Zipf, Power-laws and Pareto -a ranking tutorial, 2002. ,
On optimal placement of intrusion detection modules in sensor networks, First International Conference on Broadband Networks, pp.690-699, 2004. ,
DOI : 10.1109/BROADNETS.2004.52
Bonjour for developers, https://developer.apple.com/bonjour/index.html, [Online, 2014. ,
Worm propagation strategies in an IPv6 Internet, pp.70-76, 2006. ,
Finding good approximate vertex and edge partitions is NP-hard, Information Processing Letters, vol.42, issue.3, pp.153-159, 1992. ,
DOI : 10.1016/0020-0190(92)90140-Q
Node removal vulnerability of the largest component of a network, 2013 IEEE Global Conference on Signal and Information Processing, 1403. ,
DOI : 10.1109/GlobalSIP.2013.6736946
Rfc 5157: Ipv6 implications for network scanning, Internet Engineering Task Force (IETF) RFC, 2008. ,
DOI : 10.17487/rfc5157
Power-Law Distributions in Empirical Data, SIAM Review, vol.51, issue.4, pp.661-703, 2009. ,
DOI : 10.1137/070710111
URL : http://arxiv.org/pdf/0706.1062
Breakdown of the Internet under Intentional Attack, Physical Review Letters, vol.7, issue.16, pp.3682-3685, 2001. ,
DOI : 10.1017/S0963548398003526
Ipv6 and ipv4 threat comparison and best-practice evaluation , http://www.cisco.com/web/about/security/security services/ciag/documents/v6- v4-threats.pdf, [Online, 2014. ,
The markov chain simulation method for generating connected power law random graphs, Proc. 5th Workshop on Algorithm Engineering and Experiments (ALENEX, 2003. ,
On Realizability of a Set of Integers as Degrees of the Vertices of a Linear Graph. I, Journal of the Society for Industrial and Applied Mathematics, vol.10, issue.3, pp.496-506, 1962. ,
DOI : 10.1137/0110037
A remark on the existence of finite graphs, Casopis Pest. Mat, vol.80, pp.477-480, 1955. ,
Using the Private-Internet-Enterprise (PIE) Model to Examine IT Risks and Threats Due to Porous Perimeters, Information Security Journal: A Global Perspective, vol.14, issue.4, pp.163-169, 2009. ,
DOI : 10.1504/IJSS.2006.009755
Towards a Theory of Scale-Free Graphs: Definition, Properties, and Implications, Internet Mathematics, vol.2, issue.4, pp.431-523, 2005. ,
DOI : 10.1080/15427951.2005.10129111
Immunization and epidemic dynamics in complex networks, The European Physical Journal B - Condensed Matter, vol.38, issue.2, pp.269-276, 2004. ,
DOI : 10.1140/epjb/e2004-00119-8
URL : http://www.wisdom.weizmann.ac.il/~recohen/publications/epi.ps.gz
Using Network Tainting to Bound the Scope of Network Ingress Attacks, 2014 Eighth International Conference on Software Security and Reliability, pp.206-215, 2014. ,
DOI : 10.1109/SERE.2014.34
Mixing patterns in networks, Physical Review E, vol.42, issue.2, p.26126, 2003. ,
DOI : 10.1137/S0036144500371907
URL : http://arxiv.org/pdf/cond-mat/0209450
Efficient immunization strategies on complex networks, Journal of Theoretical Biology, vol.264, issue.1, pp.77-83, 2010. ,
DOI : 10.1016/j.jtbi.2010.01.007
Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs, Journal of Network and Systems Management, vol.45, issue.4, pp.259-275, 2008. ,
DOI : 10.1007/s10922-008-9109-x
Immunization of complex networks, Physical Review E, vol.292, issue.3, p.36104, 2002. ,
DOI : 10.1126/science.1061076
Identifying Critical Attack Assets in Dependency Attack Graphs, Proc. of the 13th European Symposium on Research in Computer Security: Computer Security, pp.18-3408, 2008. ,
DOI : 10.1007/978-3-540-85933-8_7
URL : http://cis.ksu.edu/~xou/publications/esorics08.pdf
Suppressing epidemics with a limited amount of immunization units, Physical Review E, vol.5, issue.6, p.61911, 2011. ,
DOI : 10.1002/rsa.3240060204
A Deployment Value Model for Intrusion Detection Sensors, Advances in Information Security and Assurance, pp.250-259, 2009. ,
DOI : 10.1109/SECPRI.2002.1004377
URL : http://www-users.cs.york.ac.uk/~jac/PublishedPapers/DeploymentValue.pdf
Monitor placement for largescale systems, Proc. of the 19th ACM Symposium on Access Control Models and Technologies, pp.29-40, 2014. ,
DOI : 10.1145/2613087.2613107
URL : http://people.cs.uchicago.edu/~teutsch/papers/SACMAT_2014.pdf
Using Security Policies to Automate Placement of Network Intrusion Prevention, Engineering Secure Software and Systems, pp.17-32, 2013. ,
DOI : 10.1007/978-3-642-36563-8_2
On the Vulnerability of Large Graphs, 2010 IEEE International Conference on Data Mining, pp.1091-1096, 2010. ,
DOI : 10.1109/ICDM.2010.54