期刊文献+

复杂系统脆弱性综合分析方法 被引量:4

Comprehensive analysis method for vulnerability of complex systems
下载PDF
导出
摘要 为全面识别复杂系统中的脆弱点,科学评价其脆弱性,针对纯拓扑脆弱性分析方法的不足,在考虑非拓扑因素条件下,提出一种结合复杂网络技术和效能评估技术的复杂系统脆弱性综合分析方法,从拓扑结构和非拓扑因素两方面全面分析复杂系统的脆弱性。以复杂网络的中心性指标为基础,通过广义指标法进行拓扑脆弱性分析;借鉴概率风险评价理论,从易攻性和易坏性两个方面对非拓扑脆弱性进行评价;通过对两者结果的综合得到总的脆弱性分析结果。示例结果表明:拓扑和非拓扑分析的结果有交集但又有所区别,两者密切相关且互为补充,并能共同筛选出复杂系统中的关键环节。较之纯粹的拓扑结构分析,综合分析得到的结果更为全面。 In order to identify vulnerable points in complex system roundly and assess its vulnerability scientifically, to improve the insufficiency of the pure topological methods, an analysis method integrated complex network theories and effectiveness assessment technologies was proposed, which considers both the topological and non-topological factors of vulnerability. Based on centricity measurements of complex network, a generalized indicators method was used for topological vulnerability analysis. Referring to the probability risk assessment theory, non-topological vulnerability was analyzed from susceptibility and brittleness. Then the final vulnerability results were integrated from the former two results. The demonstration results show that there is an intersection set but also some differences between topological and non-topological analysis. These two aspects of vulnerability are correlative and complementary close, they both contribute to the screening of critical points and links in a complex system, and compared to purely topological study, conclusions from integrated analysis were more comprehensive.
出处 《国防科技大学学报》 EI CAS CSCD 北大核心 2016年第2期150-155,共6页 Journal of National University of Defense Technology
基金 国家自然科学基金资助项目(91024015)
关键词 复杂系统 脆弱性 复杂网络 效能评估 拓扑 complex system vulnerability complex network effectiveness assessment topology
  • 相关文献

参考文献12

  • 1张怡,赵凯,来犇.警报关联图:一种网络脆弱性量化评估的新方法[J].国防科技大学学报,2012,34(3):109-112. 被引量:7
  • 2Zhang W X, Hou H T, Li Q, et al. Vulnerability analysis of the global navigation satellite systems from the information flow perspective[ C ]//Proceedings of 6th International Conference on Information Management, Innovation Management andIndustrial Engineering, Xi'an, IEEE, 2013 : 263 - 267.
  • 3郭世泽,陆哲明.复杂网络基础理论[M].北京:科学出版社,2012.
  • 4Bompard E, Napoli R, Xue F. Extended topological approach for the assessment of structural vulnerability in transmission networks[ J ]. IET Generation, Transmission & Distribution, 2010, 4 (6) : 716 -724.
  • 5Hines P, Cotilla-Sanchez E, Blumsack S. Do topological models provide good information about vulnerability in electric power networks? [J]. Chaos, 2010, 20 (3) : 033122.
  • 6Hines P, Cotilla-Sanchez E, Blumsack S. Topological models and critical slowing down: two approaches to power system blackout risk analysis [ C ] //Proceedings of 44th Hawaii International Conference on System Sciences, Hawaii, IEEE, 2011:1-10.
  • 7Ouyang M. Review modeling and simulation of interdependent critical infrastructure systems [ J ]. Reliability Engineering & System Safety, 2014, 121 ( 1 ) : 43 -60.
  • 8王智源,丁泽中,胡广水.军事通信网络拓扑结构抗毁性仿真[J].计算机系统应用,2010,19(12):109-113. 被引量:5
  • 9Guo C, Zhao Z D, Hill D J, et al. Attack structural vulnerability of power grids: a hybrid approach based on complex networks[ J ]. Physica A : Statistical Mechanics and its Applications, 2010, 389 (3) : 595 - 603.
  • 10石福丽,方志刚,杨峰,许永平,吴国栋.基于仿真的潜艇装备作战能力ANP幂指数评估方法[J].国防科技大学学报,2011,33(4):168-174. 被引量:10

二级参考文献33

共引文献60

同被引文献52

引证文献4

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部