The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - January/February (2012 vol.10)
pp: 94-95
ABSTRACT
Research on networks is an area that we should watch more closely than any other. Perhaps more important than the borrowing of techniques, however, is paying close attention to the ferment over whether new network designs with security in mind are worth the societal price and effort to actually implement in a world that already has a considerable sunk investment in structure. How networks build themselves does have considerable influence on our field of practice.
INDEX TERMS
network security, information security, network design
CITATION
Daniel E. Geer Jr., "Power. Law.", IEEE Security & Privacy, vol.10, no. 1, pp. 94-95, January/February 2012, doi:10.1109/MSP.2012.19
REFERENCES
1. A. Barabasi and R. Albert, "Emergence of Scaling in Random Networks," Science, vol. 286, 1999, pp. 509–512; tinyurl.com/8lmx9.
2. D. de Solla Price, "A General Theory of Bibliometric and Other Cumulative Advantage Processes," J. Am. Soc. for Information Science, vol. 27, 1976, pp. 292–306; tinyurl.com/7py9284.
3. P. Wang et al., "Understanding the Spreading Patterns of Mobile Phone Viruses," Science, vol. 324, 2009, pp. 1071–1076; tinyurl.com/7abx8pr.
4. R. Cohen, S. Havlin, and D. ben-Avraham, "Efficient Immunization Strategies for Computer Networks and Populations," Physical Rev. Letters, vol. 91, no. 24, 2003, p. 247901; tinyurl.com/7l6ec4o.
5. D. Dagon et al., "A Taxonomy of Botnet Structures," Proc. Ann. Computer Security Applications Conf., 2007; tinyurl.com/7cxh3zv.
6. A. Bensoussan, M. Kantarcioglu, and C. Hoe, "A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model," Proc. GameSec 10, 2010, pp. 135–148; tinyurl.com/7msc6h8.
30 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool