- S. N. Dorogovtsev. Lectures on Complex Networks. Oxford University Press, Oxford, 2010. Google ScholarDigital Library
- L. Lu and T. Zhou. Link prediction in complex networks: A survey. Physica A: Statistical Mechanics and its Applications, 390:1150--1170, 2011.Google ScholarCross Ref
- D. Krioukov, F. Papadopoulos, M. Kitsak, A. Vahdat, and M. Boguñá. Hyperbolic Geometry of Complex Networks. Physical Review E, 82:36106, 2010.Google ScholarCross Ref
- M. Gromov. Metric Structures for Riemannian and Non-Riemannian Spaces. Birkhäuser, Boston, 2007.Google Scholar
- F. Papadopoulos, M. Kitsak, M. Á. Serrano, M. Boguñá, and D. Krioukov. Popularity versus Similarity in Growing Networks. Nature, 489--7417), September 2012.Google Scholar
- A. Dhamdhere and C. Dovrolis. Twelve years in the evolution of the Internet ecosystem. IEEE/ACM Transactions on Networking, 19(5):1420--1433, October 2011. Google ScholarDigital Library
- K. Claffy, Y. Hyun, K. Keys, M. Fomenkov, and D. Krioukov. Internet Mapping: from Art to Science. In CATCH, 2009. Google ScholarDigital Library
- IPv4 Routed /24 AS Links Dataset. http://www.caida.org/data/active/ipv4 routed topology aslinks dataset.xml.Google Scholar
- X. Dimitropoulos, D. Krioukov, M. Fomenkov, B. Huffaker, Y. Hyun, k. claffy, and G. Riley. AS Relationships: Inference and Validation. Comput Commun Rev, 37(1):29--40, 2007. Google ScholarDigital Library
- A. Lakhina, J. Byers, M. Crovella, and P. Xie. Sampling Biases in IP Topology Measurements. In INFOCOM, 2003.Google ScholarCross Ref
Index Terms
- Replaying the geometric growth of complex networks and application to the AS internet
Recommendations
Vulnerabilities of Internet Access Mechanisms from Mobile Ad Hoc Networks
AINA '06: Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 01Gateway node provides connectivity to the nodes inside MANET. Based upon the route to gateway node found during discovery phase; source node relies on intermediate nodes to forward packets to the gateway node. We have identified a vulnerability of the ...
Internet of Things: information security challenges and solutions
Keeping up with the burgeoning Internet of Things (IoT) requires staying up to date on the latest network attack trends in dynamic and complicated cyberspace, and take them into account while developing holistic information security (IS) approaches for ...
Comments