Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Lachezar Krumov"'
Publikováno v:
International Journal of Information Security and Cybercrime. 8:39-52
Because banks are very often target of a cyber-attack, they have also good security controls in place. This paper analysis modern threats to banks and proposes an approach to detect and visualize the risk of data leakage. In the first part of this pa
Publikováno v:
Understanding Complex Systems ISBN: 9783662472378
Motifs are a general network analysis technique, which statistically relates network structure to epiphenomena on the network. This technique has been developed and brought to maturity in molecular biology, where it has been successfully applied to n
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ff6b4a533045454eac3c000411d86141
https://doi.org/10.1007/978-3-662-47238-5_4
https://doi.org/10.1007/978-3-662-47238-5_4
Autor:
Lachezar Krumov, Marc-Thorsten Hütt, Christoph Fretter, Matthias Müller-Hannemann, Karsten Weihe
Publikováno v:
The European Physical Journal B. 84:535-540
Co-authorship networks, where the nodes are authors and a link indicates joint publications, are very helpful representations for studying the processes that shape the scientific community. At the same time, they are social networks with a large amou
Autor:
Christoph Fretter, Marc-Thorsten Hütt, Matthias Müller-Hannemann, Lachezar Krumov, Karsten Weihe
Publikováno v:
The European Physical Journal B. 77:281-289
Timetable construction belongs to the most important optimization problems in public transport. Finding optimal or near-optimal timetables under the subsidiary conditions of minimizing travel times and other criteria is a targeted contribution to the
Publikováno v:
Distributed Computing and Networking ISBN: 9783642176784
ICDCN
ICDCN
Peer-to-Peer networks are divided into two main classes: unstructured and structured. Overlays from the first class are better suited for exhaustive search, whereas those from the second class offer very efficient key-value lookups. In this paper we
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::83b607591ec91991545ba876141e6163
https://doi.org/10.1007/978-3-642-17679-1_7
https://doi.org/10.1007/978-3-642-17679-1_7
Publikováno v:
ICOIN
Nodes in mobile networks are usually unevenly distributed over space. Several dense clusters of nodes are interconnected by a few nodes in sparsely occupied areas. Removing vital nodes along such bridges would partition the network and severely reduc
Publikováno v:
GLOBECOM
Topology adaptation is a vital operation in tech- nological networks. It is frequently implemented as either an external process or a distributed online optimization that relies on gathering knowledge on the overall state of the system. In this work
Publikováno v:
WOWMOM
High robustness against churn and resilience towards adverse behavior are the key requirements for reliable Peer-to-Peer streaming systems. Their highly inter-dependent nature, based on the cooperative service delivery between all peers, necessitates