Provable Security of Networks
by Angsheng Li, Yicheng Pan, Wei Zhang
Publisher: arXiv 2013
Number of pages: 81
Description:
We propose a definition of security and a definition of robustness of networks against the cascading failure models of deliberate attacks and random errors respectively, and investigate the principles of the security and robustness of networks.
Download or read it online for free here:
Download link
(530KB, PDF)
Similar books
Good Digital Hygiene: A guide to staying secure in cyberspace
by Ed Gelbstein - Bookboon
The explosive growth in the adoption of electronic devices by the general population is creating and environment where some measures of digital hygiene are needed to protect the devices and the data they contain as well as their owners.
(9776 views)
by Ed Gelbstein - Bookboon
The explosive growth in the adoption of electronic devices by the general population is creating and environment where some measures of digital hygiene are needed to protect the devices and the data they contain as well as their owners.
(9776 views)
Rethinking Public Key Infrastructures and Digital Certificates
by Stefan A. Brands - The MIT Press
In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens.
(11654 views)
by Stefan A. Brands - The MIT Press
In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens.
(11654 views)
Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar
by Lillian Ablon, Martin C. Libicki, Andrea A. Golay - RAND Corporation
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report describes the fundamental characteristics of these markets.
(7708 views)
by Lillian Ablon, Martin C. Libicki, Andrea A. Golay - RAND Corporation
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report describes the fundamental characteristics of these markets.
(7708 views)
Cyber Infrastructure Protection
by Tarek N. Saadawi, Louis H. Jordan Jr. - Strategic Studies Institute
This book provides an integrated view of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development and an analysis of technology challenges that impede cyber infrastructure protection.
(11337 views)
by Tarek N. Saadawi, Louis H. Jordan Jr. - Strategic Studies Institute
This book provides an integrated view of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development and an analysis of technology challenges that impede cyber infrastructure protection.
(11337 views)