Computer Science ›› 2022, Vol. 49 ›› Issue (11A): 211000080-8.doi: 10.11896/jsjkx.211000080
• Computer Networ • Previous Articles Next Articles
BAO Chun-hui1, ZHUANG Yi1, GUO Li-ye2
CLC Number:
[1]XU X,QU K,CHEN A,et al.A new day-to-day dynamic network vulnerability analysis approach with Weibit-based route adjustment process[J].Transportation Research Part E:Logistics and Transportation Review,2021,153:102421. [2]SHAO L,ZHANG Y.Mathematical model of mobile networkreliability control based on nonlinear proportional differential[J].International Journal of System Assurance Engineering and Management,2021:1-7. [3]FAN Z,XIAO Y,NAYAK A,et al.An improved network security situation assessment approach in software defined networks[J].Peer-to-Peer Networking and Applications,2019,12(2):295-309. [4]SUN X,HUANG N,ZHOU J.A novel performability assess-ment approach of Mobile Ad Hoc Network[C]//2015 Annual Reliability and Maintainability Symposium(RAMS).IEEE,2015:1-5. [5]WANG P,XU H,HUANG L,et al.Minimizing controller re-sponse time through flow redirecting in SDNs[J].IEEE/ACM Transactions on Networking,2018,26(1):562-575. [6]ALIZADEH M,EDSALL T,DHARMAPURIKAR S,et al.CONGA:Distributed congestion-aware load balancing for datacenters[C]//Proceedings of the 2014 ACM Conference on SIGCOMM.2014:503-514. [7]YAO G,BI J,LI Y,et al.On the capacitated controller placement problem in software defined networks[J].IEEE Communications Letters,2014,18(8):1339-1342. [8]YANG M,WANG F,WANG S,et al.Reliability assessment method of SOA architecture software system based on complex network[C]//The 4th Annual IEEE International Conference on Cyber Technology in Automation,Control and Intelligent.IEEE,2014:653-657. [9]SUN X,HUANG N,ZHOU J.A novel performability assessment approach of Mobile Ad Hoc Network[C]//2015 Annual Reliability and Maintainability Symposium(RAMS).IEEE,2015:1-5. [10]HUANG N,WU Z T.Overview of network reliability evaluation models and algorithms [J].Systems Engineering and Electronic Technology,2013,35(12):2651-2660. [11]SHOOMAN A M.Algorithms for network reliability and connection availability analysis[C]//Proceedings of Electro/International 1995.IEEE,1995:309-333. [12]JANE C C,LAIH Y W.A dynamic bounding algorithm for approximating multi-state two-terminal reliability[J].European Journal of Operational Research,2010,205(3):625-637. [13]ZHAO J,GUO P,DENG H Z.Modeling and analysis of communication network performance reliability based on information flow mechanics [J].Journal of Communication,2011,32(8):159-164. [14]SHAO Z,WANG Y,CHEN X,et al.A network risk assessment methodology for power communication business[C]//2016 IEEE International Conference on Network Infrastructure and Digital Content(IC-NIDC).IEEE,2016:40-43. [15]YEVDOKYMENKO M,MANASSE M,ZALUSHNIY D,et al.Analysis of methods for assessing the reliability and security of infocommunication network[C]//2017 4th International Scientific-Practical Conference Problems of Infocommunications.Science and Technology(PIC S&T).IEEE,2017:199-202. [16]MOSHNIKOV A S,KOLOMOITCEV V S.Reliability Assessment of Distributed Control Systems with Network Structure[C]//2020 Wave Electronics and its Application in Information and Telecommunication Systems(WECONF).IEEE,2020:1-4. [17]HONG L,WU C,ZHANG G Q.Link reliability assessmentbased on grey relational analysis for wireless ad hoc networks[C]//Proceedings of the 29th Chinese Control Conference.IEEE,2010:4236-4240. [18]NIE D,FAN L,WANG K,et al.Research on AHP-based Multi-factor Medium Voltage Distribution Network Line Risk Quantitative Assessment Method[C]//2021 China International Conference on Electricity Distribution(CICED).IEEE,2021:38-41. [19]YEH W C,LIN Y C,CHUNG Y Y,et al.A particle swarm optimization approach based on Monte Carlo simulation for solving the complex network reliability problem[J].IEEE Transactions on Reliability,2010,59(1):212-221. [20]LU S,ZHUANG Y.Information system risk assessment model based on adaptive expert weight [J].Computer and Modernization,2021(8):85-93. [21]WANG Z Z,CHEN Y X,XIANG H C.Research on an improved expert fuzzy kernel clustering weighting method [J].China Management Science,2021,29(2):177-183. [22]DUAN Y,CAI Y,WANG Z,et al.A novel network security risk assessment approach by combining subjective and objective weights under uncertainty[J].Applied Sciences,2018,8(3):428. [23]ABBAS R,SULTAN Z,BHATTI S N.Comparative analysis of automated load testing tools:Apache jmeter,microsoft visual studio(tfs),loadrunner,siege[C]//2017 International Confe-rence on Communication Technologies(Comtech).IEEE,2017:39-44. [24]GAO X Z,NALLURI M S R,KANNAN K,et al.Multi-objective optimization of feature selection using hybrid cat swarm optimization[J].Science China Technological Sciences,2021,64(3):508-520. [25]WU Z,XU J.Possibility distribution-based approach for MAGDM with hesitant fuzzy linguistic information[J].IEEE Transactions on Cybernetics,2015,46(3):694-705. [26]WANG D C,XU Y,LI B.Information system security situation index based on business efficiency [J].Journal of Tsinghua University(Natural Science Edition),2016,56(5):517-521,529. [27]LIU A Y,WEI F J.Research on expert a posteriori weight determination method based on improved language evaluation scale [J].China Management Science,2011,19(6):149-155. |
[1] | LIN Chao-wei, LIN Bing, CHEN Xing. Study on Scientific Workflow Scheduling Based on Fuzzy Theory Under Edge Environment [J]. Computer Science, 2022, 49(2): 312-320. |
[2] | GENG Hai-jun, WANG Wei, YIN Xia. Single Node Failure Routing Protection Algorithm Based on Hybrid Software Defined Networks [J]. Computer Science, 2022, 49(2): 329-335. |
[3] | ZHANG Geng-qiang, XIE Jun, YANG Zhang-lin. Accelerating Forwarding Rules Issuance with Fast-Deployed-Segment-Routing(FDSR) in SD-MANET [J]. Computer Science, 2022, 49(2): 377-382. |
[4] | YONG Qi, JIANG Wei-na, LUO Yu-ze. Trial Risk Assessment System Based on Fuzzy Number Similarity [J]. Computer Science, 2021, 48(5): 209-216. |
[5] | DONG Shi. Survey on Software Defined Networks Security [J]. Computer Science, 2021, 48(3): 295-306. |
[6] | GAO Ya-zhuo, LIU Ya-qun, ZHANG Guo-min, XING Chang-you, WANG Xiu-lei. Multi-stage Game Based Dynamic Deployment Mechanism of Virtualized Honeypots [J]. Computer Science, 2021, 48(10): 294-300. |
[7] | HU Ping, QIN Ke-yun. Similarity Construction Method for Pythagorean Fuzzy Set Based on Fuzzy Equivalence [J]. Computer Science, 2021, 48(1): 152-156. |
[8] | ZHANG Ju, WANG Hao, LUO Shu-ting, GENG Hai-jun, YIN Xia. Hybrid Software Defined Network Energy Efficient Routing Algorithm Based on Genetic Algorithm [J]. Computer Science, 2020, 47(6): 236-241. |
[9] | XIE Ying-ying, SHI Jian, HUANG Shuo-kang, LEI Kai. Survey on Internet of Things Based on Named Data Networking Facing 5G [J]. Computer Science, 2020, 47(4): 217-225. |
[10] | WEI De-bin,YANG Peng,YANG Li,SHI Huai-feng. Virtual Network Function Fast Mapping Algorithm over Satellite Network [J]. Computer Science, 2020, 47(3): 248-254. |
[11] | GAO Hang-hang,ZHAO Shang-hong,WANG Xiang,ZHANG Xiao-yan. Traffic Balance Scheme of Aeronautical Information Network Based on System Optimal Strategy [J]. Computer Science, 2020, 47(3): 261-266. |
[12] | GU Xiao-hui,ZHANG Guo-an. Survey of SDN Applications in Vehicular Networks [J]. Computer Science, 2020, 47(1): 237-244. |
[13] | XUE Hao, CHEN Ming, QIAN Hong-yan. NFV-based Mechanism to Guard Against UDP Control Packet Redundancy in SDN Controller [J]. Computer Science, 2019, 46(10): 135-140. |
[14] | YANG Ren-yu, HAN Yi-gang, ZHANG Fan, FENG Fei. Survey of Content Centric Network Based on SDN [J]. Computer Science, 2019, 46(1): 13-20. |
[15] | ZHU Yu-jian, MA Jun-ming, AN Bo, CAO Dong-gang. Linux Container Cluster Networking Approach for Multiple Tenants [J]. Computer Science, 2018, 45(9): 46-51. |
|