Computer Science ›› 2014, Vol. 41 ›› Issue (7): 194-199.doi: 10.11896/j.issn.1002-137X.2014.07.041
Previous Articles Next Articles
LU Zhi-gang,LIU Jun-rong and LIU Bao-xu
[1] C&A Systems Security:The COBRA Risk Consultant MethodologyTM,July 1999 [2] NIST:Automated Security Self-Evaluation Tool(ASSET).http://csrc.nist.gov/asset [3] Landherr A,Friedl B,Heidemann J.A critical review of centrality measures in social networks[J].Business&Information Systems Engineering,2010,2(6):371-385 [4] Kermarrec A,Merrer E L,Sericola B,et al.Second order centrality:Distributed assessment of nodes criticity in complex networks[J].Computer Communications,2011,4(5):619-628 [5] 谭跃进,吴俊,邓宏钟.复杂网络中节点重要度评估的节点收缩方法[J].系统工程理论与实践,2006,6(11):79-83 [6] 吴俊,谭跃进,邓宏钟,等.考虑级联失效的复杂网络节点重要度评估[J].小型微型计算机系统,2007,4(4):627-630 [7] 张琨,李配配,等.基于PageRank的有向加权复杂网络节点重要性评估方法[J].南京航空航天大学学报,2013,5(3):429-434 [8] Page L,Brin S,MotwaniR,et al.The PageRank citation ranking:bringing order to the Web[EB/OL].http://ilpubs.stanford.edu:8090/422/,2012-05-13 [9] Barrat A,Barthelemy M,Vespignani A.Modeling the evolution of weighted networks[J].Physical Review E,2004,0(6):1-12 [10] Chvátal V.Tough graphs and Hamiltonian circuits[J].Discrete Mathematics,1973,5(3):215-228 [11] Peng Y,Chen C,Koh K.On the edge-toughness of a graph(I)[J].Southeast AsianMath.Bull,1988,12:109-122 [12] Cunningham W H.Optimal attack and reinforcement of a network[J].Journal of the ACM(JACM),1985,32(3):549-561 [13] Zerkle D,Levitt K.Netkuang-a multi-host configuration vulnerabilitychecker[C]∥Proc.of the 6th USENIX Security Symposium.1996 [14] Albert R,Jeong H,Barabási A L.Error and attack tolerance of complexnetworks[J].Nature,2000,406(6794):378-382 [15] Cohen R,Erez K,Ben-Avraham D,et al.Resilience of the Internet torandom breakdowns[J].Physical Review Letters,2000,85(21):4626-4628 [16] Buldyrev S V,Parshani R,Gerald S,et al.Catastrophic cascadeof failures in interdependent networks[J].Nature,2010,464(7291):1025-1028 [17] Motter A E,Lai Y C.Cascade-based attacks on complex networks[J].Physical Review E,2002,66(6):65-102 [18] Wu J-J,Gao Z-Y,Sun H-J.Cascade and breakdown in scale-free networkswith community structure[J].Physical Review E,2006,74(6):66-111 [19] Wang J-W,Rong L-L.Cascade-based attack vulnerability on the US powergrid[J].Safety Science,2009,47(10):1332-1336 [20] Sun H,Zhao H,Wu J.A robust matching model of capacity to defensecascading failure on complex networks[J].Physica A:Statistical Mechanics and Its Applications,2008,387(25):6431-6435 [21] Lehmann J,Bernasconi J.Stochastic load-redistribution model for cascading failure propagation[J].Physical Review E,2010,81(3):31-129 [22] Zheng J F,Gao Z Y,Zhao X M.Clustering and congestioneffects oncascading failures of scale-free networks[J].EPL,2007,79:58002 [23] Holme P,Kim B J.Vertex overload breakdown in evolving networks[J].Physical Review E,2002,65(6):66-109 [24] 程耀东,刘宝旭,孙功星,等.高能物理与云计算[J].核电子学与探测技术,2011,31(11):1189-1194 |
No related articles found! |
|