Virus Spread in Networks, IEEE/ACM Transactions on Networking, vol.17, issue.1, pp.1-14, 2009. ,
DOI : 10.1109/TNET.2008.925623
Epidemic thresholds in real networks, ACM Transactions on Information and System Security, vol.10, issue.4, pp.1-1, 2008. ,
DOI : 10.1145/1284680.1284681
The effect of network topology on the spread of epidemics, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., pp.1455-1466, 2005. ,
DOI : 10.1109/INFCOM.2005.1498374
Directed-graph epidemiological models of computer viruses, IEEE Symposium on Research in Security and Privacy, pp.343-359, 1991. ,
The viral conductance of a network, Computer Communications, vol.35, issue.12, pp.1494-1506, 2012. ,
DOI : 10.1016/j.comcom.2012.04.015
Efficient Immunization Strategies for Computer Networks and Populations, Physical Review Letters, vol.91, issue.24, p.247901, 2003. ,
DOI : 10.1103/PhysRevLett.91.247901
Suppressing epidemics with a limited amount of immunization units, Physical Review E, vol.84, issue.6, p.61911, 2011. ,
DOI : 10.1103/PhysRevE.84.061911
Network protection against worms and cascading failures using modularity partitioning, International Teletraffic Congress (ITC), pp.1-8, 2010. ,
Competitive routing in multiuser communication networks, IEEE/ACM Transactions on Networking, vol.1, issue.5, pp.510-521, 1993. ,
DOI : 10.1109/90.251910
Competitive routing in networks with polynomial cost, IEEE INFOCOM, pp.1586-1593, 2000. ,
On the existence of equilibria in noncooperative optimal flow control, Journal of the ACM, vol.42, issue.3, pp.584-613, 1995. ,
DOI : 10.1145/210346.210415
Workload factoring with the cloud: A game-theoretic perspective, 2012 Proceedings IEEE INFOCOM, pp.2566-2570, 2012. ,
DOI : 10.1109/INFCOM.2012.6195654
Topology Design of Communication Networks: A Game-Theoretic Perspective, IEEE/ACM Transactions on Networking, vol.22, issue.2 ,
DOI : 10.1109/TNET.2013.2254125
Worst-case equilibria, Computer Science Review, vol.3, issue.2, pp.65-69, 2009. ,
DOI : 10.1016/j.cosrev.2009.04.003
How bad is selfish routing?, Journal of the ACM, vol.49, issue.2, pp.236-259, 2002. ,
DOI : 10.1145/506147.506153
Algorithmic Game Theory, 2007. ,
DOI : 10.1017/CBO9780511800481
Protecting against network infections: A game theoretic perspective, IEEE INFOCOM, pp.1485-1493, 2009. ,
Inoculation strategies for victims of viruses and the sum-of-squares partition problem, Journal of Computer and System Sciences, vol.72, issue.6, pp.1077-1093, 2006. ,
DOI : 10.1016/j.jcss.2006.02.003
Network security and contagion, MIT/LIDS intern report, Tech. Rep, 2013. ,
Efficiency of selfish investments in network security, Proceedings of the 3rd international workshop on Economics of networked systems, NetEcon '08, pp.31-36, 2008. ,
DOI : 10.1145/1403027.1403035
Network externalities and the deployment of security features and protocols in the internet, SIGMETRICS. ACM, pp.37-48, 2008. ,
Algorithms for interdependent security games, Advances in Neural Information Processing Systems, 2004. ,
Decentralized Protection Strategies against SIS Epidemics in Networks The N-intertwined SIS epidemic network model, Computing, vol.93, issue.2-4, pp.147-169, 2011. ,
A class of games possessing pure-strategy Nash equilibria, International Journal of Game Theory, vol.2, issue.1, pp.65-67, 1973. ,
DOI : 10.1007/BF01737559
Potential Games, Games and Economic Behavior, vol.14, issue.1, pp.124-143, 1996. ,
DOI : 10.1006/game.1996.0044
When Does Learning in Games Generate Convergence to Nash Equilibria? The Role of Supermodularity in an Experimental Setting, American Economic Review, vol.94, issue.5, pp.1505-1535, 2004. ,
DOI : 10.1257/0002828043052349
A payoff-based learning procedure and its application to traffic games, Games and Economic Behavior, vol.70, issue.1, pp.71-83, 2010. ,
DOI : 10.1016/j.geb.2008.11.012
Basic Hypergeometric Series, ser. Encyclopedia of Mathematics and its Applications, 2004. ,