Entry Serra:2015:POA from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Serra:2015:POA,
author = "Edoardo Serra and Sushil Jajodia and Andrea Pugliese
and Antonino Rullo and V. S. Subrahmanian",
title = "{Pareto}-Optimal Adversarial Defense of Enterprise
Systems",
journal = j-TISSEC,
volume = "17",
number = "3",
pages = "11:1--11:??",
month = mar,
year = "2015",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/2699907",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Fri Mar 27 17:03:46 MDT 2015",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
abstract = "The National Vulnerability Database (NVD) maintained
by the US National Institute of Standards and
Technology provides valuable information about
vulnerabilities in popular software, as well as any
patches available to address these vulnerabilities.
Most enterprise security managers today simply patch
the most dangerous vulnerabilities-an adversary can
thus easily compromise an enterprise by using less
important vulnerabilities to penetrate an enterprise.
In this article, we capture the vulnerabilities in an
enterprise as a Vulnerability Dependency Graph (VDG)
and show that attacks graphs can be expressed in them.
We first ask the question: What set of vulnerabilities
should an attacker exploit in order to maximize his
expected impact? We show that this problem can be
solved as an integer linear program. The defender would
obviously like to minimize the impact of the worst-case
attack mounted by the attacker-but the defender also
has an obligation to ensure a high productivity within
his enterprise. We propose an algorithm that finds a
Pareto-optimal solution for the defender that allows
him to simultaneously maximize productivity and
minimize the cost of patching products on the
enterprise network. We have implemented this framework
and show that runtimes of our computations are all
within acceptable time bounds even for large VDGs
containing 30K edges and that the balance between
productivity and impact of attacks is also
acceptable.",
acknowledgement = ack-nhfb,
articleno = "11",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
}
Related entries
- address,
2(1)65,
2(4)390,
10(2)8,
10(3)12,
11(1)4,
11(2)3,
11(3)12,
12(2)11,
13(3)22,
13(3)26,
13(4)31,
13(4)38,
13(4)40,
14(1)3,
15(1)2,
15(2)6,
15(2)8,
16(3)11,
16(4)14,
17(1)1,
17(1)2,
17(1)4,
17(2)8
- adversarial,
10(4)6,
11(4)19,
13(4)38,
14(3)27,
14(4)28,
15(3)12
- adversary,
10(4)6,
11(3)13,
11(4)19,
11(4)23,
13(3)21,
14(4)28,
15(2)9,
15(3)12,
15(3)14,
17(2)7,
17(3)9,
18(1)4,
18(2)5,
18(4)14
- algorithm,
1(1)26,
2(1)3,
2(1)65,
2(1)105,
2(3)295,
9(2)162,
9(4)391,
9(4)421,
10(1)4,
10(4)3,
11(1)4,
11(3)12,
12(2)8,
12(3)17,
12(4)20,
13(1)10,
13(3)20,
13(3)22,
13(3)24,
13(3)26,
13(3)27,
13(3)28,
13(4)36,
13(4)41,
14(1)3,
14(1)13,
14(3)25,
15(3)11,
15(4)15,
15(4)17,
16(1)4,
17(4)13,
18(1)1,
18(1)4,
18(4)14
- all,
1(1)93,
2(2)159,
2(3)332,
2(4)416,
10(1)4,
10(2)5,
10(4)2,
10(4)4,
11(2)1,
11(2)3,
11(2)4,
11(2)5,
11(2)6,
11(3)13,
11(4)18,
11(4)20,
11(4)22,
12(2)10,
12(3)18,
13(1)10,
13(3)25,
13(3)28,
13(4)38,
13(4)41,
14(1)6,
14(1)14,
14(3)27,
15(1)4,
15(2)9,
15(3)14,
15(4)16,
15(4)17,
16(1)4,
17(1)2,
17(3)9,
18(1)2,
18(2)5
- allow,
2(4)390,
9(2)181,
10(3)10,
10(4)2,
10(4)3,
11(1)2,
11(2)2,
11(2)4,
12(1)3,
12(1)6,
12(2)8,
12(2)10,
12(3)16,
12(3)18,
12(3)19,
13(3)21,
13(4)34,
13(4)38,
13(4)39,
13(4)41,
14(1)3,
14(1)5,
14(1)10,
14(3)25,
14(3)26,
14(3)27,
14(4)28,
14(4)29,
15(2)6,
15(2)9,
15(2)10,
16(1)3,
16(2)5,
16(3)9,
16(4)13,
16(4)17,
17(1)1,
17(2)5,
17(3)10,
17(4)16,
18(3)10
- any,
1(1)66,
1(1)93,
2(4)390,
9(4)461,
10(3)10,
10(3)12,
10(4)1,
10(4)4,
11(2)4,
11(2)6,
11(3)13,
11(3)16,
11(4)20,
12(1)3,
12(1)5,
12(1)6,
12(2)8,
12(2)9,
12(2)10,
12(3)14,
12(3)18,
12(3)19,
12(4)20,
13(1)10,
13(3)28,
13(4)33,
13(4)39,
14(1)6,
14(1)8,
14(1)9,
14(4)32,
15(1)2,
15(2)9,
15(2)10,
15(4)17,
16(2)6,
16(2)7,
16(3)12,
16(4)13,
16(4)15,
17(2)8,
17(3)9,
18(1)1
- article,
10(1)3,
11(1)3,
11(1)4,
11(2)5,
11(3)12,
11(3)14,
11(3)15,
11(3)16,
11(4)20,
11(4)22,
11(4)23,
12(1)1,
12(1)2,
12(1)4,
12(1)6,
12(2)8,
12(2)10,
12(2)13,
12(3)14,
12(3)16,
12(3)17,
12(3)19,
12(4)21,
12(4)22,
13(3)22,
13(3)24,
13(3)25,
13(3)27,
13(3)28,
13(4)29,
13(4)31,
13(4)32,
13(4)34,
13(4)36,
13(4)41,
14(1)2,
14(1)3,
14(1)4,
14(1)10,
14(1)13,
14(1)14,
14(3)23,
14(3)25,
14(4)30,
15(2)9,
15(2)10,
15(3)11,
15(3)12,
15(3)13,
15(4)15,
15(4)16,
15(4)17,
16(1)1,
16(1)4,
16(2)6,
16(2)7,
16(2)8,
16(3)10,
16(4)14,
16(4)15,
17(2)8,
17(3)9,
17(3)12,
17(4)13,
17(4)16,
18(1)3,
18(2)5,
18(2)7,
18(3)9,
18(3)10,
18(3)11,
18(4)12,
18(4)14
- ask,
10(4)5,
13(4)40,
14(3)26,
17(4)15
- attacker,
2(2)159,
8(1)78,
10(1)4,
10(4)3,
10(4)6,
11(3)12,
11(3)15,
12(1)4,
12(2)12,
12(3)17,
12(4)22,
13(4)37,
14(1)7,
14(1)13,
14(4)31,
15(1)2,
15(4)16,
17(2)8,
17(4)13,
17(4)16,
18(1)1,
18(2)7,
18(4)13
- available,
1(1)3,
2(3)295,
12(1)1,
13(3)22,
13(3)25,
16(3)11,
17(1)1,
17(3)9,
18(1)2,
18(4)12
- balance,
12(2)13,
17(1)4
- bound,
9(4)391,
10(4)6,
11(2)3,
11(4)19,
12(3)16,
13(3)27,
14(1)14,
15(3)13,
16(1)2,
16(1)4,
18(1)4
- capture,
2(2)159,
9(2)162,
10(4)6,
11(3)13,
11(3)14,
15(2)10,
16(2)8,
17(4)13
- case, worst-,
11(4)19,
15(3)14,
15(4)18
- compromise,
2(2)159,
2(3)230,
11(4)22,
14(1)7,
14(4)28,
14(4)32,
15(1)5,
15(2)9,
17(2)7,
18(2)5
- computation,
1(1)26,
2(3)332,
9(4)461,
11(2)6,
12(1)6,
13(3)22,
13(4)29,
14(1)5,
14(4)29,
14(4)31,
15(1)2,
15(2)9,
16(3)11
- containing,
13(3)24,
13(4)35
- cost,
4(1)72,
9(4)461,
11(4)20,
12(2)13,
13(3)22,
14(1)2,
14(1)12,
14(2)17,
16(4)16,
18(1)2,
18(2)5,
18(2)7
- dangerous,
12(2)10,
12(3)19,
14(1)7
- database,
1(1)26,
1(1)93,
2(4)354,
4(4)321,
8(1)119,
9(1)31,
10(1)2,
10(4)4,
11(2)5,
12(2)8,
13(4)31,
13(4)32,
14(3)25,
16(3)12,
18(3)9
- defense,
2(3)230,
11(2)3,
12(2)11,
14(1)7,
14(3)24,
14(3)27,
14(4)31,
15(2)6,
15(4)16,
16(4)13,
17(2)8
- easily,
12(1)6,
14(1)7,
14(1)11,
16(4)17,
17(2)6,
17(3)12,
18(4)13
- edge,
12(3)18,
15(2)6
- ensure,
10(2)7,
10(3)10,
12(2)9,
12(3)14,
12(3)19,
12(4)20,
13(3)21,
13(4)35,
14(1)13,
15(2)10,
17(2)6,
18(1)2
- enterprise,
2(1)34,
2(3)269,
11(1)4,
13(4)31,
14(1)3,
15(3)13,
15(4)15,
15(4)18
- even,
1(1)66,
2(3)332,
2(4)416,
10(1)2,
11(1)4,
11(2)6,
11(4)22,
12(2)11,
12(4)20,
13(1)10,
13(4)30,
13(4)35,
13(4)41,
14(3)25,
14(3)27,
15(1)5,
16(3)12,
17(3)12,
18(1)1
- expected,
11(4)20,
15(2)10,
16(2)5
- exploit,
2(4)416,
12(1)1,
12(2)11,
12(4)22,
13(3)28,
15(1)2,
16(4)13,
17(1)1
- expressed,
2(1)65,
10(2)7,
10(2)8,
16(4)17
- find,
10(1)4,
12(1)3,
12(1)6,
12(2)10,
12(4)22,
15(1)5,
15(4)18,
16(2)8,
17(4)13,
18(3)10,
18(4)12
- first,
2(1)34,
2(1)105,
2(4)354,
9(2)181,
10(4)6,
11(2)3,
11(2)4,
11(3)13,
11(4)18,
11(4)22,
12(1)3,
12(1)5,
12(3)18,
12(4)22,
13(4)31,
13(4)32,
14(1)13,
14(3)25,
14(4)30,
14(4)31,
15(4)17,
15(4)18,
16(3)10,
17(1)4,
17(2)6,
18(1)4,
18(3)9,
18(4)12,
18(4)13
- framework,
2(3)295,
3(4)227,
6(1)71,
6(3)404,
7(2)175,
8(2)187,
9(2)181,
9(4)391,
10(1)2,
10(3)10,
11(1)3,
11(3)12,
11(4)19,
11(4)20,
12(1)2,
12(1)4,
12(1)5,
12(3)19,
12(4)21,
13(3)24,
13(3)28,
14(1)9,
14(1)11,
14(2)21,
14(4)31,
15(2)10,
15(3)12,
15(3)14,
15(4)17,
16(1)2,
16(3)9,
16(4)15,
16(4)17,
17(1)3,
17(2)5,
17(2)7,
17(3)12,
17(4)13,
17(4)14,
17(4)15,
18(1)4,
18(3)10,
18(4)12
- graph,
2(1)3,
2(1)105,
10(4)1,
11(3)13,
12(1)4,
12(3)18,
15(4)18,
18(4)12
- has,
1(1)93,
2(1)105,
2(2)138,
2(3)230,
2(3)269,
2(3)332,
9(4)391,
10(1)3,
10(1)4,
10(3)10,
11(1)2,
11(2)2,
11(3)14,
11(4)17,
11(4)19,
11(4)22,
11(4)23,
12(1)2,
12(2)9,
12(2)10,
12(3)15,
12(4)22,
13(3)20,
13(3)25,
13(3)26,
13(3)27,
13(3)28,
13(4)36,
14(1)3,
14(1)12,
14(1)14,
14(3)26,
14(4)28,
15(1)2,
15(2)6,
15(2)10,
15(3)12,
16(2)8,
16(4)14,
17(1)2,
17(1)3,
17(3)9,
17(4)14,
17(4)15,
17(4)16,
18(2)7,
18(3)11,
18(4)14
- have,
1(1)66,
1(1)93,
2(1)65,
2(2)138,
2(3)230,
2(3)269,
10(1)2,
10(1)4,
10(2)5,
10(3)10,
10(3)12,
10(4)4,
10(4)5,
10(4)6,
11(1)2,
11(2)1,
11(2)5,
11(3)15,
11(3)16,
11(4)17,
11(4)18,
11(4)21,
12(1)1,
12(1)2,
12(2)10,
12(2)13,
12(3)15,
12(3)16,
12(3)17,
12(4)20,
13(3)20,
13(3)26,
13(3)27,
13(3)28,
13(4)32,
13(4)36,
13(4)39,
13(4)40,
14(1)6,
14(1)7,
14(1)10,
14(1)13,
14(1)14,
14(3)27,
14(4)28,
14(4)29,
15(2)7,
15(2)9,
15(2)10,
15(3)12,
15(4)18,
16(2)7,
16(2)8,
16(3)10,
16(4)15,
16(4)16,
17(1)3,
17(3)12,
17(4)13,
17(4)15,
18(1)1,
18(1)3,
18(2)5,
18(2)7,
18(4)13
- high,
1(1)3,
11(3)13,
11(3)15,
11(4)18,
11(4)20,
12(2)11,
14(4)31,
15(2)7,
15(3)12,
16(2)6,
16(2)8,
16(3)11,
17(1)1,
17(4)16,
18(2)7,
18(4)12
- impact,
10(4)6,
11(4)17,
12(3)14,
13(3)22,
13(4)35,
13(4)36,
15(1)4,
16(2)8,
16(4)17,
18(2)5
- implemented,
2(3)269,
10(1)4,
11(2)5,
12(1)1,
13(3)26,
14(1)8,
14(3)27,
15(4)16,
15(4)18,
17(2)5,
17(3)10,
17(4)13,
18(2)6
- important,
1(1)3,
1(1)66,
2(3)295,
10(2)8,
11(3)14,
11(4)18,
11(4)20,
12(1)4,
13(3)26,
13(3)27,
13(4)36,
14(4)28,
15(3)12,
15(4)18,
16(1)4
- integer,
12(1)6,
16(4)17
- Jajodia, Sushil,
4(4)407,
4(4)453,
6(2)286,
8(1)119,
13(3)22
- large,
1(1)66,
2(1)65,
9(4)391,
11(1)4,
11(3)15,
12(2)13,
13(4)32,
14(1)12,
14(1)13,
14(3)25,
15(1)4,
15(3)14,
15(4)15,
16(2)8,
16(4)14,
17(3)10,
18(4)14
- less,
12(1)1,
12(1)4,
13(3)25,
13(4)29,
17(3)10
- like,
2(2)159,
10(4)3,
11(2)6,
12(2)8,
12(2)11,
13(3)24
- linear,
11(2)1,
11(3)13,
11(4)21,
12(3)16,
12(3)18,
12(4)20,
14(4)29,
15(1)4,
16(4)17,
18(2)5,
18(2)7
- maintained,
2(2)177
- manager,
6(2)232,
18(1)1
- minimize,
14(1)2,
14(1)12,
15(4)15,
17(3)10
- most,
2(3)332,
9(4)391,
11(2)2,
11(3)12,
11(4)22,
12(2)8,
12(2)12,
12(3)14,
12(4)21,
13(1)10,
13(3)27,
13(4)30,
14(3)27,
15(1)5,
15(2)6,
15(4)15,
15(4)18,
16(1)4,
16(2)6,
16(4)13,
16(4)14,
17(3)12,
17(4)16,
18(1)1
- mounted,
18(1)2
- obligation,
11(1)3
- order,
1(1)3,
9(2)181,
9(4)391,
9(4)461,
10(1)4,
10(2)5,
10(3)12,
11(2)6,
12(1)1,
12(1)3,
12(3)18,
13(3)24,
15(4)17,
16(1)4,
17(2)6,
18(1)2
- patch,
12(3)14
- popular,
10(4)5,
14(3)27,
15(2)8,
15(2)10,
15(3)11,
15(4)16,
16(4)13,
17(4)15,
18(1)1
- problem,
1(1)3,
2(3)269,
2(3)295,
5(3)238,
9(2)162,
9(4)391,
10(2)5,
10(2)8,
10(3)9,
10(3)10,
10(3)12,
10(4)1,
10(4)3,
11(2)2,
11(3)12,
11(3)15,
11(4)19,
12(1)2,
12(1)6,
12(2)9,
12(3)18,
12(4)20,
13(3)22,
13(3)26,
13(3)27,
13(4)33,
13(4)36,
13(4)40,
14(3)25,
14(4)31,
15(4)15,
15(4)18,
16(1)3,
16(1)4,
16(3)11,
16(4)15,
17(2)8,
17(4)15,
18(1)3
- product,
13(4)36,
15(2)7,
15(4)16
- program,
2(1)65,
2(3)332,
11(3)14,
12(1)1,
12(2)10,
12(2)11,
12(3)16,
12(3)19,
13(3)21,
14(3)24,
15(1)2,
15(2)10,
16(2)7,
17(1)2,
18(1)4
- propose,
1(1)26,
2(1)65,
2(2)138,
2(3)269,
9(2)162,
9(4)391,
9(4)421,
10(1)3,
10(1)4,
10(3)12,
10(4)1,
10(4)3,
10(4)4,
10(4)6,
11(1)3,
11(1)4,
11(3)12,
11(3)15,
11(4)18,
11(4)19,
11(4)23,
12(1)4,
12(2)8,
12(2)11,
12(2)13,
12(3)18,
13(3)28,
13(4)32,
13(4)36,
13(4)40,
13(4)41,
14(1)5,
14(1)10,
14(1)11,
14(3)24,
14(3)26,
14(4)30,
15(2)7,
15(4)17,
16(1)2,
16(4)15,
16(4)16,
17(1)1,
17(3)10,
17(3)12,
17(4)13,
17(4)14,
18(1)2,
18(2)7
- provide,
1(1)3,
1(1)93,
2(1)3,
2(1)34,
2(1)65,
2(1)105,
2(3)230,
2(4)390,
7(2)319,
10(1)3,
10(2)8,
10(3)10,
10(4)2,
10(4)6,
11(1)3,
11(1)4,
11(2)2,
11(3)12,
11(3)13,
11(4)17,
11(4)20,
11(4)23,
12(1)2,
12(1)3,
12(2)8,
12(2)9,
12(3)14,
12(3)15,
12(3)16,
12(4)22,
13(3)22,
13(3)24,
13(4)31,
13(4)34,
13(4)38,
13(4)41,
14(1)4,
14(1)7,
14(1)8,
14(3)25,
14(4)28,
15(2)6,
15(2)10,
15(4)17,
15(4)18,
16(1)3,
16(2)5,
16(3)9,
16(3)11,
16(4)17,
17(2)5,
17(3)12,
17(4)16,
18(1)1,
18(1)2,
18(2)5,
18(2)7,
18(4)13,
18(4)14
- question,
10(4)1,
11(2)3,
11(4)21,
13(4)35,
14(3)26,
15(4)18,
17(1)1,
18(3)9
- runtime,
12(2)10,
13(3)25,
15(2)10,
16(1)4,
16(2)5,
16(3)9
- set,
2(1)34,
2(2)138,
2(4)390,
8(1)3,
9(4)421,
10(2)5,
10(3)12,
10(4)2,
10(4)3,
10(4)5,
11(2)1,
11(2)3,
11(3)13,
11(4)18,
11(4)21,
12(2)11,
12(3)18,
12(3)19,
12(4)20,
12(4)21,
13(1)9,
13(1)10,
13(3)27,
13(4)40,
14(1)12,
14(3)25,
14(4)31,
15(1)2,
15(2)7,
15(2)10,
15(3)13,
15(4)15,
16(1)4,
17(1)2,
17(2)8,
17(4)13,
17(4)14,
18(1)4,
18(3)10,
18(3)11
- should,
1(1)3,
10(3)9,
10(4)2,
12(2)8,
12(4)20,
13(3)28,
13(4)35,
17(1)2,
18(4)14
- simply,
16(4)15,
17(1)2,
17(3)9
- simultaneously,
11(3)13
- software,
1(1)3,
2(1)3,
2(1)34,
2(1)105,
2(2)138,
2(2)177,
2(3)295,
2(4)354,
3(1)51,
11(1)2,
12(2)11,
12(2)12,
12(3)14,
12(3)19,
14(1)8,
14(3)24,
14(4)32,
15(2)8,
17(1)1
- solution,
9(2)162,
10(4)1,
11(1)2,
11(1)4,
11(4)20,
12(1)3,
12(1)6,
12(3)16,
12(3)18,
12(4)21,
13(3)22,
13(3)25,
13(3)27,
13(3)28,
15(2)7,
16(2)6,
16(3)11,
17(1)4,
17(3)9,
17(3)10,
18(1)1,
18(1)3
- solved,
10(4)4
- standard,
2(3)230,
2(4)416,
4(3)224,
7(2)319,
10(2)8,
10(3)11,
10(3)12,
11(1)4,
11(2)4,
12(1)1,
12(3)18,
13(3)28,
13(4)35,
13(4)37,
13(4)41,
15(1)2,
16(1)2,
16(1)3,
16(3)10,
16(4)15,
17(4)16,
18(4)14
- technology,
4(2)103,
8(4)349,
10(1)1,
11(1)2,
11(4)19,
16(3)10,
17(1)3,
17(2)5,
18(2)5
- them,
11(1)4,
12(3)18,
15(2)6
- thus,
2(2)138,
10(3)12,
10(4)5,
13(3)20,
14(1)12,
14(3)26,
14(3)27,
15(1)4,
16(2)7,
17(3)10,
18(1)1,
18(4)13
- time,
2(1)105,
2(3)332,
2(4)390,
2(4)416,
9(4)461,
10(1)3,
10(2)8,
11(2)3,
11(2)4,
11(2)5,
11(3)13,
11(4)17,
11(4)20,
11(4)21,
11(4)23,
12(2)8,
12(3)17,
12(3)18,
12(3)19,
12(4)20,
12(4)21,
12(4)22,
13(4)37,
13(4)39,
14(1)2,
14(1)11,
14(1)14,
14(3)26,
14(4)31,
15(2)7,
15(3)12,
15(4)17,
16(1)4,
16(4)13,
16(4)14,
16(4)17,
17(3)9,
17(3)10,
17(4)13,
18(1)2,
18(1)4,
18(3)10
- today,
10(2)5,
10(3)12,
14(3)24,
14(4)31,
16(2)8,
16(3)11
- using,
2(2)138,
2(2)177,
2(3)332,
4(3)289,
6(2)258,
6(3)327,
9(2)113,
9(2)162,
9(2)181,
9(3)292,
9(3)325,
9(4)461,
10(1)4,
10(2)8,
10(3)11,
10(4)3,
10(4)6,
11(1)2,
11(2)1,
11(2)2,
11(2)3,
11(3)14,
11(4)19,
11(4)21,
12(2)10,
12(2)11,
13(1)2,
13(1)8,
13(3)20,
13(3)26,
13(4)31,
13(4)35,
13(4)39,
14(1)3,
14(1)12,
14(1)14,
14(3)27,
15(1)2,
15(3)11,
15(3)12,
15(4)15,
15(4)17,
16(1)1,
16(1)2,
16(1)4,
16(2)5,
16(2)6,
16(3)10,
16(4)17,
17(1)1,
17(2)5,
17(3)10,
17(4)13,
17(4)14,
17(4)16,
18(2)7,
18(2)8,
18(3)10,
18(3)11,
18(4)14
- valuable,
10(1)3,
11(2)2
- vulnerability,
2(4)416,
7(2)319,
12(2)11,
13(4)38,
14(1)7,
14(1)13,
17(1)1
- well,
1(1)93,
10(1)2,
10(2)8,
10(3)11,
10(3)12,
11(1)3,
11(1)4,
11(2)5,
11(3)15,
12(1)1,
12(1)3,
12(1)5,
12(2)10,
13(1)10,
13(3)26,
14(1)3,
14(1)5,
14(1)14,
14(3)23,
15(3)12,
15(4)15,
15(4)16,
15(4)18,
16(2)8,
17(3)9,
17(3)10,
18(1)3,
18(2)5
- what,
2(2)138,
10(4)1,
12(2)9,
15(2)10,
17(1)2
- worst-case,
11(4)19,
15(3)14,
15(4)18
- would,
2(2)159,
10(4)1,
12(2)13,
12(4)22,
13(3)26,
15(2)6,
15(2)10,
16(2)8,
18(3)9