1]TAN Y, ZHAO J, WU J, et al.Review on the network reliability based on paths[J]. Systems Engineering — Theory & Practice, 2012,32(12):2724-2730. (谭跃进,赵娟,吴俊,等. 基于路径的网络可靠性研究综述[J].系统工程理论与实践,2012,32(12):2724-2730.)
[2]LI H, DU J, PENG X, et al.Research on cascading invulnerability of community structure networks under intentional-attack[J]. Journal of Computer Applications, 2014, 34(4): 935-938. (李浩敏,杜军,彭兴钊,等.蓄意攻击下一类多社团网络级联抗毁性研究[J].34(4):935-938.)
[3]FRANK H, FRISCH I T. Analysis and design of survivable networks [J]. IEEE Transactions on Communication Technology, 1970, 18(5): 501 -519.
[4]GODDARD W. Measures of vulnerability — the integrity family [J]. Networks, 1994, 24(4):207-213
[5]WEI Z, ZHANG S. Vertex-neighbor-integrity of composition graphs of paths [J]. Ars Combinatoria, 2008, 86(6): 349-361.
[6]GUO W. Reliability evaluation method of tactical communication network [J].Acta Electronic Sinica, 2000,28(1):3-6. (郭伟.野战地域通信网可靠性的评价方法[J].电子学报,2000,28(1):3-6.)
[7]SCHROEDER M A, NEWPORT K T. Tactical network survivability through connectivity optimization [C]// MILCOM 1987: Proceedings of the 1987 IEEE Military Communications Conference — Crisis Communications: the Promise and Reality. Piscataway: IEEE, 1987: 590-597.
[8]NARDELLI E, PROIETTI G, WIDMAYER P. Finding the detourcritical edge of a shortest path between two nodes [J]. Information Processing Letters, 1998, 67(1): 51-54.
[9]REN J, SHEN M, SHI X. A method of evaluating the invulnerability of communication networks structure [J]. Journal of Air Force Engineering University: Natural Science Edition, 2010, 11(1): 70-73. (任俊亮,申卯兴,史向峰.通信网络抗毁性的评价方法[J]. 空军工程大学学报:自然科学版, 2010,11(1):70-73.)
[10]RAO Y, LIN J, HOU D. Evaluation method for network invulnerability based on shortest route number [J]. Journal on Communications, 2009, 30(4): 113-117. (饶育萍,林竞羽,侯德亭.基于最短路径数的网络抗毁评价方法[J].通信学报,2009,30(4):113-117.)
[11]CHENG K, LI S, ZHOU J. Evaluation method for network invulnerability based on edge weight [J]. Computer Engineering and Applications, 2010, 46(35): 95-96. (程克勤,李世伟,周健.基于边权值的网络抗毁性评估方法[J].计算机工程与应用,2010,46(35):95-96.)
[12]MA R, WEN G, SHAO M, et al.Evaluation method of the invulnerability of weighted network based on the measurements of invulnerability [J]. Application Research of Computers, 2013,30(6):1802-1804. (马润年,文刚,邵明志,等.基于抗毁性测度的赋权网络抗毁性评估方法[J].计算机应用研究,2013,30(6):1802-1804.)
[13]GAN Y. Operations research [M]. Beijing: Tsinghua University Press, 2005: 196. (甘应爱. 运筹学[M].北京:清华大学出版社,2005:196.) |