Computer Science ›› 2014, Vol. 41 ›› Issue (5): 275-279.doi: 10.11896/j.issn.1002-137X.2014.05.058
Previous Articles Next Articles
ZHANG Ying-chun and WANG Shu-liang
[1] President’s Commission on Critical Infrastructure Protection,Critical Foundations:Protecting America’s Infrastructures.http://www.fas.org/sgp/library/pccip.pdf,1997 [2] Presidential Decision Directive 63.http://www.ciao.gov [3] Apostolakis G E.How useful is quantitative risk assessment?[J].Risk Analysis,2004,24:515-520 [4] Liu H,Davidson R A,Rosowsky D V,et al.Negative binomial regression of electric power outages in hurricanes[J].Journal of Infrastructure Systems,2009,11(4):258-267 [5] Wang J.Robustness of complex networks with the local protection strategy against cascading failures[J].Safety Science,2013,53:219-225 [6] 朱勤,彭希哲,吴开亚.基于投入产出模型的居民消费品载能碳排放测算与分析[J].自然资源学报,2012,27(12):2018-2029 [7] Konig M D,Battiston S,Napoletano M,et al.The efficiency and stability of R&D networks[J].Games and Economic Behavior,2012,75(2):694-713 [8] Watt D J,Strogatz S H.Collective dynamics of "small world" network [J].Nature,1998,393:440-442 [9] 邓宏钟,吴俊,李勇,等.复杂网络拓扑结构对系统抗毁性影响研究[J].系统工程与电子技术,2008,30(12):2425-2428 [10] Wang S L,Hong L,Ouyang M,et al.Vulnerability analysis of interdependent infrastructure systems under edge attack strategies[J].Safety Science,2013,1(1):328-337 [11] Arenas A,Díaz-Guilera A,Kurths J,et al.Synchronization incomplex networks [J].Physics Report,2008,469(3):93-153 [12] Chen H H,Sheu G J,Lin Y L,et al.Chaos synchronization between two different chaotic systems via nonlinear feedback control [J].Nonlinear Analysis,2009,70:4393-4401 [13] 刘建香.复杂网络及其在国内研究进展的综述[J].系统科学学报,2009,17(5):31-37 [14] Zhou T,Fu Z Q,Wang B H.Epidemic dynamics on complex networks[J].Progress in Natural Science,2006,16(5):452-457 [15] Criado R,Garcia A,Hernández-Bermejo B,et al.New results on computable efficiency and its stability for complex networks[J].Journal of Computational and Applied Mathematics,2006,192(1):59-74 [16] Crucitti P,Latora V,Marchiori M,et al.Efficiency of scale-free networks:Error and attack tolerance[J].Physica A,2003,320:622-642 [17] Holme P,Kim B J,Yoon C N,et al.Attack vulnerability of com-plex networks[J].Physical Review E,2002,65(1):056109 [18] Criado R,Flores J,Hernández-Bermejo B,et al.Effective mea-surement of network vulnerability under random and intentional attacks[J].Journal of Mathematical Modeling and Algorithms,2005,4(3):307-316 [19] Volkanovski A,Cepin M,Mavko B.Application of the fault tree analysis for assessment of power system reliability[J].Reliability Engineering & System Safety,2009,94(6):1116-1127 [20] Zio E,Golea L R.Analyzing the topological,electrical and relia-bility characteristics of a power transmission system for identi-fying its critical elements[J].Reliability Engineering & System Safety,2012,101:67-74 [21] 邓雪波,王小强,陈曦,等.基于效能模型的电力通信网可靠性研究[J].重庆邮电大学学报:自然科学版,2012,4(3):378-382 |
No related articles found! |
|