期刊文献+

网络抗毁性仿真研究的关键问题分析

Analysis of Key Question in Network Invulnerability Simulation Research
下载PDF
导出
摘要 随着网络在人们的生活中的重要性的提高,网络毁伤所造成的影响也越来越大,对网络抗毁性的研究已经成为了一个十分迫切的问题。而由于现实生活中,网络通常十分复杂,进行抗毁性研究时无论是测试还是数据记录均较困难,因此仿真成为一个较优的解决方法,提出了使用仿真进行抗毁性研究的基本过程,对其中存在的关键问题进行了分析,说明了这一方法的可行性与应当着重注意的方面,提供了网络抗毁性仿真研究的基本框架。 Because of the importance of network in our life,the influence of damage of network is bigger than before.The research of network invulnerability becomes an exigent question.But in living,the network is usually very complex,and it is difficult to study its invulnerability by test or record method.So,simulation becomes a more useful solution.The basic thought of this method was given,the key question was analyzed,the feasibility of this method and the main factors were explained,and the basic framework of simulation research was given.
机构地区 装甲兵工程学院
出处 《系统仿真学报》 CAS CSCD 北大核心 2013年第S1期404-407,共4页 Journal of System Simulation
关键词 网络 抗毁性 仿真 抗毁性仿真研究原理 Network invulnerability Simulation Principle of invulnerability simulation study
  • 相关文献

参考文献2

二级参考文献14

  • 1Wasserman S, Faust K. Social Network Analysis: Methods and Applications[M]. Cambridge: Cambridge University Press, 1994.
  • 2Faloutsos M, Faloutsos P, Faloutsos C. On power-law relationships of the internet topology[J]. Comput. Commun. Rev., 1999,29: 251-262.
  • 3Lawrence S, Giles C L. Searching the world wide web[J]. Science, 1998, 280: 98.
  • 4Fratta L, Montanari U G. A recurisive method based on case analysis for computing network terminal reliability[J]. IEEE Trans. On Communication, 1978, 26 (8): 1166-1177.
  • 5Albert R, Jeong H, Barabasi A L. Error and attack tolerance of complex networks[J]. Nature, 2000,406: 378-382.
  • 6Albert R, Barabasi A L. Statistical mechanics of complex networks[J]. Rev. Mod. Phys., 2002, 74: 47-97.
  • 7Frank H, Frisch I. Analysis and design of survivable network[J]. IEEE Trans. on Communication Technology, 1970, COM-18(5) : 567-662.
  • 8Wilkov R S, Analysis and design of reliable computer networks[J]. IEEE Trans. on Communication, 1972, 20(3) : 660-678.
  • 9Boesch F T, Thomas R E. On graphs of in-vulnerable communication nets[J]. IEEE Trans. on Circuit Theory, 1970, CT-17(2) :183-192.
  • 10Serrano M A, Bogtma M. Topology of the world trade web[J]. Physical Review E, 2003, 68: 015101.

共引文献121

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部