Please wait a minute...
文章检索
复杂系统与复杂性科学  2017, Vol. 14 Issue (3): 30-44    DOI: 10.13306/j.1672-3813.2017.03.003
  本期目录 | 过刊浏览 | 高级检索 |
相互依存网络抗毁性研究综述
董政呈a, 方彦军a, 田猛b
武汉大学a.动力与机械学院;b.电子信息学院,武汉 430072
Review on Invulnerability of Interdependent Networks
DONG Zhengchenga, FANG Yanjuna, TIAN Mengb
a.School of power and mechanical engineering; b.School of electronic and information, Wuhan University, Wuhan 430072, China
全文: PDF(2044 KB)  
输出: BibTeX | EndNote (RIS)      
摘要 通过文献整理和分类,对近年来相互依存网络抗毁性的研究现状进行了综述。作为相互依存网络抗毁性的研究基础,首先介绍了复杂网络抗毁性常用的研究方法;然后对相关文献进行了梳理和分类,并以电力系统为例介绍了相互依存网络的应用;最后对相互依存网络抗毁性的研究和发展进行了总结和展望。希望能为研究者提供一定的参考和研究思路。
服务
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章
董政呈
方彦军
田猛
关键词 相互依存网络抗毁性级联失效电力信息耦合网络    
Abstract:Via arrangement and classification of literatures, a review on invulnerability of interdependent networks in recent years is made. As the research foundation of invulnerability of interdependent networks, this paper first introduces some common methods of network invulnerability. Then we make arrangements on related researches from some fields, and take the power system as an example to explain the applications of interdependent networks. In the end, some conclusions and outlook are made for the researches and developments of invulnerability on interdependent networks. We hope this review can provide reference and research idea for researchers.
Key wordsinterdependent networks    invulnerability    cascading failures    power-communication coupled networks
收稿日期: 2016-11-08      出版日期: 2019-01-10
ZTFLH:  N94  
基金资助:国家自然科学基金(51707135);中国博士后科学基金(2017M612499);中央高校基本科研业务费专项资金项目(413000057,2042017kf0037)
作者简介: 董政呈(1990),男,河南周口人,助理研究员,主要研究方向为相互依存网络,物理信息融合电力系统。
引用本文:   
董政呈, 方彦军, 田猛. 相互依存网络抗毁性研究综述[J]. 复杂系统与复杂性科学, 2017, 14(3): 30-44.
DONG Zhengcheng, FANG Yanjun, TIAN Meng. Review on Invulnerability of Interdependent Networks. Complex Systems and Complexity Science, 2017, 14(3): 30-44.
链接本文:  
http://fzkx.qdu.edu.cn/CN/10.13306/j.1672-3813.2017.03.003      或      http://fzkx.qdu.edu.cn/CN/Y2017/V14/I3/30
[1]Barabási A L, Albert R. Emergence of scaling in random networks[J]. Science, 1999, 286(5439): 509512.
[2]Watts D J, Strogatz S H. Collective dynamics of 'small-world' networks[J]. Nature, 1998, 393(6684): 440442.
[3]Albert R, Jeong H, Barabási A L. Error and attack tolerance of complex networks[J]. Nature, 2000, 406(6794): 378382.
[4]William R Graham. Report of the Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP) Attack: Critical National Infrastructures[B]. McLean: Congressional EMP Commission, 2008: 912.
[5]Rinaldi S M, Peerenboom J P, Kelly T K. Identifying, understanding, and analyzing critical infrastructure interdependencies[J]. IEEE Transactions on Control Systems, 2001, 21(6): 1125.
[6]Ouyang M, Dueas-Osorio L. Efficient approach to compute generalized interdependent effects between infrastructure systems[J]. Journal of Computing in Civil Engineering, 2011, 25(5): 394406.
[7]Wang S, Hong L, Ouyang M, et al. Vulnerability analysis of interdependent infrastructure systems under edge attack strategies[J]. Safety Science, 2013, 51(1): 328337.
[8]李国颖,成柏松,张鹏,等. 相互依存网络鲁棒性研究综述[J]. 电子科技大学学报, 2013, 42(1): 2328.
Li Guoying, Cheng Bosong, Zhang Peng, et al. Review of the Interdependent Networks[J]. Journal of University of Electronic Science and Technology of China, 2013, 42(1): 2328.
[9]Frank H, Frisch I T. Analysis and design of survivable network[J]. IEEE Transactions on Communication Technology, 1970, 18(5): 567662.
[10] Barefoot C A, Entrinfer R C, Swart H C. Vulnerability in graphs-A comparative survey[J]. Journal of Combinatorial Mathematics and Combinatorial Computing, 1987, 58: 101114.
[11] Bassalygo L A, Pinsker M S. The complexity of an optimal non-blocking commutation scheme without reorganization[J]. Problemy Peredaci Informacii, 1973, 9(1): 8487.
[12] Chvátal V. Tough graphs and hamiltonian circuits[J]. Discrete Mathematics, 1973, 5(3): 215228.
[13] Jung H A. On a class of posets and the corresponding comparability graphs[J]. Journal of Combinatorial Theory, Series B, 1978, 24(2): 125133.
[14] 许进,席酉民,汪应洛. 系统的核与核度[J]. 系统科学与数学, 1993, 13(2): 102110.
Xu Jin, Xi Youmin, Wang Yingluo. On system core and coritivity(I)[J]. Journal of System Science & mathmatical science, 1993, 13(2): 102110.
[15] Wu J, Barahona M, Tan Y J, et al. Natural connectivity of complex networks[J]. Chinese Physics Letters, 2010, 27(7): 078902.
[16] Wu J, Barahona M, Tan Y J, et al. Spectral measure of structural robustness in complex networks[J]. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, 2011, 41(6): 12441252.
[17] Shang Y L. Perturbation results for the Estrada index in weighted networks[J]. Journal of Physics A, 2011, 44(7): 075003.
[18] Shang Y L. Local natural connectivity in complex networks[J]. Chinese Physics Letters, 2011, 28(6): 068903.
[19] 狄鹏,胡涛,胡斌,等. 基于复杂网络的作战网络模型抗毁性研究[J]. 系统仿真学报, 2011, 23(1): 5660.
Di peng, Hu Tao, Hu Bin, et al. Research on invulnerability of combat net model based on complex networks[J]. Journal of System Simulation, 2011, 23(1): 5660.
[20] Dong Z C, Fang Y J, Tian M, et al. Approaches to improving the robustness of interdependent networks against cascaeding failures with load-based model[J]. Modern Physics Letters B, 2015, 29(32): 1550210.
[21] 吴艾,刘心松,刘丹. 基于流量攻击和边失效的复杂网络脆弱特性[J]. 电子与信息学报, 2009, 31(12): 29973000.
Wu Ai, Liu Xinsong, Liu Dan. Frangibility of complex networks based on flow attack and edge failure[J]. Journal of Electronics & Information Technology, 2009, 31(12): 29973000.
[22] Bak P, Tang C, Wiesenfeld K. Self-organized criticality: an explanation of the 1/f noise[J]. Physical Review Letters, 1987, 59(4): 381384.
[23] 曹一家,江全元,丁理杰. 电力系统大停电的自组织临界现象[J]. 电网技术, 2005, 29(15): 15.
Cao Yijia, Jiang Quanyuan, Ding Lijie. Self-organized criticality phenomenon for power system blackouts[J]. Power System Technology, 2005, 29(15): 15.
[24] 丁琳,张嗣瀛. 复杂网络上相继故障研究综述[J]. 计算机科学, 2012, 39(8): 813.
Ding Lin, Zhang Siying. Survey on cascading failures on complex networks[J]. Computer Science, 2012, 39(8): 813.
[25] Wang X F, Xu J. Cascading failures in coupled map lattices[J]. Physical Review E, 2004, 70(5): 056113.
[26] Watts D J. A simple model of global cascades on random networks[J]. Proceedings of the National Academy of Sciences of the United States of America, 2002, 99(9): 57665771.
[27] Motter A E, Lai Y C. Cascade-based attacks on complex networks[J]. Physical Review E, 2002, 66(6): 065102.
[28] Wang J W, Rong L L. A model for cascading failures in scale-free networks with a breakdown probability[J]. Physica A, 2009, 388(7): 12891298.
[29] Wu Z W, Peng G, Wang W X, et al. Cascading failure spreading on weighted heterogeneous networks[J]. Journal of Statistical Mechanics-Theory and Experiment, 2008, (5): 202205.
[30] 李钊,郭燕慧,徐国爱,等. 复杂网络中带有应急恢复机理的级联动力学分析[J]. 物理学报, 2014, 63(15): 417428.
Li Zhao, Guo Yanhui, Xu Guoai, et al. Analysis of cascading dynamics in complex networks with an emergency recovery mechanism[J]. Acta Physica Sinica, 2014, 63(15): 417428.
[31] Crucitti P, Latora V, Marchiori M. Model for cascading failures in complex networks[J]. Physical Review E, 2004, 69(4): 045104.
[32] Wang W X, Chen G R. Universal robustness characteristic of weighted networks against cascading failures[J]. Physical Review E, 2008, 77(2): 026101.
[33] Bao Z J, Cao Y J, Ding L J, et al. Dynamics of load entropy during cascading failure propagation in scale-free networks[J]. Physics Letters A, 2008, 372(36): 57785782.
[34] Lehmann J, Bernasconi J. Stocahastic load-redistribution model for cascading failure propagation[J]. Physical Review E, 2010, 81(3): 031129.
[35] Bakke J, Hansen A, Kertesz J. Failures and avalanches in complex networks[J]. Europhysics Letters, 2006, 76(4): 717723.
[36] Zheng J F, Gao Z Y, Zhao X M. Modeling cascading failures in congested complex networks[J]. Physica A, 2007, 385(2): 700706.
[37] Zheng J F, Gao Z Y, Zhao X M. Clustering and congestion effects on cascading failures of scale-free networks[J]. Europhysics Letters, 2007, 79(5): 58002.
[38] Wang W X, Lai Y C. Abnormal cascading on complex networks[J]. Physical Review E, 2009, 80(3): 036109.
[39] Sun H J, Zhao J, Wu J J. A robust matching model of capacity to defense cascading failure on complex networks[J]. Physica A, 2008, 387(25): 64316435.
[40] Li P, Wang B H, Sun H, et al. A limited resource model of fault-tolerant capability against cascading failure of cmplex network[J]. European Physical Journal B, 2008, 62(1): 101104.
[41] Wang B, Kim B J. A high-robustess and low-cost model for cascading failures[J]. Europhysics Letters, 2007, 78(4): 48001.
[42] Kim D H, Motter A E. Resource Allocation pattern in infrastructure networks[J]. Journal of Physics A, 2008, 41(22): 224019.
[43] 窦炳琳,张世永. 复杂网络上级联失效的负载容量模型[J]. 系统仿真学报, 2011, 23(7): 14591463.
Dou Binglin, Zhang Shiyong. Load-capacity model for cascading failures of complex networks[J]. Journal of System Simulation, 2011, 23(7): 14591463.
[44] 王建伟,荣莉莉. 基于袭击的复杂网络上的全局相继故障[J]. 管理科学, 2009, 22(3): 113120.
Wang Jianwei, Rong Lili. Universal cascading failures on complex networks based on attacks[J]. Journal of Management Science, 2009, 22(3): 113120.
[45] 韩传峰,张超,刘亮. 关键基础设施网络连锁反应模型[J]. 系统仿真技术, 2010, 6(2): 121125.
Han Chuanfeng, Zhang Chao, Liu Liang. Critical Infrastructure network model of chain reaction[J]. Journal of System Simulation, 2010, 6(2): 121125.
[46] Holme P, Kim B J, Yoon C N, et al. Attack vulnerability of complex networks[J]. Physical Review E, 2002, 66(3): 035101.
[47] 覃俊,吴泓润,易云飞,等. 代价下复杂网络攻击策略有效性研究[J]. 北京理工大学学报, 2013, 33(1): 6772.
Tan Jun, Wu Hongrun, Yi Yunfei, et al. Effectiveness of attack strategies of complex networks with cost[J]. Transactions of Beijing Institute of Technology, 2013, 33(1): 6772.
[48] 王建伟,荣莉莉. 面向相继故障的复杂网络上边袭击策略研究[J]. 系统工程学报, 2011, 26(1): 18.
Wang Jianwei, Rong Lili. Study of cascading failure-oriented attack on the edges of complex networks[J]. Journal of System Engineering, 2011, 26(1): 18.
[49] Zheng B J, Huang D. Some scale-free networks could be robust under selective node attacks[J]. Europhysics Letters, 2011, 94(2): 28010.
[50] 吴泓润,覃俊,郑波尽. 基于代价的复杂网络抗攻击性研究[J]. 计算机科学, 2012, 39(8): 224227.
Wu Hongrun, Tan Jun, Zheng Bojin. Anti-attack ability based on costs in complex networks[J]. Computer Science, 2012, 39(8): 224227.
[51] Agoston V, Csermely P, Pongor S. Multiple weak hits confuse complex systems: a transcriptional regulatory network as an example[J]. Physical Review E, 2005, 71(5): 051909.
[52] Yin Y P, Zhang D M, Tan J, et al. Continuous weight attack on attack on complex network[J]. Communications in Theoretical Physics, 2008, 49(3): 797800.
[53] Xiao S, Xiao G. On intentional attacks and protections in complex communication networks[C]//Global Telecommunications Conference, San Francisco (IEEE), 2006: 15.
[54] Xia Y, Fan J. Efficient attack strategy to communication networks with partial degree information[C]//International Symposium of Circuits and Systems, New York (IEEE), 2011: 15881591.
[55] 陈盼,吴晓锋,李怡,等. 局部信息条件下复杂网络的攻击策略[J]. 计算机应用研究, 2010, 27(12): 46224623+4629.
Chen Pan, Wu Xiaofeng, Li Yi, et al. Attack Strategy for uncertain topology of complex networks[J]. Application Research of Computers, 2010, 27(12): 46224623+4629.
[56] Wu J, Deng H Z, Tan Y J, et al. Vulnerability of complex networks under intentional attack with incomplete information[J]. Journal of Physics A, 2007, 40(11): 26652671.
[57] Shao S, Huang X Q, Stanley H E, et al. Percolation of localized attack on complex networks[J]. New Journal of Physics, 2015, 17: 023049.
[58] Dong G G, Du R J, Hao H F, et al. Modified localized attack on complex network[J]. Europhysics Letters, 2016, 113(2): 28002.
[59] 方锦清. 大数据浪潮冲击下网络科学与工程面临的挑战与机遇[J]. 自然杂志, 2013, 35(5): 345354.
Fang Jinqing. Network science and engineering faced with a new challenge and developing opportunity under the wave impact of big data[J]. Chinese Journal of Nature, 2013, 35(5): 345354.
[60] Kivelä M, Arenas A, Barthelemy M, et al. Multilayer networks[J]. Journal of Complex Networks, 2014, 2(3): 203271.
[61] Buldyrev S V, Parshani R, Paul G, et al. Catastrophic cascade of failure in interdependent networks[J]. Nature, 2010, 464(15): 10251028.
[62] Radicchi F, Arenas A. Abrupt transition in the structural formation of interconnected networks[J]. Nature Physics, 2013, 9(11): 717720.
[63] Hu Y Q, Ksherim B, Cohen R, et al. Percolation in interdependent and interconnected networks: Abrupt change from second- to first-order transitions[J]. Physical Review E, 2011, 84(6): 066116.
[64] Vespignani A. Complex networks: the fragility of interdependency[J]. Nature, 2010, 464(7291): 984985.
[65] Rosato V, Issacharoff L, Tiriticco F, et al. Modelling interdependent infrastructures using interacting dynamical models[J]. International Journal of Critical Infrastructures, 2008, 4(1/2): 6379.
[66] Newman M E J, Strogatz S H, Watts D J. Random graphs with arbitrary degree distributions and their applications[J]. Physical Review E, 2001, 64(2): 026118.
[67] Parshani R, Buldyrev S V, Havlin S. Interdependent networks: Reducing the coupling strength leads to a change from a first to second order percolation transition[J]. Physical Review Letters, 2010, 105(4): 048701.
[68] Son S, Grassberger P, Paczuski M. Percolation transitions are not always sharpened by making networks interdependent[J]. Physical Review Letters, 2011, 107(19): 195702.
[69] Gao J X, Buldyrev S V, Stanley H E, et al. Networks formed from interdependent networks[J]. Nature Physics, 2012, 8(1): 4048.
[70] Parshani R, Buldyrev S V, Havlin S. Interdependent networks: Reducing the coupling strength leads to a change from a first to second order percolation transition[J]. Physical Review Letters, 2010, 105(4): 048701.
[71] Buldyrev S V, Shere N W, Cwilich G A. Interdependent networks with identical degrees of mutually dependent nodes[J]. Physical Review E, 2011, 83(1): 016112.
[72] Parshani R, Rozenblat C, Ietri D, et al. Inter-similarity between coupled networks[J]. Europhysics Letters, 2010, 92(6): 688002.
[73] Schneider C M, Yazdani N, Araújo N A M, et al. Towards designing robust coupled networks[J]. Scientific Reports, 2013, 3: 1969.
[74] Huang X Q, Gao J X, Buldyrev S V, et al. Robustness of interdependent networks under targeted attack[J]. Physical Review E, 2011, 83(6): 065101.
[75] 李稳国,崔宪普,邓曙光,等. 目的边攻击和防御下的相互依存网络相继故障[J]. 计算机工程与应用, 2014, 50(9): 6972.
Li Wenguo, Cui Xianpu, Deng Shuguang, et al. Cascade of failures in interdependent networks under targeted attack and defense of interdependent links[J]. Computer Engineering and Applications, 2014, 50(9): 6972.
[76] 李稳国,邓曙光,催治,等. 相互依存网络边攻击下的相继故障研究[J]. 小型微型计算机系统, 2013, 34(3): 576579.
Li Wenguo, Deng Shuguang, Cui Zhi, et al. Cascade of failures in interdependent networks under attack of interdependent links[J]. Journal of Chinese Computer Systems, 2013, 34(3): 576579.
[77] 蒋宇翔,吕晨,虞红芳. 信息缺失条件下的相互依存网络抗毁性分析[J]. 计算机应用, 2015, 35(5): 12241229,1254.
Jiang Xiangyu, Lv Chen, Yu Hongfang. Survivability analysis of interdependent network with incomplete information[J]. Journal of Computer Application,2015, 35(5): 12241229,1254.
[78] Hu Y Q, Zhou D, Zhang R, et al. Percolation of interdependent networks with intersimilarity[J]. Physical Review E, 2013, 88(5): 052805.
[79] 李稳国,邓曙光,杨冰,等. 相互依存网络间的拓扑构建方法[J]. 计算机工程与应用, 2014, 50(11): 8589.
Li Wenguo, Deng Shuguang, Yang Bing, et al. Topological coupling method between interdependent networks[J]. Computer Engineering and Applications, 2014, 50(11): 8589.
[80] Zhou D, Stanley H E, D'Agostino G, et al. Assortativity decreases the robustness of interdependent networks[J]. Physical Review E, 2012, 86(6): 066103.
[81] Watanabe S, Kabashima Y. Cavity-based robustness analysis of interdependent networks: Influences of intranetwork and internetwork degree-degree correlations[J]. Physical Review E, 2014, 89(1): 012808.
[82] Igarashi A, Kuse T. Percolation of interdependent networks with degree-correlated inter-connections[C]//International Conference on Mathematical Modeling in Physical Sciences. Madrid (IOP Publishing LTD), 2014: 012003.
[83] Valdez L D, Macri P A, Stanley H E, et al. Triple point in correlated interdependent networks[J]. Physical Review E, 2013, 88(5): 050803.
[84] 王建伟,蒋晨,孙恩慧. 耦合网络边相继故障模型研究[J]. 管理科学, 2014, 27(6): 132142.
Wang Jianwei, Jiang Chen, Sun Enhui. Study on cascading failures' model of edge in coupled networks[J]. Journal of Management Science, 2014, 27(6): 132142.
[85] Cheng Z S, Cao J D. Cascade of failures in interdependent networks coupled by different type networks[J]. Physica A, 2015, 430: 193200.
[86] 陈世明,吕辉,徐青刚,等. 基于度的正/负相关相依网络模型及其鲁棒性研究[J]. 物理学报, 2015, 64(4): 48902.
Chen Shiming, Lv Hui, Xu Qinggang, et al. The model of interdependent network based on positive/negative correlation of the degree and its robustness study[J]. Acta Physica Sinica, 2015, 64(4): 048902.
[87] Zhou D, Gao J X, Stanley H E, et al. Percolation of partially interdependent scale-free networks[J]. Physical Review E, 2013, 87(5): 052812.
[88] Fu G H, Dawson R, Khoury M, et al. Interdependent networks: Vulnerability analysis and strategies to limit cascading failure[J]. European Physical Journal B, 2014, 87(7): 148.
[89] Yaan O, Qian D J, Zhang J S, et al. Optimal allocation of interconnecting links in cyber-physical systems: interdependence, cascading failures, and robustness[J]. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(9): 17081720.
[90] Shao J, Buldyrev S V, Havlin S, et al. Cascade of failures in coupled network systems with multiple support-dependence relations[J]. Physical Review E, 2011, 83(3): 036116.
[91] Dong G G, Gao J X, Tian L X, et al. Percolation of partially interdependent networks under targeted attack[J]. Physical Review E, 2012, 85(1): 016112.
[92] Dong G G, Tian L X, Du R J, et al. Analysis of percolation behaviors of clustered networks with partial support-dependence relations[J]. Physica A, 2014, 394: 370378.
[93] Jiang J, Li W, Cai X. The effect of interdependence on the percolation of interdependent networks[J]. Physica A, 2014, 410: 573581.
[94] 彭兴钊,姚宏,杜军,等. 负荷作用下相互依存网络中的级联故障[J]. 物理学报, 2015, 64(4): 048901.
Peng Xingzhao, Yao Hong, Du Jun, et al. Load-induced cascading failure in interdependent network[J]. Acta Physica Sinica, 2015, 64(4): 048901.
[95] Li W, Bashan A, Buldyrev S V, et al. Cascading failures in interdependent lattice networks: the critical role of the length of dependency links[J]. Physical Review Letters, 2012, 108(22): 228702.
[96] Danziger M M, Bashan A, Berezin Y, et al. Interdependent spatially embedded networks: Dynamics at percolation threshold[C]//International Conference on Signal-Image Technology and Internet-Based Systems. Kyoto (IEEE), 2013: 614620.
[97] Bashan A, Berezin Y, Buldyrev S V, et al. The extreme vulnerability of interdependent spatially embedded networks[J]. Nature Physics, 2013, 9(10): 667672.
[98] Shekhtman L M, Berezin Y, Danziger M M, et al. Robustness of a network formed of spatially embedded networks[J]. Physical Review E, 2014, 90(1): 012809.
[99] Kornbluth Y, Lowinger S, Cwilich G, et al. Cascading failures in networks with proximate dependent nodes[J]. Physical Review E, 2014, 89(3): 032808.
[100] Zhang L M, Li D Q, Qin P J, et al. Reliability analysis of interdependent lattices[J]. Physica A, 2016, 452: 120125.
[101] Berezin Y, Bashan A, Danziger M M, et al. Spatially localized attacks on interdependent networks: the existence of a finite critical attack size[J]. 2013, arXiv:1310.0996.
[102] Gao J X, Li D Q, Havlin S. From a single network to a network of networks[J]. National Science Review, 2014, 1(3): 346356.
[103] Hu Y Q, Ksherim B, Cohen R, et al. Percolation in interdependent and interconnected networks: abrupt change from second- to first-order transitions[J]. Physical Review E, 2011, 84(6): 066116.
[104] Buldyrev S V, Parshani R, Paul G, et al. Catastrophic cascade of failure in interdependent networks[J]. Nature, 2010, 464(15): 10251028.
[105] Leicht E A, D'Souza R M. Percolation on interacting networks[J]. 2009, arXiv:0907.0894.
[106] Tian L X, Huang Y, Dong G G, et al. Robustness of interdependent and interconnected clustered networks[J]. Physica A, 2014, 412: 120126.
[107] Shao S, Huang X Q, Stanley H E, et al. Robustness of a partially interdependent network formed of clustered networks[J]. Physical Review E, 2014, 89(3): 032812.
[108] Huang X Q, Shao S, Wang H J, et al. The robustness of interdependent clustered networks[J]. Europhysics Letters, 2013, 101(1): 18002.
[109] Li R Q, Sun S W, Ma Y L, et al. Effect of clustering on attack vulnerability of interdependent scale-free networks[J]. Chaos, Solitons and Fractals, 2015, 80(SI): 109116.
[110] Gao J X, Buldyrev S V, Havlin S, et al. Robustness of a network formed by n interdependent networks with a one-to-one correspondence of dependent nodes[J]. Physical Review E, 2012, 85(6): 066134.
[111] Gao J, Buldyrev S V, Havlin S, et al. Robustness of a network of networks[J]. Physical Review Letters, 2011, 107(19): 195701.
[112] Gao J X, Buldyrev S V, Stanley H E, et al. Networks formed from interdependent networks[J]. Nature Physics, 2012, 8(1): 4048.
[113] Gao J X, Buldyrev S V, Stanley H E, et al. Percolation of a general network of networks[J]. Physical Review E, 2013, 88(6): 062816.
[114] Gao J X, Liu X M, Li D Q, et al. Recent progress on the resilience of complex networks[J]. Energies, 2015, 8(10): 1218712210.
[115] Dong G G, Tian L X, Zhou D, et al. Robustness of n interdependent networks with partial support-dependence relation[J]. Europhysics Letters, 2013, 102(6): 68004.
[116] Dong G G, Gao J X, Du R J, et al. Robustness of network of networks under targeted attack[J]. Physical Review E, 2013, 87(5): 052804.
[117] Zio E, Sansavini G. Modeling interdependent network systems for identifying cascade-safe operating margins[J]. IEEE Transactions on Reliability, 2011, 60(1): 94101.
[118] Brummitt C D, D'Souza R M, Leicht E A. Suppressing cascades of load in interdependent networks[J]. Proceedings of the National Academy of Science of the United States of America, 2012, 109(12): 680689.
[119] Su Z, Li L, Peng H, et al. Robustness of interrelated traffic networks to cascading failures[J]. Scientific Reports, 2014, 4: 5413.
[120] Wang S L, Hong L, Chen X G. Vulnerability analysis of interdependent infrastructure systems: a methodological framework[J]. Physica A, 2012, 391(11): 33233335.
[121] Chen Z, Du W B, Cao X B, et al. Cascading failure of interdependent networks with different coupling preference under targeted attack[J]. Chaos, Solitons and Fractals, 2015, 80(SI): 712.
[122] Hong S, Wang B Q, Ma X M, et al. Failure cascade in interdependent network with traffic loads[J]. Journal of Physics A, 2015, 48(48): 485101.
[123] Tan F, Xia Y X, Wei Z. Robust-yet-fragile nature of interdependent networks[J]. Physical Review E, 2015, 91(5): 052809.
[124] 陈世明,邹小群,吕辉,等. 面向级联失效的相依网络鲁棒性研究[J]. 物理学报, 2014, 63(2): 028902.
Chen Shiming, Zou Xiaoqun, Lv Hui, et al. Research on robustness of interdependent network for suppressing cascading failure[J]. Acta Physica Sinica, 2014, 63(2): 028902.
[125] Ji X P, Wang B, Liu D C, et al. Improving interdependent networks robustness by adding connectivity links[J]. Physica A, 2016, 444: 919.
[126] Albrecht J, Berens D G, Jaroszewicz B, et al. Correlated loss of ecosystem services in coupled mutualistic networks[J]. Nature Communications, 2014, 5: 3810.
[127] Chopade P, Bikdash M. Structural and functional vulnerability analysis for survivability of smart grid and SCADA network under severe emergencies and WMD attacks[C]//International Conference on Technologies for Homeland Security, Waltham, MA(IEEE), 2013: 99105.
[128] 雷璐宁,石为人,熊庆宇,等. 基础设施网络关联模型研究[J]. 仪器仪表学报, 2013, 34(12): 26602665.
Lei Luning, Shi Weiren, Xiong Qingyu, et al. Research on correlative model of infrastructure network[J]. Chinese Journal of Scientific Instrument, 2013, 34(12): 26602665.
[129] 毛子骏,费奇,廖元文,等. 城市基础设施网络关联响应研究[J]. 华中科技大学学报(自然科学版), 2009, 37(2): 6467.
Mao Zijun, Fei Qi, Liao Yuanwen, et al. Interdependent response of urban infrastructure's networks[J]. Journal of Huazhong University of Science & Technology (Natural Science Edition), 2009, 37(2): 6467.
[130] Wang S L, Hong L, Chen X G. Vulnerability analysis of interdependent infrastructure systems: a methodological framework[J]. Physica A, 2012, 391(11): 33233335.
[131] Ouyang M, Dueas-Osorio L. An approach to design interface topologies across interdependent urban infrastructure systems[J]. Reliability Engineering & System Safety, 2011, 96(11): 14621473.
[132] Johansson J, Hassel H. An approach for modelling interdependent infrastructures in the context of vulnerability analysis[J]. Reliability Engineering & System Safety, 2010, 95(12): 13351344.
[133] 孟令中,陆民燕,黄百乔,等. 网络控制系统的连锁失效影响分析[J]. 合肥工业大学学报(自然科学版), 2012, 35(3): 353356+432.
Meng Lingzhong, Lu Minyan, Huang Baiqiao, et al. Chain failure impact analysis for network control system[J]. Journal of Hefei University of Technology (Natural Science Edition), 2012, 35(3): 353356+432.
[134] 杨婧,陈英武,沈永平. 基于相互作用网络的大型工程项目组织结构风险分析[J]. 系统工程理论与实践, 2011, 31(10): 19661973.
Yang Jing, Chen Yingwu, Shen Yongping. Interdependent network based risk analysis of organizational structures for large-scale engineering project[J]. Systems Engineering-Theory & Practice, 2011, 31(10): 19661973.
[135] Roukny T, Bersini H, Pirotte H, et al. Default cascades in complex networks: topology and systemic risk[J]. Scientific Reports, 2013, 3: 2759.
[136] Zhang J H, Song B, Zhang Z J, et al. An approach for modeling vulnerability of the network of networks[J]. Physica A, 2014, 412: 127136.
[137] 郭庆来,辛蜀骏,王剑辉,等. 由乌克兰停电事件看信息能源系统综合安全评估[J]. 电力系统自动化, 2016, 40(5): 14.
Guo Qinglai, Xin Shujun, Wang Jianhui, et al. Comprehensive security assessment for a cyber physical energy system: a lesson from Ukraine's blackout[J]. Automation of Electric Power Systems, 2016, 40(5): 14.
[1] 应尚军, 纪小妹, 吴婷婷. 国际资本流动网络复杂性研究的总体框架[J]. 复杂系统与复杂性科学, 2018, 15(1): 38-44.
[2] 周荣荣, 李志勇, 郭非非, 许海玉, 唐仕欢. 补气药人参、黄芪防治心脑疾病的网络药理学研究[J]. 复杂系统与复杂性科学, 2018, 15(1): 18-23.
[3] 潘园园, 张力, 段玲玲, 段法兵. 离散Hopfield神经网络的手写数字识别研究[J]. 复杂系统与复杂性科学, 2018, 15(1): 75-79.
[4] 吴宗柠, 吕俊宇, 蔡宏波, 樊瑛. 双曲空间下国际贸易网络建模与分析——以小麦国际贸易为例[J]. 复杂系统与复杂性科学, 2018, 15(1): 31-37.
[5] 谭少林, 吕金虎. 复杂网络上的演化博弈动力学——一个计算视角的综述[J]. 复杂系统与复杂性科学, 2017, 14(4): 1-13.
[6] 崔玉美, 陈姗姗, 傅新楚. 几类传染病模型中基本再生数的计算[J]. 复杂系统与复杂性科学, 2017, 14(4): 14-31.
[7] 贾承丰, 韩华, 完颜娟, 吕亚楠. 基于网络模体特征攻击的网络抗毁性研究[J]. 复杂系统与复杂性科学, 2017, 14(4): 43-50.
[8] 郑国庆, 唐清干, 祝光湖. 两层星型网络上的传染病建模和控制[J]. 复杂系统与复杂性科学, 2017, 14(4): 51-57.
[9] 封学军, 张铖, 蒋柳鹏, 张艳, 蒋鹤. “海上丝绸之路”集装箱航运网络路由策略研究[J]. 复杂系统与复杂性科学, 2017, 14(4): 58-65.
[10] 李云, 宋运忠. 基于混合模式的BA无标度网络同步研究[J]. 复杂系统与复杂性科学, 2017, 14(4): 89-96.
[11] 李沧海, 许益贴, 罗春海, 胡海波. 微博信息扩散的空间分析[J]. 复杂系统与复杂性科学, 2017, 14(3): 75-84.
[12] 黄毅, 张胜, 戴维凯, 王硕, 杨芳. 基于信息维数的加权网络分形特性分析[J]. 复杂系统与复杂性科学, 2018, 15(2): 26-33.
[13] 吴晓, 刘万平, 杨武, 卢玲, 刘小洋, 黄诗雯. 新型社交网络谣言传播演化模型研究[J]. 复杂系统与复杂性科学, 2018, 15(2): 34-44.
[14] 胡发稳, 李丽菊, 王沛, 韩忠太. 族际冲突的社会表征:词汇网络分析视角[J]. 复杂系统与复杂性科学, 2018, 15(2): 54-61.
[15] 刘晓露, 贾书伟, 刘建国, 王建民. 基于Skyline Query的高声誉用户识别方法研究[J]. 复杂系统与复杂性科学, 2018, 15(2): 62-70.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed