Robustness of Internet under targeted attack: A cascading failure perspective (English)
- New search for: Wang, Jianwei
- New search for: Wang, Jianwei
- New search for: Jiang, Chen
- New search for: Qian, Jianfei
In:
Journal of network and computer applications
;
40
; 97-104
;
2014
-
ISSN:
- Article (Journal) / Print
-
Title:Robustness of Internet under targeted attack: A cascading failure perspective
-
Contributors:
-
Published in:Journal of network and computer applications ; 40 ; 97-104
-
Publisher:
- New search for: Academic Press
-
Place of publication:London [u.a.]
-
Publication date:2014
-
ISSN:
-
ZDBID:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 54.26 / 54.32
- Further information on Basic classification
-
Keywords:
-
Classification:
-
Source:
Table of contents – Volume 40
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
An energy efficient hierarchical clustering index tree for facilitating time-correlated region queries in the Internet of ThingsTang, Jine / Zhou, ZhangBing / Niu, Jianwei / Wang, Qun et al. | 2013
- 12
-
Simple models of the content duration and the popularity of television contentFraile, Francisco / Carlos Guerri, Juan et al. | 2013
- 21
-
Reducing view inconsistency by predicting avatars' motion in multi-server distributed virtual environmentsHu, Haiyang / Ren, Yizhi / Xu, Xu / Huang, Liguo / Hu, Hua et al. | 2013
- 31
-
Counteracting security attacks in virtual machines in the cloud using property based attestationVaradharajan, Vijay / Tupakula, Udaya et al. | 2013
- 46
-
Multi-rate multicast routing in multi-gateway multi-channel multi-radio wireless mesh networksFarzinvash, Leili / Dehghan, Mehdi et al. | 2013
- 61
-
Niched ant colony optimization with colony guides for QoS multicast routingYin, Peng-Yeng / Chang, Ray-I. / Chao, Chih-Chiang / Chu, Yen-Ting et al. | 2013
- 73
-
Community detection in social networks using hybrid merging of sub-communitiesArab, Mohsen / Afsharchi, Mohsen et al. | 2013
- 85
-
Collaborative caching priority for processing requests in MANETsAhmed Elfaki, Mohamed / Ibrahim, Hamidah / Mamat, Ali / Othman, Mohamed / Safa, Haidar et al. | 2013
- 97
-
Robustness of Internet under targeted attack: A cascading failure perspectiveWang, Jianwei / Jiang, Chen / Qian, Jianfei et al. | 2013
- 105
-
Design and evaluation of mobile offloading system for web-centric devicesPark, Sehoon / Chen, Qichen / Han, Hyuck / Yeom, Heon Y. et al. | 2013
- 116
-
Toward efficient estimation of available bandwidth for IEEE 802.11-based wireless networksZhao, Peng / Yang, Xinyu / Yu, Wei / Dong, Chiyong / Yang, Shusen / Bhattarai, Sulabh et al. | 2013
- 126
-
Mobile Internet access over intermittent network connectivityXia, Yang / Yeo, Chai Kiat et al. | 2013
- 139
-
An electronic voting mechanism for fighting bribery and coercionWu, Zhen-Yu / Wu, Ju-Chuan / Lin, Sung-Chiang / Wang, Charlotte et al. | 2013
- 151
-
Metric-based taxonomy of routing protocols for cognitive radio ad hoc networksAbdelaziz, Samar / ElNainay, Mustafa et al. | 2013
- 164
-
Localization-free and energy-efficient hole bypassing techniques for fault-tolerant sensor networksYilmaz, Onur / Dagdeviren, Orhan / Erciyes, Kayhan et al. | 2013
- 179
-
Google Drive: Forensic analysis of data remnantsQuick, Darren / Choo, Kim-Kwang Raymond et al. | 2013
- 194
-
Benford's law behavior of Internet trafficArshadi, Laleh / Jahangir, Amir Hossein et al. | 2013
- 206
-
Optimization on content service with local search in cloud of cloudsZeng, Lingfang / Wang, Yang et al. | 2013
- 216
-
Evaluating the benefit of the core-edge separation on intradomain traffic engineering under uncertain traffic demandLi, Ke / Wang, Sheng / Xu, Shizhong / Wang, Xiong / Huang, Haojun / Ren, Jin / Zhai, Bo et al. | 2013
- 227
-
Energy–delay tradeoff analysis of user state transition mechanism for mobile web servicesChoi, Hyun-Ho / Lee, Ki-Ho / Lee, Jung-Ryun et al. | 2013
- 234
-
Push or pull? Toward optimal content delivery using cloud storageGuan, Xinjie / Choi, Baek-Young et al. | 2013
- 244
-
Performance analysis of quantization-based approximation algorithms for precomputing the supported QoSHou, Ronghui / Lui, King-Shan / Leung, Ka-Cheong / Baker, Fred et al. | 2013
- 255
-
A formal framework for modelling complex network management systemsMacia-Perez, Francisco / Lorenzo-Fonseca, Iren / Berna-Martinez, Jose Vicente et al. | 2013
- 270
-
Energy-aware routing for biomedical wireless sensor networksAbreu, Carlos / Ricardo, Manuel / Mendes, P.M. et al. | 2013
- 279
-
JDER: A history-based forwarding scheme for delay tolerant networks using Jaccard distance and encountered rationCiobanu, R.I. / Reina, D.G. / Dobre, C. / Toral, S.L. / Johnson, P. et al. | 2013
- 292
-
A transform domain-based anomaly detection approach to network-wide trafficJiang, Dingde / Xu, Zhengzheng / Zhang, Peng / Zhu, Ting et al. | 2013
- 307
-
Network attacks: Taxonomy, tools and systemsHoque, N. / Bhuyan, Monowar H. / Baishya, R.C. / Bhattacharyya, D.K. / Kalita, J.K. et al. | 2013
- 325
-
A survey on vehicular cloud computingWhaiduzzaman, Md / Sookhak, Mehdi / Gani, Abdullah / Buyya, Rajkumar et al. | 2013
- 345
-
Rich Mobile Applications: Genesis, taxonomy, and open issuesAbolfazli, Saeid / Sanaei, Zohreh / Gani, Abdullah / Xia, Feng / Yang, Laurence T. et al. | 2013
- 363
-
Vehicular communication ad hoc routing protocols: A surveySharef, Baraa T. / Alsaqour, Raed A. / Ismail, Mahamod et al. | 2013
- IFC
-
Editorial board| 2014