Computer Science ›› 2022, Vol. 49 ›› Issue (11A): 210800249-6.doi: 10.11896/jsjkx.210800249
• Information Security • Previous Articles Next Articles
CHENG Qiu-yun, LIU Jing-ju, YANG Guo-zheng, LUO Zhi-hao
CLC Number:
[1]BOCCALETTI S,BIANCONI G,CRIADO R,et al.The structure and dynamics of multilayer networks[J].Physics Reports,2014,544(1):1-122. [2]KIVELA M,ARENAS A,BARTHELEMY M,et al.Multilayer Networks[J].Journal of Complex Networks,2014,2(3):203-271. [3]ZHANG X.Advances in Multi-layer Complex Network Theory:Concepts,Theories and Data [J].Complex Systems and Complexity Science,2015,12(2):103-107. [4]MORENO Y,PERC M.Focus on multilayer networks [J].New Journal of Physics,2020,22(1):10-201. [5]DOMENICO M D,SOLÉ-RIBALTA A,COZZO E,et al.Mathematical Formulation of Multi-Layer Networks [J].Physical Review X,2014,3(4):4192-4195. [6]INTERDONATO R,MAGNANI M,PERNA D,et al.Multilayer network simplification:Approaches,models and methods[J].Computer Science Review,2020,36:100-246. [7]LU J N.From single-layer network to multi-layer network-Structure,Dynamics and Function [J].Knowledge of Modern Physics,2015,1(4):6-12. [8]MAGNANI M,ROSSI L.The ML-Model for Multi-layer SocialNetworks[C]//International Conference on Advances in Social Networks Analysis & Mining.IEEE,2011. [9]DING R,UJANG N,HAMID H B,et al.Application of complex networks theory in urban traffic network researches[J].Networks and Spatial Economics,2019,19(4):1281-1317. [10]FAN D M,WANG J L.Research on the spread of rumors on multi-layer social networks [J].Journal of Anhui Agricultural University:Social Science Edition,2020,29(4):8-18. [11]WANG X L,ZHU L N,SHI Z B.Science Technology and Engineering,2020,20(3):1243-1249. [12]XU K J,WU J Y,YANG Y,et al.Multilayer Analysis of China’sAirline Network Structure [J].Complex Systems and Complexity Science,2020,17(2):8. [13]WANG Y F.Research on The Characteristics of Chinese Aviation Network Based on Kernel Controllable Network Model [D].Beijing:Beijing Jiaotong University. [14]NICOSIA V,BIANCONI G,LATORA V,et al.Growing Multiplex Networks[J].Physical Review Letters,2013,111(5):058701. [15]NICOSIA V,BIANCONI G,LATORA V,et al.Non-lineargrowth and condensation in multiplex networks[J].Physical Review E Statistical Nonlinear & Soft Matter Physics,2014,90(4):042807. [16]MAGNANI M,ROSSI L.Formation of multiple networks[C]//International Conference on Social Computing,Behavioral-Cultural Modeling,and Prediction.Berlin:Springer,2013:257-264. [17]MIN B,DO YI S,LEE K M,et al.Network robustness of multiplex networks with interlayer degree correlations[J].Physical Review E,2014,89(4):042811. [18]DE DOMENICO M,SOLÉ-RIBALTA A,OMODEI E,et al.Centrality in interconnected multilayer networks[J].arXiv:1311.2906,2013. [19]PATRINOS A N,HAKIMI S L.Relations between graphs and integer-pair sequences[J].Discrete Mathematics,1976,15(4):347-358. [20]BIANCONI G.Statistical Mechanics of Multiplex Ensembles:Entropy and Overlap[J].Physical Review E,2013,87(6):062806. |
[1] | CHEN Jing, WU Ling-ling. Mixed Attribute Feature Detection Method of Internet of Vehicles Big Datain Multi-source Heterogeneous Environment [J]. Computer Science, 2022, 49(8): 108-112. |
[2] | WANG Xing-wei, XIN Jun-chang, SHAO An-lin, BI Yuan-guo, YI Xiu-shuang. Study on Development Status and Countermeasures of Industrial Intranet in Enterprises [J]. Computer Science, 2022, 49(7): 1-9. |
[3] | ZHANG Chong-yu, CHEN Yan-ming, LI Wei. Task Offloading Online Algorithm for Data Stream Edge Computing [J]. Computer Science, 2022, 49(7): 263-270. |
[4] | ZHANG Xi-ran, LIU Wan-ping, LONG Hua. Dynamic Model and Analysis of Spreading of Botnet Viruses over Internet of Things [J]. Computer Science, 2022, 49(6A): 738-743. |
[5] | DONG Dan-dan, SONG Kang. Performance Analysis on Reconfigurable Intelligent Surface Aided Two-way Internet of Things Communication System [J]. Computer Science, 2022, 49(6): 19-24. |
[6] | Ran WANG, Jiang-tian NIE, Yang ZHANG, Kun ZHU. Clustering-based Demand Response for Intelligent Energy Management in 6G-enabled Smart Grids [J]. Computer Science, 2022, 49(6): 44-54. |
[7] | SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353. |
[8] | ZHANG Zhen-chao, LIU Ya-li, YIN Xin-chun. New Certificateless Generalized Signcryption Scheme for Internet of Things Environment [J]. Computer Science, 2022, 49(3): 329-337. |
[9] | GENG Hai-jun, WANG Wei, YIN Xia. Single Node Failure Routing Protection Algorithm Based on Hybrid Software Defined Networks [J]. Computer Science, 2022, 49(2): 329-335. |
[10] | YU Sai-sai, WANG Xiao-juan, ZHANG Qian-qian. Detection of Malicious Behavior in Encrypted Traffic Based on Heuristic Search Feature Selection [J]. Computer Science, 2022, 49(11A): 210800237-6. |
[11] | CHEN Bin, XU Huan, XI Jian-fei, LEI Mei-lian, ZHANG Rui, QIN Shi-han. Power Internet of Things Device Access Management Based on Cryptographic Accumulator [J]. Computer Science, 2022, 49(11A): 210900218-6. |
[12] | WANG Chen-hua, HOU Shou-lu, LIU Xiu-lei. Cost-aware IoT Data Processing in Edge-Cloud Collaborative Computing [J]. Computer Science, 2022, 49(11A): 211000101-7. |
[13] | ZHANG Xiao-mei, CAO Ying, LOU Ping, JIANG Xue-mei, YAN Jun-wei, LI Da. Lossless Data Compression Method Based on Edge Computing [J]. Computer Science, 2022, 49(11A): 210500195-6. |
[14] | LIU Wen-wen, XIONG Wei, HAN Chi. Communication Satellite Task Relaxation Scheduling Method Based on Improved Hyper-heuristic Algorithm [J]. Computer Science, 2022, 49(11A): 210900125-6. |
[15] | LI Dun-feng, XIAO Yao, FENG Yong. Efficient Routing Strategy for IoT Data Transaction Based on Payment Channel Network [J]. Computer Science, 2022, 49(11A): 211100010-5. |
|