This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Power. Law.
January/February 2012 (vol. 10 no. 1)
pp. 94-95
Research on networks is an area that we should watch more closely than any other. Perhaps more important than the borrowing of techniques, however, is paying close attention to the ferment over whether new network designs with security in mind are worth the societal price and effort to actually implement in a world that already has a considerable sunk investment in structure. How networks build themselves does have considerable influence on our field of practice.

1. A. Barabasi and R. Albert, "Emergence of Scaling in Random Networks," Science, vol. 286, 1999, pp. 509–512; tinyurl.com/8lmx9.
2. D. de Solla Price, "A General Theory of Bibliometric and Other Cumulative Advantage Processes," J. Am. Soc. for Information Science, vol. 27, 1976, pp. 292–306; tinyurl.com/7py9284.
3. P. Wang et al., "Understanding the Spreading Patterns of Mobile Phone Viruses," Science, vol. 324, 2009, pp. 1071–1076; tinyurl.com/7abx8pr.
4. R. Cohen, S. Havlin, and D. ben-Avraham, "Efficient Immunization Strategies for Computer Networks and Populations," Physical Rev. Letters, vol. 91, no. 24, 2003, p. 247901; tinyurl.com/7l6ec4o.
5. D. Dagon et al., "A Taxonomy of Botnet Structures," Proc. Ann. Computer Security Applications Conf., 2007; tinyurl.com/7cxh3zv.
6. A. Bensoussan, M. Kantarcioglu, and C. Hoe, "A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model," Proc. GameSec 10, 2010, pp. 135–148; tinyurl.com/7msc6h8.

Index Terms:
network security, information security, network design
Citation:
Daniel E. Geer Jr., "Power. Law.," IEEE Security & Privacy, vol. 10, no. 1, pp. 94-95, Jan.-Feb. 2012, doi:10.1109/MSP.2012.19
Usage of this product signifies your acceptance of the Terms of Use.