期刊文献+

基于选择关键节点的网络易损性评估法 被引量:3

A Choosing Leader-Based Vulnerability of Complex Networks
下载PDF
导出
摘要 随着人类社会日益网络化,人们对各种关乎国计民生的网络的安全性和可靠性提出了更高的要求,复杂网络的功效性与易损性理论研究成为研究焦点之一。文章介绍了目前比较热门的几种复杂网络易损性评估方法,并对几种方法进行了比较。最后,给出了基于选择关键节点的网络易损性评估法,并举例进行了说明。 As human society being described by networks increasingly, people put forward more and more demand on the security and reliability of complex networks related to the national economy and people's livelihood. The study on efficiency and vulnerability of complex networks naturally becomes a focus. The paper introduced many kinds of definition of complex networks, and defined the choosing leader-based vulnerability of networks, then given an example to illustrate the method.
出处 《舰船电子工程》 2011年第1期113-115,152,共4页 Ship Electronic Engineering
关键词 关键节点 网络功效性 网络易损性 leader node, network efficiency, network vulnerability
  • 相关文献

参考文献6

  • 1欧阳敏,费奇,余明辉,栾恩杰.复杂网络的功效性与脆弱性研究综述[J].计算机科学,2008,35(6):1-4. 被引量:14
  • 2Crucltti P, Latora V, Marchiori M, et al. Efficiency of scale-free networks: Error and attack tolerance. Physi- ca,2003,A320:622-642.
  • 3Dekker A H, Colbert B D. Network robustness and graph topology[C]//Proceedings of 22th Australasian Computer Science Conference(ACSC2004). EstiviU V, Castro Y, ed. Dunedin, New Zealand.. ACS, 2004:359-368.
  • 4Regino Criado, Julio Flores, Benito Hem ndez-Berme- jo, et al. Effective Measurement of Network Vulnera- bility Under Random and Intentional Attacks[J]. Jour- nal of Mathematical Modelling and Algorithms, 2005, 4:307-316.
  • 5Stefano Boccaletti, Regino Criado, Julio Flores. Multi- scale vulnerability of complex networks [J]. CHAOS 17, 043110,2007.
  • 6R. Criado, J. Pello, M. Romance, et al. A Node- Based Multiscale Vulnerability CK Complex Networks [J]. International Journal of Bifurcation and Chaos, 2009,2:703-710.

二级参考文献61

  • 1王林,张婧婧.复杂网络的中心化[J].复杂系统与复杂性科学,2006,3(1):13-20. 被引量:61
  • 2谭跃进,吴俊,邓宏钟,朱大智.复杂网络抗毁性研究综述[J].系统工程,2006,24(10):1-5. 被引量:63
  • 3Paul G, Sreenivasan S, Stanley H E. Resilience of complex networks to random breakdown[J]. Phys. Rev. E. , 2005,72 (5) : 56-130
  • 4Cohen R, Erez K,Ben-Avraham D. Breakdown of the Internet under Intentional Attack [J]. Phys. Rev. Lett. , 2001,86 (16) : 3682- 3685
  • 5Dorogovtsev S N, Mendes J F F. Comment on "Breakdown of the Intemet under intentional attack"[J]. Phys. Rev. Lett. , 2001,87(2)
  • 6Jeong H,Mason S, Barabdsi A-L,et al. Lethality and centrality in protein networks[J].Nature, 2001,411: 41-42
  • 7Dunne J A,Williams R J. Martlnez N D. Network structure and biodiversity loss in food webs: robustness increases with connect- ance[J].Ecology Letters,2002,5:558-567
  • 8Newman M E J,Forrest S,Balthrop J. Email networks and the spread of computer virus[J].Phys. Rev. E,2002,66(3):035101
  • 9Albert R, Barabasi A L. Statistical mechanics of complex networks [J]. Rev. Mod. Phys. ,2002,74:47-97
  • 10Dorogovtsev S N , Mendes J F F. Evolution of networks [J]. Phys. ,2002,51:1079-1187

共引文献13

同被引文献44

引证文献3

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部