Vulnerabilities represent one of the main weaknesses of IT systems and the availability of consolidated official data, like CVE (Common Vulnerabilities and Exposures), allows for using them to compute the paths an attacker is likely to follow. However, even if patches are available, business...
01a Articolo in rivista
-
-
-
-
-
-
-
In this paper we show how to solve the Maximum Weight Stable Set Problem in a claw-free graph G(V, E) with α(G)≤3α(G)≤3 in time O(|E|log|V|). More precisely, in time O(|E|) we check whether α(G)≤3or produce a stable set with cardinality at least 4; moreover, if α(G)≤3 we produce in time O(|E|log|V...
-
In this paper, we firstly revise the main technological solutions for ultra-fast broadband connections and summarize the main economic literature (both theoretical and empirical) on the role of regulation to support infrastructure investment in broadband networks in profitable areas. We then move...
-
-