Investigating the effect of node heterogeneity and network externality on security adoption.
Zichao YangJohn C. S. LuiPublished in: SIGMETRICS Perform. Evaluation Rev. (2011)
Keyphrases
- network management
- malicious nodes
- security protection
- security measures
- network nodes
- access control
- intrusion detection
- application level
- information security
- neighboring nodes
- security issues
- overlapping communities
- virtual private network
- wireless sensor networks
- network security
- computer networks
- network traffic
- security requirements
- enterprise network
- network structure
- security threats
- network layer
- peer to peer
- buffer overflow
- intrusion detection and prevention
- information technology
- user friendliness
- intermediate nodes
- key management
- security policies
- complex networks
- anomaly detection
- mobile devices