1 |
ALBERT R , JEONG H , BARABASI A L . Error and attack tolerance of complex networks[J]. Nature, 2004, 340 (1): 378- 382.
|
2 |
HOLME P , KIM B J , YOON C N , et al. Attack vulnerability of complex networks[J]. Physical Review E Statistical Nonlinear and Soft Matter Physics, 2002, 65 (5): 056109.
|
3 |
WU J , DENG H Z , TAN Y J , et al. Vulnerability of complex networks under intentional attack with incomplete information[J]. Journal of Physics A Mathematical & Theoretical, 2007, 40 (11): 2665- 2671.
|
4 |
WU J , DENG H Z , TAN Y J , et al. Attack vulnerability of complex networks based on local information[J]. Modern Physics Letters B, 2008, 21 (16): 1007- 1014.
|
5 |
HOLME P , KIM B J . Vertex overload breakdown in evolving networks[J]. Physical Review E Statistical Nonlinear and Soft Matter Physics, 2002, 65 (6): 066109- 066116.
doi: 10.1103/PhysRevE.65.066109
|
6 |
CRUCITTI P , LATORA V , MARCHIORI M . A topological analysis of the Italian electric power grid[J]. Physica A:Statistical Mechanics and its Applications, 2004, 338 (1-2): 92- 97.
doi: 10.1016/j.physa.2004.02.029
|
7 |
WU W, MORAN B, MANTON J H, et al.Topology design of undersea cables considering survivability under major disasters[C]//Proc.of the International Conference on Advanced Information Networking & Applications Workshops, 2009: 1154-1159.
|
8 |
SOLÉ R V , ROSAS-CASALS M , COROMINAS-MURTRA B , et al. Robustness of the European power grids under intentional attack[J]. Physical Review E Statistical Nonlinear and Soft Matter Physics, 2008, 77 (2): 026102.
|
9 |
ROSAS-CASALS M C , VALVERDE S . Topological vulnerability of the European power grid under errors and attacks[J]. International Journal of Bifurcation & Chaos, 2007, 17 (7): 2465- 2475.
|
10 |
DALL'ASTA L , BARRAT A , BARTHÉLEMY M , et al. Vulnerability of weighted networks[J]. Jstatmech, 2012, 25 (4): 04006.
|
11 |
SOLTAN S , MAZAURIC D , ZUSSMAN G . Analysis of failures in power grids[J]. IEEE Trans.on Control of Network Systems, 2015, 99 (4): 288- 300.
|
12 |
COHEN R , EREZ K , BEN-AVRAHAM D , et al. Breakdown of the internet under intentional attack[J]. Physical Review Letters, 2001, 86 (16): 3682- 3685.
doi: 10.1103/PhysRevLett.86.3682
|
13 |
樊冰, 唐良瑞. 电力通信网脆弱性分析[J]. 中国电机工程学报, 2014, 34 (7): 1191- 1197.
|
|
FAN B , TANG L R . Vulnerability analysis of power communication network[J]. Proceedings of the CSEE, 2014, 34 (7): 1191- 1197.
|
14 |
刘涤尘, 冀星沛, 王波, 等. 基于复杂网络理论的电力通信网拓扑脆弱性分析及对策[J]. 电网技术, 2015, 39 (12): 3615- 3621.
|
|
LIU D C , JI X P , WANG B , et al. Topological vulnerability analysis and countermeasures of electrical communication network based on complex network theory[J]. Power System Technology, 2015, 39 (12): 3615- 3621.
|
15 |
MAIOLO M , PANTUSA D . Infrastructure vulnerability index of drinking water systems to terrorist attacks[J]. Cogent Engineering, 2018, 5 (1): 1456710.
|
16 |
NEUMAYER S, MODIANO E.Network reliability with geographically correlated failures[C]//Proc.of the Conference on Information Communications, 2010: 1-9.
|
17 |
NEUMAYER S , ZUSSMAN G , COHEN R , et al. Assessing the vulnerability of the fiber infrastructure to disasters[J]. IEEE/ACM Trans.on Networking, 2011, 19 (6): 1610- 1623.
doi: 10.1109/TNET.2011.2128879
|
18 |
NEUMAYER S , EFRAT A , MODIANO E . Geographic max-flow and min-cut under a circular disk failure model[J]. Computer Networks, 2015, 77, 117- 127.
doi: 10.1016/j.comnet.2014.10.026
|
19 |
AGARWAL P K, EFRAT A, GANJUGUNTE S K, et al.Network vulnerability to single, multiple, and probabilistic physical attacks[C]//Proc.of the Military Communications Conference, 2010: 1824-1829.
|
20 |
AGARWAL P K , EFRAT A , GANJUGUNTE S K , et al. The resilience of WDM networks to probabilistic geographical failures[J]. IEEE/ACM Trans.on Networking, 2013, 21 (5): 1525- 1538.
doi: 10.1109/TNET.2012.2232111
|
21 |
WANG X, JIANG X, PATTAVINA A.Assessing network vulnerability under probabilistic region failure model[C]//Proc.of the IEEE 12th International Conference on High Performance Switching and Routing, 2011: 164-170.
|
22 |
WANG X, JIANG X, PATTAVINA A, et al.Assessing physical network vulnerability under random line-segment failure model[C]//Proc.of the International Conference on High Performance Switching & Routing, 2012: 121-126.
|
23 |
LIU J , JIANG X , NISHIYAMA H , et al. Reliability assessment for wireless mesh networks under probabilistic region failure model[J]. IEEE Trans.on Vehicular Technology, 2011, 60 (5): 2253- 2264.
doi: 10.1109/TVT.2011.2114684
|
24 |
BERNSTEIN A , BIENSTOCK D , HAY D , et al. Sensitivity analysis of the power grid vulnerability to large-scale cascading failures[J]. ACM Sigmetrics Performance Evaluation Review, 2012, 40 (3): 33- 37.
|
25 |
高会生, 王龙. 光网络抗自然灾害能力评估方法研究[J]. 光通信技术, 2014, 38 (1): 26- 28.
|
|
GAO H S , WANG L . Research on assessment method of optical network vulnerability to natural disasters[J]. Optical Communication Technology, 2014, 38 (1): 26- 28.
|
26 |
RUEDA D F , CALLE E , MARZO J L . Robustness comparison of 15 real telecommunication networks:structural and centrality measurements[J]. Journal of Network & Systems Management, 2017, 25 (2): 1- 21.
|
27 |
PENG W , LI Z , LIU Y , et al. Assessing the vulnerability of network topologies under large-scale regional failures[J]. Journal of Communications & Networks, 2012, 14 (4): 451- 460.
|
28 |
王珂.空间复杂网络抗毁性建模与分析[D].长沙:国防科技大学, 2015.
|
|
WANG K.Modeling and analysis on robustness evaluation of spatial network[D].Changsha: National University of Defense Technology, 2015.
|
29 |
CONG C , WANG Z , ZUKERMAN M , et al. Optimal cable laying across an earthquake fault line considering elliptical failures[J]. IEEE Trans.on Reliability, 2016, 65 (3): 1536- 1550.
doi: 10.1109/TR.2016.2591081
|
30 |
DAS P, RAHNAMAY-NAEINI M, GHANI N, et al.On the vulnerability of multi-level communication network under catastrophic events[C]//Proc.of the International Conference on Computing, Networking and Communications, 2017: 912-916.
|
31 |
MSONGALELI D L , DIKBIYIK F , ZUKERMAN M , et al. Disaster-aware submarine fiber-optic cable deployment for mesh networks[J]. Journal of Lightwave Technology, 2016, 34 (18): 4293- 4303.
doi: 10.1109/JLT.2016.2587719
|