Vulnerability assessment of infrastructure networks by using hierarchical decomposition methods
暂无分享,去创建一个
[1] Nancy R. Mead,et al. Survivable Network Systems: An Emerging Discipline , 1997 .
[2] Susan Snedakar. Vulnerability Assessment Tools , 2007 .
[3] Baruch Barzel,et al. Quantifying the connectivity of a network: the network correlation function method. , 2009, Physical review. E, Statistical, nonlinear, and soft matter physics.
[4] J. MacQueen. Some methods for classification and analysis of multivariate observations , 1967 .
[5] Somesh Jha,et al. Survivability analysis of network specifications , 2000, Proceeding International Conference on Dependable Systems and Networks. DSN 2000.
[6] Peter Checkland,et al. Systems Thinking, Systems Practice , 1981 .
[7] Ju An Wang,et al. Vulnerability categorization using Bayesian networks , 2010, CSIIRW '10.
[8] Bernhard Schölkopf,et al. Nonlinear Component Analysis as a Kernel Eigenvalue Problem , 1998, Neural Computation.
[9] Jun Liu,et al. Geographical constraints to range-based attacks on links in complex networks , 2008 .
[10] Inderjit S. Dhillon,et al. Kernel k-means: spectral clustering and normalized cuts , 2004, KDD.
[11] Kay W. Axhausen,et al. Vulnerability Assessment Methodology for Swiss Road Network , 2009 .
[12] Mauricio Sánchez-Silva,et al. Hierarchical infrastructure network representation methods for risk-based decision-making , 2013 .
[13] Francesco Masulli,et al. A survey of kernel and spectral methods for clustering , 2008, Pattern Recognit..
[14] Laura Painton Swiler,et al. A graph-based network-vulnerability analysis system , 1997, S&P 1998.
[15] Jianbo Shi,et al. Learning Segmentation by Random Walks , 2000, NIPS.
[16] Tom Petersen,et al. Importance and Exposure in Road Network Vulnerability Analysis , 2006 .
[17] M G H Bell,et al. Attacker–defender models and road network vulnerability , 2008, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[18] Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.
[19] Salim Hariri,et al. A Framework for Network Vulnerability Analysis , 2002, Communications, Internet, and Information Technology.
[20] Ulrik Brandes,et al. Network Analysis: Methodological Foundations , 2010 .
[21] Massimo Marchiori,et al. Vulnerability and protection of infrastructure networks. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.
[22] Albert-László Barabási,et al. Statistical mechanics of complex networks , 2001, ArXiv.
[23] Michael I. Jordan,et al. On Spectral Clustering: Analysis and an algorithm , 2001, NIPS.
[24] I. A. Nazarova. Solution methods for the vertex variant of the network system vulnerability analysis problem , 2009 .
[25] S. Dongen. Graph clustering by flow simulation , 2000 .
[26] Sadaaki Miyamoto,et al. LVQ Clustering and SOM Using a Kernel Function , 2005 .
[27] L. Mattsson,et al. Vulnerability : A model-based case study of the road network in Stockholm , 2007 .
[28] Gábor Schuchmann,et al. Road network vulnerability-evaluation of measures in ranking damages and developments , 2010 .