Electronics Optics & Control, Volume. 21, Issue 1, 28(2014)
Security Risk Propagation of Information Systems Under Condition of Nodes Breakdown
[1] [1] WU X P FU Y.Security risk assessment theory and methods for information systems[M].Beijing:Science Press 2011.
[2] [2] FENG D G ZHANG Y ZHENG Y Q.Survey of information security risk assessment[J].Journal of China Institute of Communications 2004 7(25):10-18.
[3] [3] MAO H D.A novel assessment approach based on logial exploitation graph model for network security[D].Chang-sha:National University of Defense Technology 2008.
[4] [4] ZHANG Y Z FANG B X CHI Y et al.Risk propagation model for assessing network information systems[J].Journal of Software 2007 18(1):137-145.
[5] [5] ZHANG Y Z TIAN Z H FANG B X, et al.Approximate arithmetic for solving problem of network risk propagation and its performance analysis[J].Science in China(Series E:Information Sciences) 2008 38(8):1157-1168.
[6] [6] WANG J W RONG L L.Cascading failures on complex networks based on the local preferential redistribution rule of the load[J].Acta Phys.Sin. 2009 58(6):3714-3721.
[7] [7] WANG J W RONG L L.Universal cascading failures on complex networks based on attacks[J].Journal of Management Science 2009 22(3):113-120.
[8] [8] WANG J W RONG L L WANG D.Model for cascading failures on complex networks based on local characteristics of nodes[J].Journal of Management Sciences in China 2010 13(8):42-50.
[9] [9] WANG J W.Study on cascading failure models on networks[D].Dalian:Dalian University of Technology 2010.
[10] [10] WU J J GAO Z Y SUN H J.Cascade and breakdown in scale-free networks with community structure[J].Physical Review E 2006 74(6):066111(5).
[11] [11] ALBERT R JEONG H BARABSI A L.Error and attack tolerance in complex networks[J].Nature 2000 406(6794):378-382.
[12] [12] VALENTE X C N SARKAR A STONE H A.Two-peak and three-peak optimal complex networks[J].Physical Review Letters 2004 92(11):118702(1)-118702(4).
[13] [13] BOLLOBS B RIORDAN O.Robustness and vulnerabi-lity of scale-free random graphs[J].Internet Mathema-tics 2001 1(1):1-35.
[14] [14] BRODER A KUMAR R MAGHOUL F et al.Graph structure in the web[J].Compute Networks 2000 33(1-6):309-320.
[15] [15] WANG L ZHANG J J.Centralization of complex networks[J].Complex Systems and Complexity Science 2006 3(1):13-20.
[16] [16] XIONG J S LI J H YANG Y H et al.Compare of centrality measures of military communication network based on complexity theory[J].Science & Technology Review 2011 29(36):38-41.
Get Citation
Copy Citation Text
XIONG Jin-shi, LI Jian-hua, SHEN Di, GUO Wei-wu. Security Risk Propagation of Information Systems Under Condition of Nodes Breakdown[J]. Electronics Optics & Control, 2014, 21(1): 28
Category:
Received: Mar. 12, 2013
Accepted: --
Published Online: Jan. 17, 2014
The Author Email: