SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.
Citation: | Xin-Li Huang, Fu-Tai Zou, Fan-Yuan Ma. Targeted Local Immunization in Scale-Free Peer-to-Peer Networks[J]. Journal of Computer Science and Technology, 2007, 22(3): 457-468. |
[1] |
Faloutsos M, Faloutsos P, Faloutsos C. On power-law relationships of the Internet topology. In -\it Proc. SIGCOMM}, Cambridge, MA, 1999, pp.251--262.
|
[2] |
Pastor-Satorras R, Vazquez A, Vespignani A. Dynamical and correlation properties of the Internet. -\it Phys. Rev. Lett.}, 2001, 87: 258701.
|
[3] |
Vazquez A, Pastor-Satorras R, Vespignani A. Large-scale topological and dynamical properties of the Internet. -\it Phys. Rev. E.}, 2002, 65: 66130.
|
[4] |
Pastor-Satorras R, Vespignani A. Evolution and Structure of the Internet: A Statistical Physics Approach. Hardcover: Cambridge University Press, 2004.
|
[5] |
Ripeanu M. Peer-to-peer architecture case study: Gnutella network. Technical Report TR-2001-26, University of Chicago, 2001.
|
[6] |
Sen S, Wang J. Analyzing peer-to-peer traffic across large networks. -\it IEEE/ACM Transactions on Networking}, 2004, 12(2): 137--150.
|
[7] |
Barab\'asi A-L, Albert R. Emergence of scaling in random networks. -\it Science}, 1999, 286(5439): 509--512.
|
[8] |
Dorogovtsev S N, Mendes J F F. Evolution of Networks: From Biological Nets to the Internet and the WWW. Oxford, UK: Oxford University Press, 2003.
|
[9] |
Newman M. The structure and function of complex networks. -\it SIAM Review}, 2003, 45(2): 167--256.
|
[10] |
Bornholdt S, Schuster H G. Handbook of Graphs and Networks: From the Genome to the Internet. Germany: John Wiley-VCH, 2003.
|
[11] |
Albert R, Jeong H, Barab\'asi A-L. Error and attack tolerance of complex networks. -\it Nature}, 2000, 406: 378--382.
|
[12] |
Pastor-Satorras R, Vespignani A. Immunization of complex networks. -\it Phys. Rev. E.}, 2002, 65: 036104.
|
[13] |
Ratnasamy S, Francis P, Handley M -\it et al}. A scalable content-addressable network. In -\it Proc. SIGCOMM}, San Diego, CA, 2001, pp.161--172.
|
[14] |
Stoica I, Morris R, Karger D -\it et al}. Chord: A scalable peer-to-peer lookup service for Internet applications. In -\it Proc. SIGCOMM}, San Diego, CA, 2001, pp.161--172.
|
[15] |
Rowstron A, Druschel P. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In -\it Proc. ACM Middleware}, Heidelberg, Germany, 2001, pp.329--350.
|
[16] |
Zhao B Y, Kubiatowicz J D, Joseph A D -\it et al}. Tapestry: An infrastructure for fault-tolerant wide-area location and routing. Technical Report CSD-01-1141, UC Berkeley, 2001.
|
[17] |
Manku G S, Bawa M, Raghavan P. Symphony: Distributed hashing in a small world. In -\it Proc. USITS}, Seattle, USA, 2003, pp.127--140.
|
[18] |
Gnutella. http://www.gnutella.wego.com/.
|
[19] |
Clarke I, Sandberg O, Wiley B -\it et al}. Freenet: A distributed anonymous information storage and retrieval system. In -\it Proc. International Workshop on Design Issues in Anonymity and Unobservability}, Berkeley, CA, 2001, pp.161--172.
|
[20] |
Jovanovic M, Annexstein F, Berman K. Modeling peer-to-peer network topologies through small-world models and power laws. In -\it Proc. Telecommunications Forum}, Belgrade, Yugoslavia, 2001, pp.161--172.
|
[21] |
Zhang H, Goel A, Govindan R. Using the small-world model to improve freenet performance. In -\it Proc. INFOCOM}, New York, USA, 2002, pp.1228--1237.
|
[22] |
Manku G S, Naor M, Wieder U. Know thy neighbor's neighbor: The power of lookahead in randomized P2P networks. In -\it Proc. STOC}, Chicago, USA, Jun. 2004, pp.54$\sim$63.
|
[23] |
Zhou L, Zhang L, McSherry F -\it et al}. A first look at peer-to-peer worms: Threats and defenses. In -\it Proc. IPTPS}, Ithaca, NY, 2005, pp.24--35.
|
[24] |
Chothia T, Chatzikokolakis K. A Survey of Anonymous Peer-to-Peer File-Sharing. In -\it Proc. NCUS}, Nagasaki, Japan, 2005, pp.744--755.
|
[25] |
Dezso Z, Barab\'asi A-L. Halting viruses in scale-free networks. -\it Phys. Rev. E.}, 2002, 65: 055103.
|
[26] |
Cohen R, Havlin S, Daniel ben-A. Efficient immunization strategies for computer networks and populations. -\it Phys. Rev. Lett.}, 2003, 91: 247901.
|
[27] |
Madar N, Kalisky T, Cohen R -\it et al}. Immunization and epidemics dynamics in complex networks. -\it Eur. Phys. J. B}, 2004, 38: 269--276.
|
[28] |
Echenique P, G\'omez-Gardenes J, Moreno Y -\it et al}. Distance-$d$ covering problem in scale-free networks with degree correlations. -\it Phys. Rev. E.}, 2005, 71: 035102.
|
[29] |
G\'omez-Gardenes J, Echenique P, Moreno Y. Immunization of real complex networks. -\it Eur. Phys. J. B}, 2006, 49: 259--264.
|
[30] |
Holme P. Efficient local strategies for vaccination and network attack. -\it Europhys. Lett.}, 2004, 68: 908--914.
|
[31] |
Moreno Y, Pastor-Satorras R, Vespignani A. Epidemic outbreaks in complex heterogeneous networks. -\it Eur. Phys. J. B}, 2002, 26: 521--529.
|
[32] |
Saroiu S, Gummadi P K, Gribble S D. A measurement study of peer-to-peer file sharing systems. In -\it Proc. MMCN}, San Jose, CA, 2002, pp.156$\sim$170.
|
[33] |
Adar E, Huberman B. Free Riding on Gnutella. Technical Report, Xerox PARC, Aug. 2000.
|
[34] |
Motter A E, Nishikawa T, Lai Y C. Range-based attack on links in scale-free networks: Are long-range links responsible for the small-world phenomenon. -\it Phys. Rev. E.}, 2002, 66: 065103.
|
[35] |
Holme P, Kim B J, Yoon C N -\it et al}. Attack vulnerability of complex networks. -\it Phys. Rev. E.}, 2002, 65: 056109.
|
[36] |
Newman M. Scientific collaboration networks, II: Shortest paths, weighted networks, and centrality. -\it Phys. Rev. E.}, 2001, 64: 016132.
|
[37] |
Goh K-I, Kahng B, Kim D. Universal behavior of load distribution in scale-free networks. -\it Phys. Rev. Lett.}, 2001, 87: 278701.
|
[38] |
Holme P. Congestion and centrality in traffic flow on complex networks. -\it Advances in Complex Systems}, 2003, 6: 163--176.
|
[39] |
Zhou S, Mondragon R J. Accurately modeling the Internet topology. -\it Phys. Rev. E.}, 2004, 70: 066108.
|
[40] |
Maslov S, Sneppen K, Zaliznyak A. Pattern detection in complex networks: Correlation profile of the Internet. -\it Physica A}, 2004, 333: 529--540.
|
[41] |
Newman M. Assortative mixing in networks. -\it Phys. Rev. Lett.}, 2002, 89: 208701.
|
[42] |
Clip2 Distributed Search Solutions. http://www.clip2.com.
|
[43] |
Crespo A, Molina H G. Semantic overlay networks for P2P systems. Technical Report, Stanford University, 2003.
|
[44] |
Jon Kleinberg. The small-world phenomenon: An algorithmic perspective. Technical Report TR99-1776, Cornell University, 1999.
|
[45] |
Williamson M. Throttling Viruses: Restricting propagation to defeat malicious mobile code. Technical Report HPL2002-172, HP Lab, 2002.
|
[46] |
Hethcote H W. Three basic epidemiological models. -\it Biomathematics}, 1989, 18: 119--144.
|
[47] |
Palmer C R, Steffan J G. Generating network topologies that obey power laws. In -\it Proc. GLOBECOM}, Pittsburgh, PA, 2000, pp.434--438.
|
[48] |
Xu J, Wang X F. Cascading failures in coupled map lattices. -\it Physica A}, 2005, 369: 685--692.
|