Skip to main content

Showing 1–3 of 3 results for author: Gorman, S P

Searching in archive cond-mat. Search in all archives.
.
  1. arXiv:cond-mat/0401017  [pdf

    cond-mat.dis-nn cond-mat.stat-mech

    A Predator Prey Approach to Diversity Based Defenses in Heterogeneous Networks

    Authors: Sean P. Gorman, Rajendra G. Kulkarni, Laurie A. Schintler, Roger R. Stough

    Abstract: In light of the rise of malicious attacks on the Internet, and the various networks and applications attached to it, new approaches towards modeling predatory activity in networks could be useful. Past research has simulated networks assuming that all vertices are homogenously susceptible to attack or infection. Often times in real world networks only subsets of vertices are susceptible to attac… ▽ More

    Submitted 2 January, 2004; originally announced January 2004.

    Comments: 11 pages, 7 figures, WISICT 2004

  2. arXiv:cond-mat/0310426  [pdf

    cond-mat.dis-nn

    Spatial Small Worlds: New Geographic Patterns for an Information Economy

    Authors: Sean P. Gorman, Rajendra Kulkarni

    Abstract: Networks are structures that pervade many natural and man-made phenomena. Recent findings have characterized many networks as not random structures, but as efficent complex formations. Current research has examined complex networks as largely non-spatial phenomena. Location, distance, and geograhpy, though, are vital aspects of a wide variety of networks. This paper will examine the United State… ▽ More

    Submitted 17 October, 2003; originally announced October 2003.

    Comments: 55 pages, 11 figures, forthcoming in Environment and Planning B

  3. arXiv:cond-mat/0306002  [pdf

    cond-mat.dis-nn

    Least Effort Strategies for Cybersecurity

    Authors: Sean P. Gorman, Rajendra G. Kulkarni, Laurie A. Schintler, Roger R. Stough

    Abstract: Cybersecurity is an issue of increasing concern since the events of September 11th. Many questions have been raised concerning the security of the Internet and the rest of the US's information infrastructure. This paper begins to examine the issue by analyzing the Internet's autonomous system (AS) map. Using the AS map, malicious infections are simulated and different defense strategies are cons… ▽ More

    Submitted 24 July, 2003; v1 submitted 30 May, 2003; originally announced June 2003.

    Comments: 15 pages, 6 figures