Abstract:Via arrangement and classification of literatures, a review on invulnerability of interdependent networks in recent years is made. As the research foundation of invulnerability of interdependent networks, this paper first introduces some common methods of network invulnerability. Then we make arrangements on related researches from some fields, and take the power system as an example to explain the applications of interdependent networks. In the end, some conclusions and outlook are made for the researches and developments of invulnerability on interdependent networks. We hope this review can provide reference and research idea for researchers.
[1]Barabási A L, Albert R. Emergence of scaling in random networks[J]. Science, 1999, 286(5439): 509512.
[2]Watts D J, Strogatz S H. Collective dynamics of 'small-world' networks[J]. Nature, 1998, 393(6684): 440442.
[3]Albert R, Jeong H, Barabási A L. Error and attack tolerance of complex networks[J]. Nature, 2000, 406(6794): 378382.
[4]William R Graham. Report of the Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP) Attack: Critical National Infrastructures[B]. McLean: Congressional EMP Commission, 2008: 912.
[5]Rinaldi S M, Peerenboom J P, Kelly T K. Identifying, understanding, and analyzing critical infrastructure interdependencies[J]. IEEE Transactions on Control Systems, 2001, 21(6): 1125.
[6]Ouyang M, Dueas-Osorio L. Efficient approach to compute generalized interdependent effects between infrastructure systems[J]. Journal of Computing in Civil Engineering, 2011, 25(5): 394406.
[7]Wang S, Hong L, Ouyang M, et al. Vulnerability analysis of interdependent infrastructure systems under edge attack strategies[J]. Safety Science, 2013, 51(1): 328337.
[8]李国颖,成柏松,张鹏,等. 相互依存网络鲁棒性研究综述[J]. 电子科技大学学报, 2013, 42(1): 2328.
Li Guoying, Cheng Bosong, Zhang Peng, et al. Review of the Interdependent Networks[J]. Journal of University of Electronic Science and Technology of China, 2013, 42(1): 2328.
[9]Frank H, Frisch I T. Analysis and design of survivable network[J]. IEEE Transactions on Communication Technology, 1970, 18(5): 567662.
[10] Barefoot C A, Entrinfer R C, Swart H C. Vulnerability in graphs-A comparative survey[J]. Journal of Combinatorial Mathematics and Combinatorial Computing, 1987, 58: 101114.
[11] Bassalygo L A, Pinsker M S. The complexity of an optimal non-blocking commutation scheme without reorganization[J]. Problemy Peredaci Informacii, 1973, 9(1): 8487.
[12] Chvátal V. Tough graphs and hamiltonian circuits[J]. Discrete Mathematics, 1973, 5(3): 215228.
[13] Jung H A. On a class of posets and the corresponding comparability graphs[J]. Journal of Combinatorial Theory, Series B, 1978, 24(2): 125133.
[14] 许进,席酉民,汪应洛. 系统的核与核度[J]. 系统科学与数学, 1993, 13(2): 102110.
Xu Jin, Xi Youmin, Wang Yingluo. On system core and coritivity(I)[J]. Journal of System Science & mathmatical science, 1993, 13(2): 102110.
[15] Wu J, Barahona M, Tan Y J, et al. Natural connectivity of complex networks[J]. Chinese Physics Letters, 2010, 27(7): 078902.
[16] Wu J, Barahona M, Tan Y J, et al. Spectral measure of structural robustness in complex networks[J]. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, 2011, 41(6): 12441252.
[17] Shang Y L. Perturbation results for the Estrada index in weighted networks[J]. Journal of Physics A, 2011, 44(7): 075003.
[18] Shang Y L. Local natural connectivity in complex networks[J]. Chinese Physics Letters, 2011, 28(6): 068903.
[19] 狄鹏,胡涛,胡斌,等. 基于复杂网络的作战网络模型抗毁性研究[J]. 系统仿真学报, 2011, 23(1): 5660.
Di peng, Hu Tao, Hu Bin, et al. Research on invulnerability of combat net model based on complex networks[J]. Journal of System Simulation, 2011, 23(1): 5660.
[20] Dong Z C, Fang Y J, Tian M, et al. Approaches to improving the robustness of interdependent networks against cascaeding failures with load-based model[J]. Modern Physics Letters B, 2015, 29(32): 1550210.
[21] 吴艾,刘心松,刘丹. 基于流量攻击和边失效的复杂网络脆弱特性[J]. 电子与信息学报, 2009, 31(12): 29973000.
Wu Ai, Liu Xinsong, Liu Dan. Frangibility of complex networks based on flow attack and edge failure[J]. Journal of Electronics & Information Technology, 2009, 31(12): 29973000.
[22] Bak P, Tang C, Wiesenfeld K. Self-organized criticality: an explanation of the 1/f noise[J]. Physical Review Letters, 1987, 59(4): 381384.
[23] 曹一家,江全元,丁理杰. 电力系统大停电的自组织临界现象[J]. 电网技术, 2005, 29(15): 15.
Cao Yijia, Jiang Quanyuan, Ding Lijie. Self-organized criticality phenomenon for power system blackouts[J]. Power System Technology, 2005, 29(15): 15.
[24] 丁琳,张嗣瀛. 复杂网络上相继故障研究综述[J]. 计算机科学, 2012, 39(8): 813.
Ding Lin, Zhang Siying. Survey on cascading failures on complex networks[J]. Computer Science, 2012, 39(8): 813.
[25] Wang X F, Xu J. Cascading failures in coupled map lattices[J]. Physical Review E, 2004, 70(5): 056113.
[26] Watts D J. A simple model of global cascades on random networks[J]. Proceedings of the National Academy of Sciences of the United States of America, 2002, 99(9): 57665771.
[27] Motter A E, Lai Y C. Cascade-based attacks on complex networks[J]. Physical Review E, 2002, 66(6): 065102.
[28] Wang J W, Rong L L. A model for cascading failures in scale-free networks with a breakdown probability[J]. Physica A, 2009, 388(7): 12891298.
[29] Wu Z W, Peng G, Wang W X, et al. Cascading failure spreading on weighted heterogeneous networks[J]. Journal of Statistical Mechanics-Theory and Experiment, 2008, (5): 202205.
[30] 李钊,郭燕慧,徐国爱,等. 复杂网络中带有应急恢复机理的级联动力学分析[J]. 物理学报, 2014, 63(15): 417428.
Li Zhao, Guo Yanhui, Xu Guoai, et al. Analysis of cascading dynamics in complex networks with an emergency recovery mechanism[J]. Acta Physica Sinica, 2014, 63(15): 417428.
[31] Crucitti P, Latora V, Marchiori M. Model for cascading failures in complex networks[J]. Physical Review E, 2004, 69(4): 045104.
[32] Wang W X, Chen G R. Universal robustness characteristic of weighted networks against cascading failures[J]. Physical Review E, 2008, 77(2): 026101.
[33] Bao Z J, Cao Y J, Ding L J, et al. Dynamics of load entropy during cascading failure propagation in scale-free networks[J]. Physics Letters A, 2008, 372(36): 57785782.
[34] Lehmann J, Bernasconi J. Stocahastic load-redistribution model for cascading failure propagation[J]. Physical Review E, 2010, 81(3): 031129.
[35] Bakke J, Hansen A, Kertesz J. Failures and avalanches in complex networks[J]. Europhysics Letters, 2006, 76(4): 717723.
[36] Zheng J F, Gao Z Y, Zhao X M. Modeling cascading failures in congested complex networks[J]. Physica A, 2007, 385(2): 700706.
[37] Zheng J F, Gao Z Y, Zhao X M. Clustering and congestion effects on cascading failures of scale-free networks[J]. Europhysics Letters, 2007, 79(5): 58002.
[38] Wang W X, Lai Y C. Abnormal cascading on complex networks[J]. Physical Review E, 2009, 80(3): 036109.
[39] Sun H J, Zhao J, Wu J J. A robust matching model of capacity to defense cascading failure on complex networks[J]. Physica A, 2008, 387(25): 64316435.
[40] Li P, Wang B H, Sun H, et al. A limited resource model of fault-tolerant capability against cascading failure of cmplex network[J]. European Physical Journal B, 2008, 62(1): 101104.
[41] Wang B, Kim B J. A high-robustess and low-cost model for cascading failures[J]. Europhysics Letters, 2007, 78(4): 48001.
[42] Kim D H, Motter A E. Resource Allocation pattern in infrastructure networks[J]. Journal of Physics A, 2008, 41(22): 224019.
[43] 窦炳琳,张世永. 复杂网络上级联失效的负载容量模型[J]. 系统仿真学报, 2011, 23(7): 14591463.
Dou Binglin, Zhang Shiyong. Load-capacity model for cascading failures of complex networks[J]. Journal of System Simulation, 2011, 23(7): 14591463.
[44] 王建伟,荣莉莉. 基于袭击的复杂网络上的全局相继故障[J]. 管理科学, 2009, 22(3): 113120.
Wang Jianwei, Rong Lili. Universal cascading failures on complex networks based on attacks[J]. Journal of Management Science, 2009, 22(3): 113120.
[45] 韩传峰,张超,刘亮. 关键基础设施网络连锁反应模型[J]. 系统仿真技术, 2010, 6(2): 121125.
Han Chuanfeng, Zhang Chao, Liu Liang. Critical Infrastructure network model of chain reaction[J]. Journal of System Simulation, 2010, 6(2): 121125.
[46] Holme P, Kim B J, Yoon C N, et al. Attack vulnerability of complex networks[J]. Physical Review E, 2002, 66(3): 035101.
[47] 覃俊,吴泓润,易云飞,等. 代价下复杂网络攻击策略有效性研究[J]. 北京理工大学学报, 2013, 33(1): 6772.
Tan Jun, Wu Hongrun, Yi Yunfei, et al. Effectiveness of attack strategies of complex networks with cost[J]. Transactions of Beijing Institute of Technology, 2013, 33(1): 6772.
[48] 王建伟,荣莉莉. 面向相继故障的复杂网络上边袭击策略研究[J]. 系统工程学报, 2011, 26(1): 18.
Wang Jianwei, Rong Lili. Study of cascading failure-oriented attack on the edges of complex networks[J]. Journal of System Engineering, 2011, 26(1): 18.
[49] Zheng B J, Huang D. Some scale-free networks could be robust under selective node attacks[J]. Europhysics Letters, 2011, 94(2): 28010.
[50] 吴泓润,覃俊,郑波尽. 基于代价的复杂网络抗攻击性研究[J]. 计算机科学, 2012, 39(8): 224227.
Wu Hongrun, Tan Jun, Zheng Bojin. Anti-attack ability based on costs in complex networks[J]. Computer Science, 2012, 39(8): 224227.
[51] Agoston V, Csermely P, Pongor S. Multiple weak hits confuse complex systems: a transcriptional regulatory network as an example[J]. Physical Review E, 2005, 71(5): 051909.
[52] Yin Y P, Zhang D M, Tan J, et al. Continuous weight attack on attack on complex network[J]. Communications in Theoretical Physics, 2008, 49(3): 797800.
[53] Xiao S, Xiao G. On intentional attacks and protections in complex communication networks[C]//Global Telecommunications Conference, San Francisco (IEEE), 2006: 15.
[54] Xia Y, Fan J. Efficient attack strategy to communication networks with partial degree information[C]//International Symposium of Circuits and Systems, New York (IEEE), 2011: 15881591.
[55] 陈盼,吴晓锋,李怡,等. 局部信息条件下复杂网络的攻击策略[J]. 计算机应用研究, 2010, 27(12): 46224623+4629.
Chen Pan, Wu Xiaofeng, Li Yi, et al. Attack Strategy for uncertain topology of complex networks[J]. Application Research of Computers, 2010, 27(12): 46224623+4629.
[56] Wu J, Deng H Z, Tan Y J, et al. Vulnerability of complex networks under intentional attack with incomplete information[J]. Journal of Physics A, 2007, 40(11): 26652671.
[57] Shao S, Huang X Q, Stanley H E, et al. Percolation of localized attack on complex networks[J]. New Journal of Physics, 2015, 17: 023049.
[58] Dong G G, Du R J, Hao H F, et al. Modified localized attack on complex network[J]. Europhysics Letters, 2016, 113(2): 28002.
[59] 方锦清. 大数据浪潮冲击下网络科学与工程面临的挑战与机遇[J]. 自然杂志, 2013, 35(5): 345354.
Fang Jinqing. Network science and engineering faced with a new challenge and developing opportunity under the wave impact of big data[J]. Chinese Journal of Nature, 2013, 35(5): 345354.
[60] Kivelä M, Arenas A, Barthelemy M, et al. Multilayer networks[J]. Journal of Complex Networks, 2014, 2(3): 203271.
[61] Buldyrev S V, Parshani R, Paul G, et al. Catastrophic cascade of failure in interdependent networks[J]. Nature, 2010, 464(15): 10251028.
[62] Radicchi F, Arenas A. Abrupt transition in the structural formation of interconnected networks[J]. Nature Physics, 2013, 9(11): 717720.
[63] Hu Y Q, Ksherim B, Cohen R, et al. Percolation in interdependent and interconnected networks: Abrupt change from second- to first-order transitions[J]. Physical Review E, 2011, 84(6): 066116.
[64] Vespignani A. Complex networks: the fragility of interdependency[J]. Nature, 2010, 464(7291): 984985.
[65] Rosato V, Issacharoff L, Tiriticco F, et al. Modelling interdependent infrastructures using interacting dynamical models[J]. International Journal of Critical Infrastructures, 2008, 4(1/2): 6379.
[66] Newman M E J, Strogatz S H, Watts D J. Random graphs with arbitrary degree distributions and their applications[J]. Physical Review E, 2001, 64(2): 026118.
[67] Parshani R, Buldyrev S V, Havlin S. Interdependent networks: Reducing the coupling strength leads to a change from a first to second order percolation transition[J]. Physical Review Letters, 2010, 105(4): 048701.
[68] Son S, Grassberger P, Paczuski M. Percolation transitions are not always sharpened by making networks interdependent[J]. Physical Review Letters, 2011, 107(19): 195702.
[69] Gao J X, Buldyrev S V, Stanley H E, et al. Networks formed from interdependent networks[J]. Nature Physics, 2012, 8(1): 4048.
[70] Parshani R, Buldyrev S V, Havlin S. Interdependent networks: Reducing the coupling strength leads to a change from a first to second order percolation transition[J]. Physical Review Letters, 2010, 105(4): 048701.
[71] Buldyrev S V, Shere N W, Cwilich G A. Interdependent networks with identical degrees of mutually dependent nodes[J]. Physical Review E, 2011, 83(1): 016112.
[72] Parshani R, Rozenblat C, Ietri D, et al. Inter-similarity between coupled networks[J]. Europhysics Letters, 2010, 92(6): 688002.
[73] Schneider C M, Yazdani N, Araújo N A M, et al. Towards designing robust coupled networks[J]. Scientific Reports, 2013, 3: 1969.
[74] Huang X Q, Gao J X, Buldyrev S V, et al. Robustness of interdependent networks under targeted attack[J]. Physical Review E, 2011, 83(6): 065101.
[75] 李稳国,崔宪普,邓曙光,等. 目的边攻击和防御下的相互依存网络相继故障[J]. 计算机工程与应用, 2014, 50(9): 6972.
Li Wenguo, Cui Xianpu, Deng Shuguang, et al. Cascade of failures in interdependent networks under targeted attack and defense of interdependent links[J]. Computer Engineering and Applications, 2014, 50(9): 6972.
[76] 李稳国,邓曙光,催治,等. 相互依存网络边攻击下的相继故障研究[J]. 小型微型计算机系统, 2013, 34(3): 576579.
Li Wenguo, Deng Shuguang, Cui Zhi, et al. Cascade of failures in interdependent networks under attack of interdependent links[J]. Journal of Chinese Computer Systems, 2013, 34(3): 576579.
[77] 蒋宇翔,吕晨,虞红芳. 信息缺失条件下的相互依存网络抗毁性分析[J]. 计算机应用, 2015, 35(5): 12241229,1254.
Jiang Xiangyu, Lv Chen, Yu Hongfang. Survivability analysis of interdependent network with incomplete information[J]. Journal of Computer Application,2015, 35(5): 12241229,1254.
[78] Hu Y Q, Zhou D, Zhang R, et al. Percolation of interdependent networks with intersimilarity[J]. Physical Review E, 2013, 88(5): 052805.
[79] 李稳国,邓曙光,杨冰,等. 相互依存网络间的拓扑构建方法[J]. 计算机工程与应用, 2014, 50(11): 8589.
Li Wenguo, Deng Shuguang, Yang Bing, et al. Topological coupling method between interdependent networks[J]. Computer Engineering and Applications, 2014, 50(11): 8589.
[80] Zhou D, Stanley H E, D'Agostino G, et al. Assortativity decreases the robustness of interdependent networks[J]. Physical Review E, 2012, 86(6): 066103.
[81] Watanabe S, Kabashima Y. Cavity-based robustness analysis of interdependent networks: Influences of intranetwork and internetwork degree-degree correlations[J]. Physical Review E, 2014, 89(1): 012808.
[82] Igarashi A, Kuse T. Percolation of interdependent networks with degree-correlated inter-connections[C]//International Conference on Mathematical Modeling in Physical Sciences. Madrid (IOP Publishing LTD), 2014: 012003.
[83] Valdez L D, Macri P A, Stanley H E, et al. Triple point in correlated interdependent networks[J]. Physical Review E, 2013, 88(5): 050803.
[84] 王建伟,蒋晨,孙恩慧. 耦合网络边相继故障模型研究[J]. 管理科学, 2014, 27(6): 132142.
Wang Jianwei, Jiang Chen, Sun Enhui. Study on cascading failures' model of edge in coupled networks[J]. Journal of Management Science, 2014, 27(6): 132142.
[85] Cheng Z S, Cao J D. Cascade of failures in interdependent networks coupled by different type networks[J]. Physica A, 2015, 430: 193200.
[86] 陈世明,吕辉,徐青刚,等. 基于度的正/负相关相依网络模型及其鲁棒性研究[J]. 物理学报, 2015, 64(4): 48902.
Chen Shiming, Lv Hui, Xu Qinggang, et al. The model of interdependent network based on positive/negative correlation of the degree and its robustness study[J]. Acta Physica Sinica, 2015, 64(4): 048902.
[87] Zhou D, Gao J X, Stanley H E, et al. Percolation of partially interdependent scale-free networks[J]. Physical Review E, 2013, 87(5): 052812.
[88] Fu G H, Dawson R, Khoury M, et al. Interdependent networks: Vulnerability analysis and strategies to limit cascading failure[J]. European Physical Journal B, 2014, 87(7): 148.
[89] Yaan O, Qian D J, Zhang J S, et al. Optimal allocation of interconnecting links in cyber-physical systems: interdependence, cascading failures, and robustness[J]. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(9): 17081720.
[90] Shao J, Buldyrev S V, Havlin S, et al. Cascade of failures in coupled network systems with multiple support-dependence relations[J]. Physical Review E, 2011, 83(3): 036116.
[91] Dong G G, Gao J X, Tian L X, et al. Percolation of partially interdependent networks under targeted attack[J]. Physical Review E, 2012, 85(1): 016112.
[92] Dong G G, Tian L X, Du R J, et al. Analysis of percolation behaviors of clustered networks with partial support-dependence relations[J]. Physica A, 2014, 394: 370378.
[93] Jiang J, Li W, Cai X. The effect of interdependence on the percolation of interdependent networks[J]. Physica A, 2014, 410: 573581.
[94] 彭兴钊,姚宏,杜军,等. 负荷作用下相互依存网络中的级联故障[J]. 物理学报, 2015, 64(4): 048901.
Peng Xingzhao, Yao Hong, Du Jun, et al. Load-induced cascading failure in interdependent network[J]. Acta Physica Sinica, 2015, 64(4): 048901.
[95] Li W, Bashan A, Buldyrev S V, et al. Cascading failures in interdependent lattice networks: the critical role of the length of dependency links[J]. Physical Review Letters, 2012, 108(22): 228702.
[96] Danziger M M, Bashan A, Berezin Y, et al. Interdependent spatially embedded networks: Dynamics at percolation threshold[C]//International Conference on Signal-Image Technology and Internet-Based Systems. Kyoto (IEEE), 2013: 614620.
[97] Bashan A, Berezin Y, Buldyrev S V, et al. The extreme vulnerability of interdependent spatially embedded networks[J]. Nature Physics, 2013, 9(10): 667672.
[98] Shekhtman L M, Berezin Y, Danziger M M, et al. Robustness of a network formed of spatially embedded networks[J]. Physical Review E, 2014, 90(1): 012809.
[99] Kornbluth Y, Lowinger S, Cwilich G, et al. Cascading failures in networks with proximate dependent nodes[J]. Physical Review E, 2014, 89(3): 032808.
[100] Zhang L M, Li D Q, Qin P J, et al. Reliability analysis of interdependent lattices[J]. Physica A, 2016, 452: 120125.
[101] Berezin Y, Bashan A, Danziger M M, et al. Spatially localized attacks on interdependent networks: the existence of a finite critical attack size[J]. 2013, arXiv:1310.0996.
[102] Gao J X, Li D Q, Havlin S. From a single network to a network of networks[J]. National Science Review, 2014, 1(3): 346356.
[103] Hu Y Q, Ksherim B, Cohen R, et al. Percolation in interdependent and interconnected networks: abrupt change from second- to first-order transitions[J]. Physical Review E, 2011, 84(6): 066116.
[104] Buldyrev S V, Parshani R, Paul G, et al. Catastrophic cascade of failure in interdependent networks[J]. Nature, 2010, 464(15): 10251028.
[105] Leicht E A, D'Souza R M. Percolation on interacting networks[J]. 2009, arXiv:0907.0894.
[106] Tian L X, Huang Y, Dong G G, et al. Robustness of interdependent and interconnected clustered networks[J]. Physica A, 2014, 412: 120126.
[107] Shao S, Huang X Q, Stanley H E, et al. Robustness of a partially interdependent network formed of clustered networks[J]. Physical Review E, 2014, 89(3): 032812.
[108] Huang X Q, Shao S, Wang H J, et al. The robustness of interdependent clustered networks[J]. Europhysics Letters, 2013, 101(1): 18002.
[109] Li R Q, Sun S W, Ma Y L, et al. Effect of clustering on attack vulnerability of interdependent scale-free networks[J]. Chaos, Solitons and Fractals, 2015, 80(SI): 109116.
[110] Gao J X, Buldyrev S V, Havlin S, et al. Robustness of a network formed by n interdependent networks with a one-to-one correspondence of dependent nodes[J]. Physical Review E, 2012, 85(6): 066134.
[111] Gao J, Buldyrev S V, Havlin S, et al. Robustness of a network of networks[J]. Physical Review Letters, 2011, 107(19): 195701.
[112] Gao J X, Buldyrev S V, Stanley H E, et al. Networks formed from interdependent networks[J]. Nature Physics, 2012, 8(1): 4048.
[113] Gao J X, Buldyrev S V, Stanley H E, et al. Percolation of a general network of networks[J]. Physical Review E, 2013, 88(6): 062816.
[114] Gao J X, Liu X M, Li D Q, et al. Recent progress on the resilience of complex networks[J]. Energies, 2015, 8(10): 1218712210.
[115] Dong G G, Tian L X, Zhou D, et al. Robustness of n interdependent networks with partial support-dependence relation[J]. Europhysics Letters, 2013, 102(6): 68004.
[116] Dong G G, Gao J X, Du R J, et al. Robustness of network of networks under targeted attack[J]. Physical Review E, 2013, 87(5): 052804.
[117] Zio E, Sansavini G. Modeling interdependent network systems for identifying cascade-safe operating margins[J]. IEEE Transactions on Reliability, 2011, 60(1): 94101.
[118] Brummitt C D, D'Souza R M, Leicht E A. Suppressing cascades of load in interdependent networks[J]. Proceedings of the National Academy of Science of the United States of America, 2012, 109(12): 680689.
[119] Su Z, Li L, Peng H, et al. Robustness of interrelated traffic networks to cascading failures[J]. Scientific Reports, 2014, 4: 5413.
[120] Wang S L, Hong L, Chen X G. Vulnerability analysis of interdependent infrastructure systems: a methodological framework[J]. Physica A, 2012, 391(11): 33233335.
[121] Chen Z, Du W B, Cao X B, et al. Cascading failure of interdependent networks with different coupling preference under targeted attack[J]. Chaos, Solitons and Fractals, 2015, 80(SI): 712.
[122] Hong S, Wang B Q, Ma X M, et al. Failure cascade in interdependent network with traffic loads[J]. Journal of Physics A, 2015, 48(48): 485101.
[123] Tan F, Xia Y X, Wei Z. Robust-yet-fragile nature of interdependent networks[J]. Physical Review E, 2015, 91(5): 052809.
[124] 陈世明,邹小群,吕辉,等. 面向级联失效的相依网络鲁棒性研究[J]. 物理学报, 2014, 63(2): 028902.
Chen Shiming, Zou Xiaoqun, Lv Hui, et al. Research on robustness of interdependent network for suppressing cascading failure[J]. Acta Physica Sinica, 2014, 63(2): 028902.
[125] Ji X P, Wang B, Liu D C, et al. Improving interdependent networks robustness by adding connectivity links[J]. Physica A, 2016, 444: 919.
[126] Albrecht J, Berens D G, Jaroszewicz B, et al. Correlated loss of ecosystem services in coupled mutualistic networks[J]. Nature Communications, 2014, 5: 3810.
[127] Chopade P, Bikdash M. Structural and functional vulnerability analysis for survivability of smart grid and SCADA network under severe emergencies and WMD attacks[C]//International Conference on Technologies for Homeland Security, Waltham, MA(IEEE), 2013: 99105.
[128] 雷璐宁,石为人,熊庆宇,等. 基础设施网络关联模型研究[J]. 仪器仪表学报, 2013, 34(12): 26602665.
Lei Luning, Shi Weiren, Xiong Qingyu, et al. Research on correlative model of infrastructure network[J]. Chinese Journal of Scientific Instrument, 2013, 34(12): 26602665.
[129] 毛子骏,费奇,廖元文,等. 城市基础设施网络关联响应研究[J]. 华中科技大学学报(自然科学版), 2009, 37(2): 6467.
Mao Zijun, Fei Qi, Liao Yuanwen, et al. Interdependent response of urban infrastructure's networks[J]. Journal of Huazhong University of Science & Technology (Natural Science Edition), 2009, 37(2): 6467.
[130] Wang S L, Hong L, Chen X G. Vulnerability analysis of interdependent infrastructure systems: a methodological framework[J]. Physica A, 2012, 391(11): 33233335.
[131] Ouyang M, Dueas-Osorio L. An approach to design interface topologies across interdependent urban infrastructure systems[J]. Reliability Engineering & System Safety, 2011, 96(11): 14621473.
[132] Johansson J, Hassel H. An approach for modelling interdependent infrastructures in the context of vulnerability analysis[J]. Reliability Engineering & System Safety, 2010, 95(12): 13351344.
[133] 孟令中,陆民燕,黄百乔,等. 网络控制系统的连锁失效影响分析[J]. 合肥工业大学学报(自然科学版), 2012, 35(3): 353356+432.
Meng Lingzhong, Lu Minyan, Huang Baiqiao, et al. Chain failure impact analysis for network control system[J]. Journal of Hefei University of Technology (Natural Science Edition), 2012, 35(3): 353356+432.
[134] 杨婧,陈英武,沈永平. 基于相互作用网络的大型工程项目组织结构风险分析[J]. 系统工程理论与实践, 2011, 31(10): 19661973.
Yang Jing, Chen Yingwu, Shen Yongping. Interdependent network based risk analysis of organizational structures for large-scale engineering project[J]. Systems Engineering-Theory & Practice, 2011, 31(10): 19661973.
[135] Roukny T, Bersini H, Pirotte H, et al. Default cascades in complex networks: topology and systemic risk[J]. Scientific Reports, 2013, 3: 2759.
[136] Zhang J H, Song B, Zhang Z J, et al. An approach for modeling vulnerability of the network of networks[J]. Physica A, 2014, 412: 127136.
[137] 郭庆来,辛蜀骏,王剑辉,等. 由乌克兰停电事件看信息能源系统综合安全评估[J]. 电力系统自动化, 2016, 40(5): 14.
Guo Qinglai, Xin Shujun, Wang Jianhui, et al. Comprehensive security assessment for a cyber physical energy system: a lesson from Ukraine's blackout[J]. Automation of Electric Power Systems, 2016, 40(5): 14.