Computer Science ›› 2021, Vol. 48 ›› Issue (10): 351-358.doi: 10.11896/jsjkx.200900144
• Interdiscipline & Frontier • Previous Articles
LI Shu1, YANG Hua1, SONG Bo2
CLC Number:
[1]LIAO Z D,ZHENG G H.Research on the evolution of supply chain considering the characteristics of different node behavior elements[J].Application Research of Computers,2020,37(6):1679-1682,1692. [2]TANG L,JING K,HE J,et al.Robustness of assembly supply chain networks by considering risk propagation and cascading failure[J].Physica A:Statistical Mechanics and Its Applications,2016,459:129-139. [3]ZHAO Z G,ZHOU G G,LI H X.Research on the Attack Stra-tegy and Robustness of Complex Weighted Supply Chain Network[J].Computer Science,2019,46(8):138-144. [4]LI Z,GUO Y H,XU G A,et al.Dynamic analysis of cascade with emergency recovery mechanism in complex network[J].Acta Physica Sinica,2014,63(15):417-428. [5]DUI H Y,MENG X Y,HUI X,et al.Analysis of the cascading failure for scale-free networks based on a multi-strategy evolutionary game[J].Reliability Engineering and System Safety,2020,199:106919. [6]SUN J Y,TANG J M,FU W P,et al.Construction of a multi-echelon supply chain complex network evolution model and robustness analysis of cascading failure[J].Computers & Industrial Engineering,2020,144:106457. [7]LIU H,ZHOU G G,FU P H.Research on Local EvolutionModel of Hierarchical Supply Chain Complex Network[J].Computer Science,2013,40(2):270-273. [8]ZHONG J L,SANHEDRAI H,ZHANG F M,et al.Networkendurance against cascading overload failure[J].Reliability Engineering and System Safety,2020,201:106916. [9]BELLINGERI M,CASSI D.Robutness of weighted networks[J].Physica A:Statistical Mechanics and Its Applications,2018,489:47-55. [10]LI H L,CHEN W H.The impact of the new crown epidemic on the global manufacturing supply chain and countermeasures[J].Price Theory and Practice,2020,40(5):272-275. [11]FENG G Z,SUN Y Y.The impact of the new crown pneumonia epidemic on the economy and society from the perspective of supply chain[J].Journal of Xi'an Jiaotong University (Social Science Edition),2020,40(4):42-49. [12]UNCTAD.Impact of COVID-19 pandemic on global FDI andGVCs updated analysis[R].New York:UNCTAD,2020. [13]ZHU W X,ZHANG P,LI P F,et al.The plight of small,me-dium and micro enterprises and the improvement of policy efficiency under the impact of the epidemic-Based on the analysis of two national questionnaire surveys[J].Management World,2020,36(4):13-26. [14]LI X,CHENG G R.A local-world evolving network model[J].Physica A:Statistical Mechanics and Its Applications,2003,328(1):274-286. [15]DUAN D L,WU J,DENG H Z,et al.A cascading failure model of complex networks based on adjustable load redistribution[J].System Engineering Theory and Practice,2013,33(1):203-208. [16]GAO J,CHEN Y Y.Analysis of supply chain network vulnerability under cascade failure[J].Logistics Engineering and Ma-nagement,2016,38(10):80-83,42. [17]TANG L,HE J,JING K.Research on the Cascade FailureMechanism and Robustness of Related Supply Chain Networks[J].Journal of Management Science,2016,19(11):33-44,62. [18]WANG Y C,XIAO R B.Supply chain network cascading failure modeling based on underload failure[J].Computer Integrated Manufacturing System,2020,26(5):1355-1365. [19]JIANG W J,LIU R R,FAN T L,et al.Overview of preventionand recovery strategies for multi-layer network cascade failure[J].Acta Physica Sinica,2020,69(8):81-91. [20]WANG H,GU T,JIN M,et al.The complexity measurement and evolution analysis of supply chain network under disruption risks[J].Chaos,Solitons & Fractals,2018,116(11):72-78. [21]LI G,ZHAO D Z.Study on the scale-free characteristics of supply chain networks[J].Industrial Engineering,2012,15(1):28-32. |
[1] | ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61. |
[2] | WANG Xue-guang, ZHANG Ai-xin, DOU Bing-lin. Non-linear Load Capacity Model of Complex Networks [J]. Computer Science, 2021, 48(6): 282-287. |
[3] | LI Ming-lei, HUANG Hui, LU Yu-liang, ZHU Kai-long. SymFuzz:Vulnerability Detection Technology Under Complex Path Conditions [J]. Computer Science, 2021, 48(5): 25-31. |
[4] | ZHENG Jian-yun, PANG Jian-min, ZHOU Xin, WANG Jun. Enhanced Binary Vulnerability Mining Based on Constraint Derivation [J]. Computer Science, 2021, 48(3): 320-326. |
[5] | LI Yi-hao, HONG Zheng, LIN Pei-hong. Fuzzing Test Case Generation Method Based on Depth-first Search [J]. Computer Science, 2021, 48(12): 85-93. |
[6] | TU Liang-qiong, SUN Xiao-bing, ZHANG Jia-le, CAI Jie, LI Bin, BO Li-li. Survey of Vulnerability Detection Tools for Smart Contracts [J]. Computer Science, 2021, 48(11): 79-88. |
[7] | HUANG Yi, SHEN Guo-wei, ZHAO Wen-bo, GUO Chun. Network Representation Learning Algorithm Based on Vulnerability Threat Schema [J]. Computer Science, 2020, 47(7): 292-298. |
[8] | GONG Kou-lin, ZHOU Yu, DING Li, WANG Yong-chao. Vulnerability Detection Using Bidirectional Long Short-term Memory Networks [J]. Computer Science, 2020, 47(5): 295-300. |
[9] | LIU Qiang,KUANG Xiao-hui,CHEN Hua,LI Xiang,LI Guang-ke. Vulnerability Discovery Approach Based on Similarity Matching of Program Slicing [J]. Computer Science, 2019, 46(7): 126-132. |
[10] | LI Jia-li, CHEN Yong-le, LI Zhi, SUN Li-min. Mining RTSP Protocol Vulnerabilities Based on Traversal of Protocol State Graph [J]. Computer Science, 2018, 45(9): 171-176. |
[11] | WANG Wei, YANG Ben-chao, LI Guang-song, SI Xue-ming. Security Analysis of Heterogeneous Redundant Systems [J]. Computer Science, 2018, 45(9): 183-186. |
[12] | SUO Yan-feng, WANG Shao-jie, QIN Yu, LI Qiu-xiang, FENG Da-jun and LI Jing-chun. Summary of Security Technology and Application in Industrial Control System [J]. Computer Science, 2018, 45(4): 25-33. |
[13] | ZHANG Ya-feng, HONG Zheng, WU Li-fa, ZHOU Zhen-ji and SUN He. Protocol State Based Fuzzing Method for Industrial Control Protocols [J]. Computer Science, 2017, 44(5): 132-140. |
[14] | WAN Yan, ZHAO Xi and WANG Guo-lin. Android Vulnerability Detection and Assessment System Based on OVAL [J]. Computer Science, 2017, 44(4): 79-81. |
[15] | MIAO Xu-dong, WANG Yong-chun, CAO Xing-chen and FANG Feng. Detection Approach for Security Vulnerability Based on Pattern Matching [J]. Computer Science, 2017, 44(4): 109-113. |
|