Predicting Lifetime of Dynamical Networks Experiencing Persistent Random Attacks

نویسندگان

  • Boris Podobnik
  • T. Lipic
  • Davor Horvatic
  • Antonio Derek Majdandzic
  • S. Bishop
  • H. Eugene Stanley
چکیده

B. Podobnik, 2, 3, 4 T. Lipic, D. Horvatic, A. Majdandzic, S. Bishop, and H. E. Stanley Faculty of Civil Engineering, University of Rijeka, 51000 Rijeka, Croatia Department of Physics, Boston University, Boston, MA 02215, USA Zagreb School of Economics and Management, 10000 Zagreb, Croatia Faculty of Economics, University of Ljubljana, 1000 Ljubljana, Slovenia Rudjer Boskovic Institute, 10000 Zagreb, Croatia Physics Department, University of Zagreb, Croatia Department of Mathematics, UCL, Gower Street, London,WC1E 6BT, UK

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Predicting the Lifetime of Dynamic Networks Experiencing Persistent Random Attacks

Estimating the critical points at which complex systems abruptly flip from one state to another is one of the remaining challenges in network science. Due to lack of knowledge about the underlying stochastic processes controlling critical transitions, it is widely considered difficult to determine the location of critical points for real-world networks, and it is even more difficult to predict ...

متن کامل

A Secure Routing Algorithm for Underwater Wireless Sensor Networks

Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...

متن کامل

Random Key Pre-Distribution Techniques against Sybil Attacks

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...

متن کامل

An Adaptive LEACH-based Clustering Algorithm for Wireless Sensor Networks

LEACH is the most popular clastering algorithm in Wireless Sensor Networks (WSNs). However, it has two main drawbacks, including random selection of cluster heads, and direct communication of cluster heads with the sink. This paper aims to introduce a new centralized cluster-based routing protocol named LEACH-AEC (LEACH with Adaptive Energy Consumption), which guarantees to generate balanced cl...

متن کامل

تجربه بیش‌مصرف غیرکشنده مواد در دوران زندگی در سوءمصرف‌کنندگان مواد در ایران

Objectives: The present study was carried out with the purpose of investigating lifetime non-fatal overdose of illicit addictive substances, its relationship with demographic characteristics, and pattern of abuse in individuals with substance dependency. Method: In a descriptive study, data were gathered from 29 provinces in Iran from May to September 2008. Addicted individuals were interviewed...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1407.0952  شماره 

صفحات  -

تاریخ انتشار 2014