[[abstract]]The real-world networks are large and complex entities and there are many studies on mathematical models in simulating real-network structure. This paper proposed a platform to simulate protection strategies against attacks in order to gain better understanding of the relation between network characteristics and information security. We set up several attack and protection strategies in three network models. The attacker carries out attack and the defender uses limited resources to improve the defenses of network. For a given cost of attacks, we will analyze the impacts of network characteristics and show their effectiveness of protection.[[sponsorship]]IEEE Taipei Section; National Science Council; Ministry of Education; Tamkan...
The paper outlines a bioinspired approach named "network nervous system" and methods of si...
Copyright © 2017 The Authors. Modern economies rely heavily on their infrastructure networks. These ...
Abstract. In this work, we estimate the resilience of scale-free networks on a number of different a...
[[abstract]]The real-world networks are large and complex entities and there are many studies on mat...
Wireless mesh networks are becoming an attractive solution for providing low-cost Internet access ci...
International audienceThis paper considers network protection games against different types of attac...
In order to combat the increasing complexity of cyber attacks, a new category of cyber defense calle...
Computers are closely related to our life and work. We have entered an era in which computers are no...
As we are already into the 21st century our society heavily relies on the Internet in several fields...
We investigated the efficiency of attack strategies to network nodes when targeting several complex ...
The study of intentional attackshas become an important issue onthe research of complex networks. In...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
Network systems often contain vulnerabilities that remain unmitigated in a network for various reaso...
Due to the widespread dissemination of informational distributed computing networks reveals problems...
Our dependence on networks – be they infrastructure, economic, social or others – leaves us prone to...
The paper outlines a bioinspired approach named "network nervous system" and methods of si...
Copyright © 2017 The Authors. Modern economies rely heavily on their infrastructure networks. These ...
Abstract. In this work, we estimate the resilience of scale-free networks on a number of different a...
[[abstract]]The real-world networks are large and complex entities and there are many studies on mat...
Wireless mesh networks are becoming an attractive solution for providing low-cost Internet access ci...
International audienceThis paper considers network protection games against different types of attac...
In order to combat the increasing complexity of cyber attacks, a new category of cyber defense calle...
Computers are closely related to our life and work. We have entered an era in which computers are no...
As we are already into the 21st century our society heavily relies on the Internet in several fields...
We investigated the efficiency of attack strategies to network nodes when targeting several complex ...
The study of intentional attackshas become an important issue onthe research of complex networks. In...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
Network systems often contain vulnerabilities that remain unmitigated in a network for various reaso...
Due to the widespread dissemination of informational distributed computing networks reveals problems...
Our dependence on networks – be they infrastructure, economic, social or others – leaves us prone to...
The paper outlines a bioinspired approach named "network nervous system" and methods of si...
Copyright © 2017 The Authors. Modern economies rely heavily on their infrastructure networks. These ...
Abstract. In this work, we estimate the resilience of scale-free networks on a number of different a...