[1] ALBERT R, JEONG H, BARABÁSI A-L. Error and attack tolerance of complex networks [J]. Nature, 2000, 406(6794): 378-382. [2] BAO Z, CAO Y, DING L, et al. Comparison of cascading failures in small-world and scale-free networks subject to vertex and edge attacks [J]. Physica A: Statistical Mechanics and its Applications, 2009, 388(20): 4491-4498. [3] ZOU Y, ZHOU Q. Cascading failure on BA scale-free communication networks [J]. Journal of Guangxi Normal University:Natural Science Edition,2013,30(3):83-87. (邹艳丽,周秋花.BA无标度通信网络的级联故障研究 [J].广西师范大学学报: 自然科学版,2013,30(3):83-87.) [4] WANG J, LIU Y, LIU X. Model for cascading faults in complex software [J]. Chinese Journal of Computers, 2011, 34(6): 1137-1147. (王健,刘衍珩,刘雪莲.复杂软件的级联故障建模[J].计算机学报,2011,34(6):1137-1147.) [5] KINNEY R, CRUCITTI P, ALBERT R, et al. Modeling cascading failures in the north American power grid [J]. The European Physical Journal B — Condensed Matter and Complex Systems, 2005, 46(1): 101-107. [6] ALBERT R, ALBERT I, NAKARADO G L. Structural vulnerability of the North American power grid [J]. Physical Review E: Statistical, Nonlinear, and Soft Matter Physics, 2004, 69(2): 025103. [7] PENG X, YAO H, DING C, et al. Modeling of weighted network with tunble clustering and cascading invulnerability analyses [J]. Systems Engineering and Electronics, 2014, 36(12): 2449-2455. (彭兴钊,姚宏,丁超,等.变聚类系数加权网络的建模及其级联抗毁性分析[J].系统工程与电子技术,2014,36(12):2449-2455.) [8] LIU Z, CHEN G, TANG Z, et al. Research on dynamic model of cascading failure in weighted complex networks [J]. Journal of Chinese Computer Systems, 2013, 34(12): 2800-2804. (刘漳辉,陈国龙,汤振立,等.加权复杂网络相继故障的节点动态模型研究[J].小型微型计算机系统,2013,34(12):2800-2804.) [9] LIN G, DI Z, FAN Y. Cascading failures in complex networks with community structure [J/OL]. International Journal of Modern Physics C: Computational Physics and Physical Computation, 2014, 25(5): 1440005 [2015-03-29]. http://www.worldscientific.com/doi/abs/10.1142/S0129183114400051. [10] DING C, YAO H, DU J, et al. Cascading invulnerability attack strategy of complex network via community detection [J]. Journal of Computer Applications, 2014, 34(6): 1666-1670. (丁超,姚宏,杜军,等.基于社团划分的复杂网络级联抗毁攻击策略[J]. 计算机应用,2014,34(6):1666-1670.) [11] LI M, DU J, PENG X, et al. Research on cascading invulnerability of community structure networks under intentional attack [J]. Journal of Computer Applications, 2014, 34(4): 935-938. (李浩敏,杜军,彭兴钊,等.蓄意攻击下一类多社团网络级联抗毁性研究[J].计算机应用,2014,34(4):935-938.) [12] MOTTER A E, LAI Y C. Cascadebased attacks on complex networks [J]. Physical Review E: Statistical, Nonlinear, and Soft Matter Physics, 2002, 66(6): 065102. [13] MOTTER A E. Cascade control and defense in complex networks [J]. Physical Review Letters, 2004, 93(9): 098701. [14] FLAKE G W, LAWRENCE S, GILES C L, et al. Self-organization and identification of Web communities [J]. Computer, 2002, 35(3): 66-70. [15] LANCICHINETTI A, FORTUNATO S, RADICCHI F. Benchmark graphs for testing community detection algorithms [J]. Physical Review E: Statistical, Nonlinear, and Soft Matter Physics, 2008, 78(4): 046110. [16] DUCH J, ARENAS A. Community detection in complex networks using extremal optimization [J]. Physical Review E: Statistical, Nonlinear, and Soft Matter Physics, 2005, 72(2): 027104. [17] BLONDEL V D, GUILLAUME J-L, LAMBIOTTE R, et al. Fast unfolding of communities in large networks [J]. Journal of Statistical Mechanics: Theory and Experiment, 2008, 2008(10): P10008. |