HotSpots: Failure Cascades on Heterogeneous Critical Infrastructure Networks
暂无分享,去创建一个
Sangkeun Lee | Supriya Chinthavali | Liangzhe Chen | B. Aditya Prakash | Sisi Duan | Xinfeng Xu | Alfonso G. Tarditi | Liangzhe Chen | B. Prakash | S. Chinthavali | S. Lee | A. Tarditi | Sisi Duan | Xinfeng Xu
[1] Jingrui He,et al. On the Connectivity of Multi-layered Networks: Models, Measures and Optimal Control , 2015, 2015 IEEE International Conference on Data Mining.
[2] Éva Tardos,et al. Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..
[3] Xinghuo Yu,et al. A Maximum-Flow-Based Complex Network Approach for Power System Vulnerability Analysis , 2013, IEEE Transactions on Industrial Informatics.
[4] Melissa R. Allen,et al. Application of Hybrid Geo-Spatially Granular Fragility Curves to Improve Power Outage Predictions , 2014 .
[5] S. Buldyrev,et al. Interdependent networks with identical degrees of mutually dependent nodes. , 2010, Physical review. E, Statistical, nonlinear, and soft matter physics.
[6] Yushuai Li,et al. Critical Nodes Identification of Power Systems Based on Controllability of Complex Networks , 2015 .
[7] Haim Kaplan,et al. A new, simpler linear-time dominators algorithm , 1998, TOPL.
[8] Lei Xie,et al. FASCINATE: Fast Cross-Layer Dependency Inference on Multi-layered Networks , 2016, KDD.
[9] Eytan Modiano,et al. Robustness of Bidirectional Interdependent Networks: Analysis and Design , 2016, ArXiv.
[10] Supriya Chinthavali,et al. Reliable communication models in interdependent critical infrastructure networks , 2016, 2016 Resilience Week (RWS).
[11] Jon Kleinberg,et al. Maximizing the spread of influence through a social network , 2003, KDD '03.
[12] Le Song,et al. Estimating Diffusion Network Structures: Recovery Conditions, Sample Complexity & Soft-thresholding Algorithm , 2014, ICML.
[13] Supriya Chinthavali,et al. Automating natural disaster impact analysis: An open resource to visually estimate a hurricane's impact on the electric grid , 2013, 2013 Proceedings of IEEE Southeastcon.
[14] Andreas Krause,et al. Cost-effective outbreak detection in networks , 2007, KDD '07.
[15] M. L. Fisher,et al. An analysis of approximations for maximizing submodular set functions—I , 1978, Math. Program..
[16] Barry J. Goodno,et al. Seismic response of critical interdependent networks , 2007 .
[17] Le Song,et al. Estimating Diffusion Networks: Recovery Conditions, Sample Complexity and Soft-thresholding Algorithm , 2016, J. Mach. Learn. Res..
[18] Christos Faloutsos,et al. On the Vulnerability of Large Graphs , 2010, 2010 IEEE International Conference on Data Mining.
[19] Zuyi Li,et al. Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.
[20] Réka Albert,et al. Structural vulnerability of the North American power grid. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[21] Wei Chen,et al. Robust Influence Maximization , 2016, KDD.
[22] Christian Borgs,et al. Maximizing Social Influence in Nearly Optimal Time , 2012, SODA.
[23] Arunabha Sen,et al. Identification of K most vulnerable nodes in multi-layered network using a new model of interdependency , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[24] Min Ouyang,et al. Review on modeling and simulation of interdependent critical infrastructure systems , 2014, Reliab. Eng. Syst. Saf..