Optimal response to attacks on the open science grid
- 1 January 2011
- journal article
- Published by Elsevier BV in Computer Networks
- Vol. 55 (1), 61-73
- https://doi.org/10.1016/j.comnet.2010.07.012
Abstract
No abstract availableThis publication has 13 references indexed in Scilit:
- Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implicationsAd Hoc Networks, 2009
- A new worm exploiting IPv6 and IPv4-IPv6 dual-stack networks: experiment, modeling, simulation, and defenseIEEE Network, 2009
- A Quasi-Species Model for the Propagation and Containment of Polymorphic WormsIEEE Transactions on Computers, 2009
- Peer-to-peer system-based active worm attacks: Modeling, analysis and defenseComputer Communications, 2008
- A New Susceptible-Infected Model of Malware Propagation in the InternetPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- From gridmap-file to VOMS: managing authorization in a Grid environmentFuture Generation Computer Systems, 2005
- Authorization and account management in the Open Science GridPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- A national-scale authentication infrastructureComputer, 2000
- Some analyses of Erdos collaboration graphSocial Networks, 2000
- And What Is Your Erdos Number?The American Mathematical Monthly, 1969