Topological Vulnerability Evaluation Model Based on Fractal Dimension of Complex Networks
暂无分享,去创建一个
Yong Deng | Rehan Sadiq | Bo Wei | Li Gou | Yong Sadiq | R. Sadiq | Yong Deng | Bo Wei | Li Gou | Yong Sadiq
[1] Mahdi Jalili,et al. Topology and vulnerability of the Iranian power grid , 2014 .
[2] Jianbo Wang,et al. COMPLEX NETWORK-BASED ANALYSIS OF AIR TEMPERATURE DATA IN CHINA , 2009 .
[3] Xinyang Deng,et al. Supplier selection using AHP methodology extended by D numbers , 2014, Expert Syst. Appl..
[4] B. Mandelbrot. How Long Is the Coast of Britain? Statistical Self-Similarity and Fractional Dimension , 1967, Science.
[5] Yu Luo,et al. Determining Basic Probability Assignment Based on the Improved Similarity Measures of Generalized Fuzzy Numbers , 2015, Int. J. Comput. Commun. Control.
[6] Kaiquan Cai,et al. Effective usage of shortest paths promotes transportation efficiency on scale-free networks , 2013 .
[7] V. Latora,et al. Multiscale vulnerability of complex networks. , 2007, Chaos.
[8] Lin Wang,et al. Degree mixing in multilayer networks impedes the evolution of cooperation , 2014, Physical review. E, Statistical, nonlinear, and soft matter physics.
[9] O. Shanker. ALGORITHMS FOR FRACTAL DIMENSION CALCULATION , 2008 .
[10] Jian-Wei Wang,et al. Robustness of the western United States power grid under edge attack strategies due to cascading failures , 2011 .
[11] Ake J Holmgren,et al. Using Graph Models to Analyze the Vulnerability of Electric Power Networks , 2006, Risk analysis : an official publication of the Society for Risk Analysis.
[12] Réka Albert,et al. Structural vulnerability of the North American power grid. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[13] Yong Deng. A Threat Assessment Model under Uncertain Environment , 2015 .
[14] S. Mahadevan,et al. Dependence Assessment in Human Reliability Analysis Using Evidence Theory and AHP , 2015, Risk analysis : an official publication of the Society for Risk Analysis.
[15] S. Havlin,et al. How to calculate the fractal dimension of a complex network: the box covering algorithm , 2007, cond-mat/0701216.
[16] Sankaran Mahadevan,et al. Box-covering algorithm for fractal dimension of weighted networks , 2013, Scientific Reports.
[17] Massimo Marchiori,et al. Model for cascading failures in complex networks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[18] Beom Jun Kim,et al. Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[19] Benoit B. Mandelbrot,et al. Fractal Geometry of Nature , 1984 .
[20] B. Bollobás. The evolution of random graphs , 1984 .
[21] Igor Mishkovski,et al. Vulnerability of complex networks , 2011 .
[22] Yu Luo,et al. An improved method to rank generalized fuzzy numbers with different left heights and right heights , 2015, J. Intell. Fuzzy Syst..
[23] O. Shanker,et al. Graph zeta function and dimension of complex network , 2007 .
[24] Jian-Wei Wang,et al. Cascade-based attack vulnerability on the US power grid. , 2009 .
[25] Jian-Wei Wang,et al. Robustness of complex networks with the local protection strategy against cascading failures , 2013 .
[26] Yong Deng,et al. Modeling contaminant intrusion in water distribution networks: A new similarity-based DST method , 2011, Expert Syst. Appl..
[27] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[28] K-I Goh,et al. Skeleton and fractal scaling in complex networks. , 2006, Physical review letters.
[29] Zhen Wang,et al. Cooperation and age structure in spatial games. , 2012, Physical review. E, Statistical, nonlinear, and soft matter physics.
[30] S. Havlin,et al. Dimension of spatially embedded networks , 2011 .
[31] Jian-Wei Wang,et al. VULNERABILITY OF EFFECTIVE ATTACK ON EDGES IN SCALE-FREE NETWORKS DUE TO CASCADING FAILURES , 2009 .
[32] Wen-Bo Du,et al. Particle Swarm Optimization with Scale-Free Interactions , 2014, PloS one.
[33] Albert-László Barabási,et al. Statistical mechanics of complex networks , 2001, ArXiv.
[34] Min Ouyang,et al. Vulnerability analysis of interdependent infrastructure systems under edge attack strategies , 2013 .
[35] Yong Hu,et al. A new information dimension of complex networks , 2013, ArXiv.
[36] Yang Liu,et al. An Improved Genetic Algorithm with Initial Population Strategy for Symmetric TSP , 2015 .
[37] Ji Qi,et al. Efficiency Dynamics on Scale-Free Networks with Communities , 2010 .
[38] Shuliang Wang,et al. Attack vulnerability of self-organizing networks , 2012 .
[39] Mark E. J. Newman,et al. The Structure and Function of Complex Networks , 2003, SIAM Rev..
[40] S. Havlin,et al. Self-similarity of complex networks , 2005, Nature.
[41] Yang Gao,et al. Selectively-informed particle swarm optimization , 2015, Scientific Reports.
[42] James M. Kang,et al. Space-Filling Curves , 2017, Encyclopedia of GIS.
[43] Sankaran Mahadevan,et al. Vulnerability Assessment of Physical Protection Systems: A Bio-Inspired Approach , 2015, Int. J. Unconv. Comput..
[44] Tiesong Hu,et al. DETECTING CHAOS TIME SERIES VIA COMPLEX NETWORK FEATURE , 2011 .
[45] Yong Deng,et al. Generalized evidence theory , 2014, Applied Intelligence.
[46] Adilson E Motter,et al. Cascade-based attacks on complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[47] Z. Wang,et al. The structure and dynamics of multilayer networks , 2014, Physics Reports.
[48] Min Ouyang,et al. Correlation analysis of different vulnerability metrics on power grids. , 2014 .
[49] Jianwei Wang,et al. Improving Robustness Of Coupled Networks Against Cascading Failures , 2013 .