9, Sep. 2006, Art. no. 094102.
-
(2006)
Phys. Rev. Lett.
, vol.97
, Issue.9
-
-
Restrepo, J.G.1
Ott, E.2
Hunt, B.R.3
-
50
-
-
84890083357
-
The hidden geometry of complex, network-driven contagion phenomena
-
D. Brockmann and D. Helbing, "The hidden geometry of complex, network-driven contagion phenomena," Science, vol. 342, no. 6164, pp. 1337-1342, 2013.
-
(2013)
Science
, vol.342
, Issue.6164
, pp. 1337-1342
-
-
Brockmann, D.1
Helbing, D.2
-
51
-
-
84877677059
-
Information source detection in the SIR model: A sample path based approach
-
San Diego, CA, USA
-
K. Zhu and L. Ying, "Information source detection in the SIR model: A sample path based approach," in Proc. Inf. Theory Appl. Workshop (ITA), San Diego, CA, USA, 2013, pp. 1-9.
-
(2013)
Proc. Inf. Theory Appl. Workshop (ITA)
, pp. 1-9
-
-
Zhu, K.1
Ying, L.2
-
52
-
-
84890444243
-
Finding an infection source under the SIS model
-
Vancouver, BC, Canada
-
W. Luo and W. P. Tay, "Finding an infection source under the SIS model," in Proc. IEEE Int. Conf. Acoust. Speech Signal Process. (ICASSP), Vancouver, BC, Canada, 2013, pp. 2930-2934.
-
(2013)
Proc. IEEE Int. Conf. Acoust. Speech Signal Process. (ICASSP)
, pp. 2930-2934
-
-
Luo, W.1
Tay, W.P.2
-
53
-
-
84904208881
-
Inferring the origin of an epidemic with a dynamic message-passing algorithm
-
A. Y. Lokhov, M. Mézard, H. Ohta, and L. Zdeborová, "Inferring the origin of an epidemic with a dynamic message-passing algorithm," Phys. Rev. E, vol. 90, no. 1, 2013, Art. no. 012801.
-
(2013)
Phys. Rev. E
, vol.90
, Issue.1
-
-
Lokhov, A.Y.1
Mézard, M.2
Ohta, H.3
Zdeborová, L.4
-
54
-
-
77954322317
-
Message passing approach for general epidemic models
-
Jul.
-
B. Karrer and M. E. J. Newman, "Message passing approach for general epidemic models," Phys. Rev. E, vol. 82, no. 1, Jul. 2010, Art. no. 016101.
-
(2010)
Phys. Rev. E
, vol.82
, Issue.1
-
-
Karrer, B.1
Newman, M.E.J.2
-
55
-
-
84890083357
-
Supplementary materials for the hidden geometry of complex, network-driven contagion phenomena
-
D. Brockmann and D. Helbing, "Supplementary materials for the hidden geometry of complex, network-driven contagion phenomena," Science, vol. 342, no. 6164, pp. 1337-1342, 2013.
-
(2013)
Science
, vol.342
, Issue.6164
, pp. 1337-1342
-
-
Brockmann, D.1
Helbing, D.2
-
56
-
-
84904498067
-
A two-stage algorithm to estimate the source of information diffusion in social media networks
-
Toronto, ON, Canada
-
A. Louni and K. P. Subbalakshmi, "A two-stage algorithm to estimate the source of information diffusion in social media networks," in Proc. IEEE Conf. Comput. Commun. Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 2014, pp. 329-333.
-
(2014)
Proc. IEEE Conf. Comput. Commun. Workshops (INFOCOM WKSHPS)
, pp. 329-333
-
-
Louni, A.1
Subbalakshmi, K.P.2
-
57
-
-
84897843090
-
Bayesian inference of epidemics on networks via belief propagation
-
F. Altarelli, A. Braunstein, L. Dall'Asta, A. Lage-Castellanos, and R. Zecchina, "Bayesian inference of epidemics on networks via belief propagation," Phys. Rev. Lett., vol. 112, no. 11, 2014, Art. no. 118701.
-
(2014)
Phys. Rev. Lett.
, vol.112
, Issue.11
-
-
Altarelli, F.1
Braunstein, A.2
Dall'Asta, L.3
Lage-Castellanos, A.4
Zecchina, R.5
-
58
-
-
34147175951
-
Distributed sequential Bayesian estimation of a diffusive source in wireless sensor networks
-
Apr.
-
T. Zhao and A. Nehorai, "Distributed sequential Bayesian estimation of a diffusive source in wireless sensor networks," IEEE Trans. Signal Process., vol. 55, no. 4, pp. 1511-1524, Apr. 2007.
-
(2007)
IEEE Trans. Signal Process.
, vol.55
, Issue.4
, pp. 1511-1524
-
-
Zhao, T.1
Nehorai, A.2
-
59
-
-
84961329426
-
Cascading outbreak prediction in networks: A data-driven approach
-
Chicago, IL, USA
-
P. Cui et al., "Cascading outbreak prediction in networks: A data-driven approach," in Proc. 19th ACM SIGKDD Int. Conf. Knowl. Disc. Data Min., Chicago, IL, USA, 2013, pp. 901-909.
-
(2013)
Proc. 19th ACM SIGKDD Int. Conf. Knowl. Disc. Data Min.
, pp. 901-909
-
-
Cui, P.1
-
60
-
-
84873732697
-
A survey of social-based routing in delay tolerant networks: Positive and negative social effects
-
1st Quart.
-
Y. Zhu, B. Xu, X. Shi, and Y. Wang, "A survey of social-based routing in delay tolerant networks: Positive and negative social effects," IEEE Commun. Surveys Tuts., vol. 15, no. 1, pp. 387-401, 1st Quart., 2013.
-
(2013)
IEEE Commun. Surveys Tuts.
, vol.15
, Issue.1
, pp. 387-401
-
-
Zhu, Y.1
Xu, B.2
Shi, X.3
Wang, Y.4
-
61
-
-
84862924629
-
Evolution in social networks: A survey
-
C. C. Aggarwal, Ed. New York, NY, USA: Springer, ch. 6
-
M. Spiliopoulou, "Evolution in social networks: A survey," in Social Network Data Analytics, C. C. Aggarwal, Ed. New York, NY, USA: Springer, 2011, ch. 6, pp. 149-175.
-
(2011)
Social Network Data Analytics
, pp. 149-175
-
-
Spiliopoulou, M.1
-
62
-
-
12244311689
-
A taxonomy of computer worms
-
Washington, DC, USA
-
N. Weaver, V. Paxson, S. Staniford, and R. Cunningham, "A taxonomy of computer worms," in Proc. ACM Workshop Rapid Malcode (WORM), Washington, DC, USA, 2003, pp. 11-18.
-
(2003)
Proc. ACM Workshop Rapid Malcode (WORM)
, pp. 11-18
-
-
Weaver, N.1
Paxson, V.2
Staniford, S.3
Cunningham, R.4
-
63
-
-
0038349210
-
Code red worm propagation modeling and analysis
-
Washington, DC, USA
-
C. C. Zou, W. Gong, and D. Towsley, "Code red worm propagation modeling and analysis," in Proc. 9th ACM Conf. Comput. Commun. Security (CCS), Washington, DC, USA, 2002, pp. 138-147.
-
(2002)
Proc. 9th ACM Conf. Comput. Commun. Security (CCS)
, pp. 138-147
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
64
-
-
0742276097
-
Inside the Slammer worm
-
Jul./Aug.
-
D. Moore et al., "Inside the Slammer worm," IEEE Security Privacy, vol. 99, no. 4, pp. 33-39, Jul./Aug. 2003.
-
(2003)
IEEE Security Privacy
, vol.99
, Issue.4
, pp. 33-39
-
-
Moore, D.1
-
65
-
-
84904666096
-
-
Symantec Corp., Mountain View, CA, USA, Tech. Rep., Apr.
-
P. Wood and G. Egan, "Symantec Internet security threat report 2011," Symantec Corp., Mountain View, CA, USA, Tech. Rep., Apr. 2012.
-
(2012)
Symantec Internet Security Threat Report 2011
-
-
Wood, P.1
Egan, G.2
-
66
-
-
80051656517
-
Robust distributed detection, localization, and estimation of a diffusive target in clustered wireless sensor networks
-
Prague, Czech Republic
-
S. Aldalahmeh and M. Ghogho, "Robust distributed detection, localization, and estimation of a diffusive target in clustered wireless sensor networks," in Proc. ICASSP, Prague, Czech Republic, 2011, pp. 3012-3015.
-
(2011)
Proc. ICASSP
, pp. 3012-3015
-
-
Aldalahmeh, S.1
Ghogho, M.2
-
67
-
-
51949093835
-
Botnet research survey
-
Turku, Finland, Jul.
-
Z. Zhu et al., "Botnet research survey," in Proc. 32nd Annu. IEEE Int. Comput. Softw. Appl. (COMPSAC), Turku, Finland, Jul. 2008, pp. 967-972.
-
(2008)
Proc. 32nd Annu. IEEE Int. Comput. Softw. Appl. (COMPSAC)
, pp. 967-972
-
-
Zhu, Z.1
-
68
-
-
0032482432
-
Collective dynamics of 'small-world' networks
-
D. J. Watts and S. H. Strogatz, "Collective dynamics of 'small-world' networks," Nature, vol. 393, no. 6684, pp. 440-442, 1998.
-
(1998)
Nature
, vol.393
, Issue.6684
, pp. 440-442
-
-
Watts, D.J.1
Strogatz, S.H.2
-
69
-
-
81555203120
-
Identifying the starting point of a spreading process in complex networks
-
Nov.
-
C. H. Comin and L. da Fontoura Costa, "Identifying the starting point of a spreading process in complex networks," Phys. Rev. E, vol. 84, Nov. 2011, Art. no. 056105.
-
(2011)
Phys. Rev. E
, vol.84
-
-
Comin, C.H.1
Da Fontoura Costa, L.2
-
70
-
-
85006623593
-
The Enron email dataset database schema and brief statistical report
-
Univ. Southern California, Los Angeles, CA, USA, Tech. Rep. 4
-
S. Jitesh and A. Jafar, "The Enron email dataset database schema and brief statistical report," Inf. Sci. Inst., Univ. Southern California, Los Angeles, CA, USA, Tech. Rep. 4, 2009.
-
(2009)
Inf. Sci. Inst.
-
-
Jitesh, S.1
Jafar, A.2
-
71
-
-
85014105089
-
-
Accessed on Feb. 2, 2014. [Online]
-
Power Grid Network Data Set. Accessed on Feb. 2, 2014. [Online]. Available: http://www-personal.umich.edu/?mejn/netdata/
-
Power Grid Network Data Set
-
-
-
72
-
-
79952397059
-
Everyone's an influencer: Quantifying influence on Twitter
-
Hong Kong
-
E. Bakshy, J. M. Hofman, W. A. Mason, and D. J. Watts, "Everyone's an influencer: Quantifying influence on Twitter," in Proc. 4th ACM Int. Conf. Web Search Data Min. (WSDM), Hong Kong, 2011, pp. 65-74.
-
(2011)
Proc. 4th ACM Int. Conf. Web Search Data Min. (WSDM)
, pp. 65-74
-
-
Bakshy, E.1
Hofman, J.M.2
Mason, W.A.3
Watts, D.J.4
-
73
-
-
77954950954
-
-
Symantec Corp., Mountain View, CA, USA, Tech. Rep., Mar.
-
M. Fossi and J. Blackbird, "Symantec Internet security threat report 2010," Symantec Corp., Mountain View, CA, USA, Tech. Rep., Mar. 2011.
-
(2011)
Symantec Internet Security Threat Report 2010
-
-
Fossi, M.1
Blackbird, J.2
-
74
-
-
84891429894
-
Modeling botnet propagation using time zones
-
San Diego, CA, USA
-
D. Dagon, C. C. Zou, and W. Lee, "Modeling botnet propagation using time zones," in Proc. NDSS, vol. 6. San Diego, CA, USA, 2006, pp. 2-13.
-
(2006)
Proc. NDSS
, vol.6
, pp. 2-13
-
-
Dagon, D.1
Zou, C.C.2
Lee, W.3
-
75
-
-
85014076829
-
Source estimation for propagation processes on complex networks with an application to delays in public transportation systems
-
Sep.
-
J. Manitz, J. Harbering, M. Schmidt, T. Kneib, and A. Schöbel, "Source estimation for propagation processes on complex networks with an application to delays in public transportation systems," J. Roy. Stat. Soc. C (Appl. Stat.), Sep. 2016.
-
(2016)
J. Roy. Stat. Soc. C (Appl. Stat.)
-
-
Manitz, J.1
Harbering, J.2
Schmidt, M.3
Kneib, T.4
Schöbel, A.5
-
76
-
-
84880054920
-
Modeling propagation dynamics of social network worms
-
Aug.
-
S. Wen et al., "Modeling propagation dynamics of social network worms," IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 8, pp. 1633-1643, Aug. 2013.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.8
, pp. 1633-1643
-
-
Wen, S.1
-
77
-
-
84949928711
-
Statistical inference framework for source detection of contagion processes on arbitrary network structures
-
London, U.K.
-
N. Antulov-Fantulin, A. Lancic, H. Stefancic, M. Sikic, and T. Smuc, "Statistical inference framework for source detection of contagion processes on arbitrary network structures," in Proc. IEEE 8th Int. Conf. Self Adapt. Self Organizing Syst. Workshops (SASOW), London, U.K., 2014, pp. 78-83.
-
(2014)
Proc. IEEE 8th Int. Conf. Self Adapt. Self Organizing Syst. Workshops (SASOW)
, pp. 78-83
-
-
Antulov-Fantulin, N.1
Lancic, A.2
Stefancic, H.3
Sikic, M.4
Smuc, T.5
-
78
-
-
84864677691
-
Network forensics: Random infection vs spreading epidemic
-
Jun.
-
C. Milling, C. Caramanis, S. Mannor, and S. Shakkottai, "Network forensics: Random infection vs spreading epidemic," SIGMETRICS Perform. Eval. Rev., vol. 40, no. 1, pp. 223-234, Jun. 2012.
-
(2012)
SIGMETRICS Perform. Eval. Rev.
, vol.40
, Issue.1
, pp. 223-234
-
-
Milling, C.1
Caramanis, C.2
Mannor, S.3
Shakkottai, S.4
-
79
-
-
84875707764
-
Spotting trendsetters: Inference for network games
-
Monticello, IL, USA
-
R. Berry and V. G. Subramanian, "Spotting trendsetters: Inference for network games," in Proc. 50th Annu. Allerton Conf. Commun. Control Comput. (Allerton), Monticello, IL, USA, 2012, pp. 1697-1704.
-
(2012)
Proc. 50th Annu. Allerton Conf. Commun. Control Comput. (Allerton)
, pp. 1697-1704
-
-
Berry, R.1
Subramanian, V.G.2
-
80
-
-
85014071571
-
-
arXiv:1608.06492
-
H. T. Nguyen, P. Ghosh, M. L. Mayo, and T. N. Dinh, "Multiple infection sources identification with provable guarantees," arXiv:1608.06492, 2016.
-
(2016)
Multiple Infection Sources Identification with Provable Guarantees
-
-
Nguyen, H.T.1
Ghosh, P.2
Mayo, M.L.3
Dinh, T.N.4
-
81
-
-
77956221415
-
Inferring networks of diffusion and influence
-
Washington, DC, USA
-
M. G. Rodriguez, J. Leskovec, and A. Krause, "Inferring networks of diffusion and influence," in Proc. 16th ACM SIGKDD Int. Conf. Knowl. Disc. Data Min., Washington, DC, USA, 2010, pp. 1019-1028.
-
(2010)
Proc. 16th ACM SIGKDD Int. Conf. Knowl. Disc. Data Min.
, pp. 1019-1028
-
-
Rodriguez, M.G.1
Leskovec, J.2
Krause, A.3
-
82
-
-
84983666557
-
Fast rumor source identification via random walks
-
A. Jain, V. Borkar, and D. Garg, "Fast rumor source identification via random walks," Soc. Netw. Anal. Min., vol. 6, no. 1, p. 62, 2016.
-
(2016)
Soc. Netw. Anal. Min.
, vol.6
, Issue.1
, pp. 62
-
-
Jain, A.1
Borkar, V.2
Garg, D.3
|