{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:15:58Z","timestamp":1750306558959,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":85,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,15]],"date-time":"2014-09-15T00:00:00Z","timestamp":1410739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["FA8750-11-2-0211"],"award-info":[{"award-number":["FA8750-11-2-0211"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","award":["FA8750-11-2-0211"],"award-info":[{"award-number":["FA8750-11-2-0211"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,15]]},"DOI":"10.1145\/2683467.2683468","type":"proceedings-article","created":{"date-parts":[[2015,1,5]],"date-time":"2015-01-05T13:32:15Z","timestamp":1420464735000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Emergent Properties &amp; Security"],"prefix":"10.1145","author":[{"given":"Nathaniel","family":"Husted","sequence":"first","affiliation":[{"name":"Indiana University, Bloomington, IN, USA"}]},{"given":"Steven","family":"Myers","sequence":"additional","affiliation":[{"name":"Indiana University, Bloomington, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,9,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"UDel Models.http:\/\/www.udelmodels.eecis.udel.edu\/ July 2010.  UDel Models.http:\/\/www.udelmodels.eecis.udel.edu\/ July 2010."},{"key":"e_1_3_2_1_2_1","volume-title":"Statistical mechanics of complex networks. Reviews of modern physics, 74(1):47","author":"Albert Reka","year":"2002","unstructured":"Reka Albert and Albert-Laszlo Barabasi . Statistical mechanics of complex networks. Reviews of modern physics, 74(1):47 , 2002 . Reka Albert and Albert-Laszlo Barabasi. Statistical mechanics of complex networks. Reviews of modern physics, 74(1):47, 2002."},{"key":"e_1_3_2_1_3_1","volume-title":"Error and attack tolerance of complex networks. nature, 406(6794):378--382","author":"Albert Reka","year":"2000","unstructured":"Reka Albert , Hawoong Jeong , and Albert-LaszloBarab--asi. Error and attack tolerance of complex networks. nature, 406(6794):378--382 , 2000 . Reka Albert, Hawoong Jeong, and Albert-LaszloBarab--asi. Error and attack tolerance of complex networks. nature, 406(6794):378--382, 2000."},{"key":"e_1_3_2_1_4_1","volume-title":"Use of a taxonomy of security faults","author":"Aslam Taimur","year":"1996","unstructured":"Taimur Aslam , Ivan Krsul , and Eugene H Spafford . Use of a taxonomy of security faults . 1996 . Taimur Aslam, Ivan Krsul, and Eugene H Spafford. Use of a taxonomy of security faults. 1996."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/cplx.20029"},{"key":"e_1_3_2_1_6_1","volume-title":"Emergence of scaling in random networks. science, 286(5439):509--512","author":"Barabasi Albert-Laszlo","year":"1999","unstructured":"Albert-Laszlo Barabasi and Reka Albert . Emergence of scaling in random networks. science, 286(5439):509--512 , 1999 . Albert-Laszlo Barabasi and Reka Albert. Emergence of scaling in random networks. science, 286(5439):509--512, 1999."},{"key":"e_1_3_2_1_7_1","volume-title":"Cities and complexity: understanding cities with cellular automata, agent-based models, and fractals","author":"Batty Michael","year":"2007","unstructured":"Michael Batty . Cities and complexity: understanding cities with cellular automata, agent-based models, and fractals . The MIT press , 2007 . Michael Batty. Cities and complexity: understanding cities with cellular automata, agent-based models, and fractals. The MIT press, 2007."},{"key":"e_1_3_2_1_8_1","volume-title":"Vehicles: Experiments in synthetic psychology","author":"Braitenberg Valentino","year":"1986","unstructured":"Valentino Braitenberg . Vehicles: Experiments in synthetic psychology . MIT press , 1986 . Valentino Braitenberg. Vehicles: Experiments in synthetic psychology. MIT press, 1986."},{"key":"e_1_3_2_1_9_1","first-page":"19","volume-title":"Compartmental models in epidemiology. Mathematical epidemiology","author":"Brauer F.","year":"2008","unstructured":"F. Brauer . Compartmental models in epidemiology. Mathematical epidemiology , pages 19 -- 79 , 2008 . F. Brauer. Compartmental models in epidemiology. Mathematical epidemiology, pages 19--79, 2008."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.43"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.SIMUTOOLS2009.5652"},{"key":"e_1_3_2_1_12_1","volume-title":"Systems thinking, systems practice: includes a 30-year retrospective","author":"Checkland Peter","year":"1999","unstructured":"Peter Checkland . Systems thinking, systems practice: includes a 30-year retrospective . 1999 . Peter Checkland. Systems thinking, systems practice: includes a 30-year retrospective. 1999."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2009.090615"},{"key":"e_1_3_2_1_14_1","first-page":"2003","article-title":"An extensible framework for agent simulation","volume":"36","author":"Collier Nick","year":"2003","unstructured":"Nick Collier . Repast : An extensible framework for agent simulation . The University of Chicago's Social Science Research , 36 : 2003 , 2003 . Nick Collier. Repast: An extensible framework for agent simulation. The University of Chicago's Social Science Research, 36:2003, 2003.","journal-title":"The University of Chicago's Social Science Research"},{"issue":"4","key":"e_1_3_2_1_15_1","first-page":"4","article-title":"The game of life","volume":"223","author":"Conway John","year":"1970","unstructured":"John Conway . The game of life . Scientific American , 223 ( 4 ): 4 , 1970 . John Conway. The game of life. Scientific American, 223(4):4, 1970.","journal-title":"Scientific American"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2789(94)90273-9"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11537-007-0647-x"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1023788"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","DOI":"10.1201\/9781420011449","volume-title":"Fundamentals of natural computing: basic concepts, algorithms, and applications","author":"De Castro Leandro Nunes","year":"2006","unstructured":"Leandro Nunes De Castro . Fundamentals of natural computing: basic concepts, algorithms, and applications . CRC Press , 2006 . Leandro Nunes De Castro. Fundamentals of natural computing: basic concepts, algorithms, and applications. CRC Press, 2006."},{"key":"e_1_3_2_1_20_1","first-page":"77","volume-title":"Emergence versusself-organisation: Different concepts but promising when combined. Engineering self-organising systems","author":"De Wolf T.","year":"2005","unstructured":"T. De Wolf and T. Holvoet . Emergence versusself-organisation: Different concepts but promising when combined. Engineering self-organising systems , pages 77 -- 91 , 2005 . T. De Wolf and T. Holvoet. Emergence versusself-organisation: Different concepts but promising when combined. Engineering self-organising systems, pages 77--91, 2005."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/361179.361202"},{"key":"e_1_3_2_1_22_1","volume-title":"DTIC Document","author":"Dingledine Roger","year":"2004","unstructured":"Roger Dingledine , Nick Mathewson , and Paul Syverson . Tor : The second-generation onion router. Technical report , DTIC Document , 2004 . Roger Dingledine, Nick Mathewson, and Paul Syverson. Tor: The second-generation onion router. Technical report, DTIC Document, 2004."},{"key":"e_1_3_2_1_23_1","first-page":"36","volume-title":"Encyclopedia of Machine Learning","author":"Dorigo Marco","year":"2010","unstructured":"Marco Dorigo and Mauro Birattari . Ant colony optimization . In Encyclopedia of Machine Learning , pages 36 -- 39 . Springer , 2010 . Marco Dorigo and Mauro Birattari. Ant colony optimization. In Encyclopedia of Machine Learning, pages 36--39. Springer, 2010."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/261181"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-0526(199905\/06)4:5<41::AID-CPLX9>3.0.CO;2-F"},{"key":"e_1_3_2_1_26_1","volume-title":"Generative social science: Studies in agent-based computational modeling","author":"Epstein Joshua M","year":"2006","unstructured":"Joshua M Epstein . Generative social science: Studies in agent-based computational modeling . Princeton University Press , 2006 . Joshua M Epstein. Generative social science: Studies in agent-based computational modeling. Princeton University Press, 2006."},{"key":"e_1_3_2_1_27_1","volume-title":"HBR Blog Network","author":"Forrest S.","year":"2013","unstructured":"S. Forrest , S. Hofmeyr , and B. Edwards . The complex science of cyber defense . HBR Blog Network , Jun 2013 . S. Forrest, S. Hofmeyr, and B. Edwards. The complex science of cyber defense. HBR Blog Network, Jun 2013."},{"key":"e_1_3_2_1_28_1","volume-title":"A sense of self for unix processes. sp, page 0120","author":"Forrest S.","year":"1996","unstructured":"S. Forrest , S.A. Hofmeyr , A. Somayaji , and T.A. Longstaff . A sense of self for unix processes. sp, page 0120 , 1996 . S. Forrest, S.A. Hofmeyr, A. Somayaji, and T.A. Longstaff. A sense of self for unix processes. sp, page 0120, 1996."},{"key":"e_1_3_2_1_29_1","first-page":"369","article-title":"Engineering an immune system","volume":"4","author":"Forrest Stephanie","year":"2001","unstructured":"Stephanie Forrest and Steven Hofmeyr . Engineering an immune system . GRAFT-GEORGETOWN- , 4 : 369 -- 369 , 2001 . Stephanie Forrest and Steven Hofmeyr. Engineering an immune system. GRAFT-GEORGETOWN-, 4:369--369, 2001.","journal-title":"GRAFT-GEORGETOWN-"},{"key":"e_1_3_2_1_30_1","volume-title":"Ten questions about emergence. arXiv preprint nlin\/0509049","author":"Fromm Jochen","year":"2005","unstructured":"Jochen Fromm . Ten questions about emergence. arXiv preprint nlin\/0509049 , 2005 . Jochen Fromm. Ten questions about emergence. arXiv preprint nlin\/0509049, 2005."},{"key":"e_1_3_2_1_31_1","volume-title":"Types and forms of emergence. arXiv preprint nlin\/0506028","author":"Fromm Jochen","year":"2005","unstructured":"Jochen Fromm . Types and forms of emergence. arXiv preprint nlin\/0506028 , 2005 . Jochen Fromm. Types and forms of emergence. arXiv preprint nlin\/0506028, 2005."},{"key":"e_1_3_2_1_32_1","volume-title":"On engineering and emergence. arXiv preprint nlin\/0601002","author":"Fromm Jochen","year":"2006","unstructured":"Jochen Fromm . On engineering and emergence. arXiv preprint nlin\/0601002 , 2006 . Jochen Fromm. On engineering and emergence. arXiv preprint nlin\/0601002, 2006."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/357195.357200"},{"key":"e_1_3_2_1_34_1","volume-title":"Sage Publications","author":"Gilbert Nigel","year":"2007","unstructured":"Nigel Gilbert . Agent-based models. Number 7 . Sage Publications , Incorporated , 2007 . Nigel Gilbert. Agent-based models. Number 7. Sage Publications, Incorporated, 2007."},{"key":"e_1_3_2_1_35_1","volume-title":"Genetic algorithms in search, optimization and machine learning","author":"Goldberg David E","year":"1989","unstructured":"David E Goldberg . Genetic algorithms in search, optimization and machine learning . 1989 . David E Goldberg. Genetic algorithms in search, optimization and machine learning. 1989."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.1994.0108"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/331524.331529"},{"issue":"2","key":"e_1_3_2_1_38_1","first-page":"1439","article-title":"Takagi-sugeno fuzzy model of nonlinear hiv dynamics: Chebyshev-series approach integrated with genetic algorithm","volume":"8","author":"Ho Wen-Hsien","year":"2012","unstructured":"Wen-Hsien Ho . Takagi-sugeno fuzzy model of nonlinear hiv dynamics: Chebyshev-series approach integrated with genetic algorithm . International Journal of Innovative Computing Information and Control , 8 ( 2 ): 1439 -- 1451 , 2012 . Wen-Hsien Ho. Takagi-sugeno fuzzy model of nonlinear hiv dynamics: Chebyshev-series approach integrated with genetic algorithm. International Journal of Innovative Computing Information and Control, 8(2):1439--1451, 2012.","journal-title":"International Journal of Innovative Computing Information and Control"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-444-52076-0.50001-8"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/0893-6080(89)90020-8"},{"key":"e_1_3_2_1_41_1","volume-title":"Sandia National Laboratories","author":"Howard John D","year":"1998","unstructured":"John D Howard and Thomas A Longstaff . A common language for computer security incidents . Sandia National Laboratories , 1998 . John D Howard and Thomas A Longstaff. A common language for computer security incidents. Sandia National Laboratories, 1998."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0811973106"},{"key":"e_1_3_2_1_43_1","unstructured":"N. Husted. ANALYSIS TECHNIQUES FOR EXPLORING EMERGENT VULNERABILITIES AND ATTACKS ON MOBILE DEVICES.  N. Husted. ANALYSIS TECHNIQUES FOR EXPLORING EMERGENT VULNERABILITIES AND ATTACKS ON MOBILE DEVICES."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866318"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/1972441.1972451"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican1106-70"},{"key":"e_1_3_2_1_47_1","volume-title":"Oneworld","author":"Johnson N.F.","year":"2010","unstructured":"N.F. Johnson . Simply Complexity : A clear guide to complexity theory . Oneworld , 2010 . N.F. Johnson. Simply Complexity: A clear guide to complexity theory. Oneworld, 2010."},{"key":"e_1_3_2_1_48_1","volume-title":"Fire Safety Engineering and Systems Safety","author":"Jonsson Henrik","year":"2007","unstructured":"Henrik Jonsson . Risk and vulnerability analysis of complex systems: A basis for proactive emergency management . Fire Safety Engineering and Systems Safety , 2007 . Henrik Jonsson. Risk and vulnerability analysis of complex systems: A basis for proactive emergency management. Fire Safety Engineering and Systems Safety, 2007."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-1331-5","volume-title":"Facets of systems science","author":"Klir G.J.","year":"2001","unstructured":"G.J. Klir . Facets of systems science , volume 15 . Springer , 2001 . G.J. Klir. Facets of systems science, volume 15. Springer, 2001."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_3_2_1_52_1","volume-title":"Engineering a safer world: Systems thinking applied to safety","author":"Leveson Nancy","year":"2011","unstructured":"Nancy Leveson . Engineering a safer world: Systems thinking applied to safety . Mit Press , 2011 . Nancy Leveson. Engineering a safer world: Systems thinking applied to safety. Mit Press, 2011."},{"key":"e_1_3_2_1_53_1","volume-title":"Thought contagion: How belief spreads through society","author":"Lynch Aaron","year":"2008","unstructured":"Aaron Lynch . Thought contagion: How belief spreads through society . Basic Books , 2008 . Aaron Lynch. Thought contagion: How belief spreads through society. Basic Books, 2008."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"Eden Medina. Cybernetic Revolutionaries. MIT Press 2011.  Eden Medina. Cybernetic Revolutionaries. MIT Press 2011.","DOI":"10.7551\/mitpress\/8417.001.0001"},{"key":"e_1_3_2_1_55_1","unstructured":"Robert Meushaw and Carl Landwehr. Nsa initiatives in cybersecurity sciencej. http:\/\/www.nsa.gov\/research\/tnw\/tnw194\/articles\/pdfs\/TNW194_ article4.pdf .  Robert Meushaw and Carl Landwehr. Nsa initiatives in cybersecurity sciencej. http:\/\/www.nsa.gov\/research\/tnw\/tnw194\/articles\/pdfs\/TNW194_ article4.pdf ."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.132"},{"key":"e_1_3_2_1_58_1","volume-title":"Epidemic spreading in scale-free networks. Physical review letters, 86(14):3200","author":"Pastor-Satorras Romualdo","year":"2001","unstructured":"Romualdo Pastor-Satorras and Alessandro Vespignani . Epidemic spreading in scale-free networks. Physical review letters, 86(14):3200 , 2001 . Romualdo Pastor-Satorras and Alessandro Vespignani. Epidemic spreading in scale-free networks. Physical review letters, 86(14):3200, 2001."},{"issue":"11","key":"e_1_3_2_1_59_1","first-page":"1823","article-title":"black swans\" and \"perfect storms","volume":"32","author":"Pate-Cornell Elisabeth","year":"2012","unstructured":"Elisabeth Pate-Cornell . On \" black swans\" and \"perfect storms \": Risk analysis and management when statistics are not enough. Risk analysis , 32 ( 11 ): 1823 -- 1833 , 2012 . Elisabeth Pate-Cornell. On \"black swans\" and \"perfect storms\": Risk analysis and management when statistics are not enough. Risk analysis, 32(11):1823--1833, 2012.","journal-title":"Risk analysis"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/322186.322188"},{"key":"e_1_3_2_1_61_1","volume-title":"Attacks by \"anonymous\" wikileaks proponents not anonymous","author":"Pras Aiko","year":"2010","unstructured":"Aiko Pras , Anna Sperotto , Giovane Moura , Idilio Drago , Rafael Barbosa , Ramin Sadre , Ricardo Schmidt , and Rick Hofstede . Attacks by \"anonymous\" wikileaks proponents not anonymous . 2010 . Aiko Pras, Anna Sperotto, Giovane Moura, Idilio Drago, Rafael Barbosa, Ramin Sadre, Ricardo Schmidt, and Rick Hofstede. Attacks by \"anonymous\" wikileaks proponents not anonymous. 2010."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1002\/cplx.v15:1"},{"key":"e_1_3_2_1_63_1","volume-title":"Modern epidemiology","author":"Rothman Kenneth J","year":"2008","unstructured":"Kenneth J Rothman , Sander Greenland , and Timothy L Lash . Modern epidemiology . Lippincott Williams & Wilkins , 2008 . Kenneth J Rothman, Sander Greenland, and Timothy L Lash. Modern epidemiology. Lippincott Williams & Wilkins, 2008."},{"key":"e_1_3_2_1_64_1","unstructured":"John Rushby. On emergent misbehavior. http:\/\/www.csl.sri.com\/users\/rushby\/slides\/emergentm12.pdf 2012.  John Rushby. On emergent misbehavior. http:\/\/www.csl.sri.com\/users\/rushby\/slides\/emergentm12.pdf 2012."},{"key":"e_1_3_2_1_65_1","volume-title":"Irrational exuberance","author":"Shiller Robert J","year":"2005","unstructured":"Robert J Shiller . Irrational exuberance . Random House LLC , 2005 . Robert J Shiller. Irrational exuberance. Random House LLC, 2005."},{"key":"e_1_3_2_1_66_1","volume-title":"Threat Modeling: Designing for Security","author":"Shostack Adam","year":"2014","unstructured":"Adam Shostack . Threat Modeling: Designing for Security . John Wiley & Sons , 2014 . Adam Shostack. Threat Modeling: Designing for Security. John Wiley & Sons, 2014."},{"key":"e_1_3_2_1_67_1","volume-title":"black swans and the prediction of crises. arXiv preprint arXiv:0907.4290","author":"Sornette Didier","year":"2009","unstructured":"Didier Sornette . Dragon-kings , black swans and the prediction of crises. arXiv preprint arXiv:0907.4290 , 2009 . Didier Sornette. Dragon-kings, black swans and the prediction of crises. arXiv preprint arXiv:0907.4290, 2009."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1140\/epjst\/e2012-01559-5"},{"key":"e_1_3_2_1_69_1","volume-title":"System dynamics modeling: Tools for learning in a complex world. California management review, 43(4)","author":"Sterman John D","year":"2001","unstructured":"John D Sterman . System dynamics modeling: Tools for learning in a complex world. California management review, 43(4) , 2001 . John D Sterman. System dynamics modeling: Tools for learning in a complex world. California management review, 43(4), 2001."},{"key":"e_1_3_2_1_70_1","volume-title":"Jacobellis v ohio. US Rep, 378:184","author":"Stewart P","year":"1964","unstructured":"P Stewart . Jacobellis v ohio. US Rep, 378:184 , 1964 . P Stewart. Jacobellis v ohio. US Rep, 378:184, 1964."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179542.1179545"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1198\/000313007X219996"},{"key":"e_1_3_2_1_73_1","volume-title":"The black swan: The impact of the highly improbable","author":"Taleb Nassim Nicholas","year":"2010","unstructured":"Nassim Nicholas Taleb . The black swan: The impact of the highly improbable . Random House Trade Paperbacks , 2010 . Nassim Nicholas Taleb. The black swan: The impact of the highly improbable. Random House Trade Paperbacks, 2010."},{"key":"e_1_3_2_1_74_1","first-page":"16","volume-title":"International Conference on Complex Systems","author":"Tisue Seth","year":"2004","unstructured":"Seth Tisue and Uri Wilensky . Netlogo : A simple environment for modeling complexity . In International Conference on Complex Systems , pages 16 -- 21 , 2004 . Seth Tisue and Uri Wilensky. Netlogo: A simple environment for modeling complexity. In International Conference on Complex Systems, pages 16--21, 2004."},{"key":"e_1_3_2_1_75_1","first-page":"674","volume-title":"The sources and consequences of embeddedness for the economic performance of organizations: The network e ect. American sociological review","author":"Uzzi Brian","year":"1996","unstructured":"Brian Uzzi . The sources and consequences of embeddedness for the economic performance of organizations: The network e ect. American sociological review , pages 674 -- 698 , 1996 . Brian Uzzi. The sources and consequences of embeddedness for the economic performance of organizations: The network e ect. American sociological review, pages 674--698, 1996."},{"key":"e_1_3_2_1_76_1","volume-title":"Agent-based modelling of socio-technical systems","author":"van Dam Koen H","year":"2012","unstructured":"Koen H van Dam , Igor Nikolic , and Zofia Lukszo . Agent-based modelling of socio-technical systems , volume 9 . Springer , 2012 . Koen H van Dam, Igor Nikolic, and Zofia Lukszo. Agent-based modelling of socio-technical systems, volume 9. Springer, 2012."},{"key":"e_1_3_2_1_77_1","unstructured":"Nart Villeneuve Jessa dela Torre and David Sancho. Asprox reborn. http:\/\/www.trendmicro.com\/media\/wp\/asprox-reborn-whitepaper-en.pdf .  Nart Villeneuve Jessa dela Torre and David Sancho. Asprox reborn. http:\/\/www.trendmicro.com\/media\/wp\/asprox-reborn-whitepaper-en.pdf ."},{"key":"e_1_3_2_1_78_1","volume-title":"On the robustness of the botnet topology formed by worm infection","author":"Wang Qian","year":"2010","unstructured":"Qian Wang , Zesheng Chen , Chao Chen , and Niki Pissinou . On the robustness of the botnet topology formed by worm infection , 2010 . Qian Wang, Zesheng Chen, Chao Chen, and Niki Pissinou. On the robustness of the botnet topology formed by worm infection, 2010."},{"key":"e_1_3_2_1_79_1","volume-title":"Detecting intrusions using system calls: Alternative data models. sp, page 0133","author":"Warrender C.","year":"1999","unstructured":"C. Warrender , S. Forrest , and B. Pearlmutter . Detecting intrusions using system calls: Alternative data models. sp, page 0133 , 1999 . C. Warrender, S. Forrest, and B. Pearlmutter. Detecting intrusions using system calls: Alternative data models. sp, page 0133, 1999."},{"key":"e_1_3_2_1_80_1","volume-title":"Collective dynamics of small-world networks. nature, 393(6684):440--442","author":"Watts Duncan J","year":"1998","unstructured":"Duncan J Watts and Steven H Strogatz . Collective dynamics of small-world networks. nature, 393(6684):440--442 , 1998 . Duncan J Watts and Steven H Strogatz. Collective dynamics of small-world networks. nature, 393(6684):440--442, 1998."},{"key":"e_1_3_2_1_81_1","volume-title":"Statistical mechanics of cellular automata. Reviews of modern physics, 55(3):601","author":"Wolfram Stephen","year":"1983","unstructured":"Stephen Wolfram . Statistical mechanics of cellular automata. Reviews of modern physics, 55(3):601 , 1983 . Stephen Wolfram. Statistical mechanics of cellular automata. Reviews of modern physics, 55(3):601, 1983."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1229294"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2530277"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556938"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-011-9285-z"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586130"}],"event":{"name":"NSPW '14: New Security Paradigms Workshop","sponsor":["ACSA Applied Computing Security Assoc"],"location":"Victoria British Columbia Canada","acronym":"NSPW '14"},"container-title":["Proceedings of the 2014 New Security Paradigms Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2683467.2683468","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2683467.2683468","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:59Z","timestamp":1750227179000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2683467.2683468"}},"subtitle":["The Complexity ofSecurity as a Science"],"short-title":[],"issued":{"date-parts":[[2014,9,15]]},"references-count":85,"alternative-id":["10.1145\/2683467.2683468","10.1145\/2683467"],"URL":"https:\/\/doi.org\/10.1145\/2683467.2683468","relation":{},"subject":[],"published":{"date-parts":[[2014,9,15]]},"assertion":[{"value":"2014-09-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}