1.
Attack, Defence, and Contagion in Networks
by Goyal, S.
The Review of economic studies, 2014, Vol.81 (4 (289)), p.1518-1542

2.
Correlated Failures, Diversification, and Information Security Risk Management
by Chen, Pei-yu
MIS quarterly, 2011, Vol.35 (2), p.397-422

4.
Optimizing Automated AFLP Scoring Parameters to Improve Phylogenetic Resolution
by Holland, Barbara R.
Systematic biology, 2008, Vol.57 (3), p.347-366

5.
DAILY TRENDS AND ORIGIN OF COMPUTER-FOCUSED CRIMES AGAINST A LARGE UNIVERSITY COMPUTER NETWORK: An Application of the Routine-Activities and Lifestyle Perspective
by Maimon, D.
British journal of criminology, 2013, Vol.53 (2), p.319-343

6.
Evaluating Intraspecific “Network” Construction Methods Using Simulated Sequence Data: Do Existing Algorithms Outperform the Global Maximum Parsimony Approach?
by Cassens, Insa
Systematic biology, 2005, Vol.54 (3), p.363-372

7.
Trees of Trees: An Approach to Comparing Multiple Alternative Phylogenies
by Nye, Tom M. W.
Systematic biology, 2008, Vol.57 (5), p.785-794

8.
Application of Wireless Sensor Networks for Indoor Temperature Regulation
by Risteska Stojkoska, Biljana
International journal of distributed sensor networks, 2014, Vol.10 (5), p.502419

9.
Motivating students’ participation in a computer networks course by means of magic, drama and games
by Hilas, Constantinos S
SpringerPlus, 2014, Vol.3 (1), p.362-362

10.
An Intuitive, Informative, and Most Balanced Representation of Phylogenetic Topologies
by Iwasaki, Wataru
Systematic biology, 2010, Vol.59 (5), p.584-593

11.
Adaptive multi-polling scheduler for QoS support of video transmission in IEEE 802.11e WLANs
by Al-Maqri, Mohammed A
Telecommunication systems, 2015, Vol.61 (4), p.773-791

12.
A RECURRENT SOLUTION OF PH/M/c/N-LIKE AND PH/M/c-LIKE QUEUES
by Brandwajn, Alexandre
Journal of applied probability, 2012, Vol.49 (1), p.84-99

13.
Efficient and secure routing protocol for wireless sensor networks through optimal power control and optimal handoff-based recovery mechanism
by Ganesh, S
Journal of Computer Systems, Networks, and Communications, 2012

14.
EXACT-ORDER ASYMPTOTIC ANALYSIS FOR CLOSED QUEUEING NETWORKS
by George, David K.
Journal of applied probability, 2012, Vol.49 (2), p.503-520

15.
Connectivity Measures for Internet Topologies on the Level of Autonomous Systems
by Erlebach, Thomas
Operations research, 2009, Vol.57 (4), p.1006-1025

16.
Using Computers to Realize Joint Gains in Negotiations: Toward an "Electronic Bargaining Table"
by Rangaswamy, Arvind
Management science, 1997, Vol.43 (8), p.1147-1163

17.
Networked Multimedia and Foreign Language Education
by Peter J. Yang
CALICO journal, 1998, Vol.15 (1/3), p.75-88

18.
Energy Sensing and Monitoring Framework with an Integrated Communication Backbone in the Energy Efficient Intelligent Buildings
by Pan, Jian Li
Applied Mechanics and Materials, 2013, Vol.303-306, p.1460-1464

19.
Nodes Localization in 3D Wireless Sensor Networks Based on Multidimensional Scaling Algorithm
by Risteska Stojkoska, Biljana
International scholarly research notices, 2014, Vol.2014, p.845027-10

20.
Techtalk: Cloud Computing and Developmental Education
by Douglas R. Holschuh
Journal of developmental education, 2010, Vol.33 (3), p.36-37
