نتایج جستجو برای: interdependent security
تعداد نتایج: 185170 فیلتر نتایج به سال:
Interdependent networks is no longer a new term: it has already become a part of day-to-day life of the society. Therefore, it is paramount to assess the resilience of such complex interdependency in networks. Besides considering the usual unidirectional and bidirectional links among the interdependent networks, weights of links also impose realistic constraints for accurate network performance...
Two stochastic models are proposed to generate a system composed of two interdependent scale-free (SF) or Erdős-Rényi (ER) networks where interdependent nodes are connected with exponential or power-law relation, as well as different dependence strength, respectively. Each subnetwork grows through the addition of new nodes with constant accelerating random attachment in the first model but with...
This study explores how health care organizations mitigate risks due to infrastructure interdependencies using the information systems success framework. Specifically, this study examines whether interdependent risks affect information infrastructure effectiveness and, if so, what are the critical factors? How are interdependent risks mitigated by those factors across stakeholders? And how does...
Encryption and signature schemes based on worst-case lattice problems are promising candidates for the post-quantum era, where classic number-theoretic assumptions are rendered false. Although there have been many important results and breakthroughs in lattice cryptography, the questions of how to systematically evaluate their security in practice and how to choose secure parameters are still o...
We study the robustness of interdependent networks where two networks are said to be interdependent if the operation of one network depends on the operation of the other one, and vice versa. In this paper, we propose a model for analyzing bidirectional interdependent networks with known topology. We define the metric MR(D) to be the minimum number of nodes that should be removed from one networ...
When an initial failure of nodes occurs in interdependent networks, a cascade of failure between the networks occurs. Earlier studies focused on random initial failures. Here we study the robustness of interdependent networks under targeted attack on high or low degree nodes. We introduce a general technique which maps the targeted-attack problem in interdependent networks to the random-attack ...
The practice of third-party applications (social apps) on social networks sites (SNSs) to collect information about users’ friends has raised awareness of the problem known as interdependent privacy. Although studies have quantified the value which app users place on their friends’ personal information, i.e., interdependent privacy value, few have investigated factors that affect the valuation ...
With its global reach and pervasiveness, the Internet enables individuals to be more connected through electronic linkages than ever before. In such a highly inter-dependent network, individual behaviors can have far-reaching consequences that transcend borders between people, organizations and nations. Because home computer users represent a weak link in securing cyberspace, it is critical tha...
We develop a theory of representation of interdependent preferences that re ̄ect the widely acknowledged phenomenon of keeping up with the Joneses (i.e. of those preferences which maintain that well-being depend on ``relative standing'' in the society as well as on material consumption). The principal ingredient of our analysis is the assumption that individuals desire to occupy a (subjectively)...
Recovery of interdependent infrastructure networks in the presence of catastrophic failure is crucial to the economy and welfare of society. Recently, centralized methods have been developed to address optimal resource allocation in postdisaster recovery scenarios of interdependent infrastructure systems that minimize total cost. In real-world systems, however, multiple independent, possibly no...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید