Method based on GSCPN for network vulnerability analysis

被引:1
|
作者
Gao, Xiang [1 ]
Zhu, Yue-Fei [1 ]
Fei, Jin-Long [1 ]
Han, Tao [1 ]
机构
[1] State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, 450002, China
关键词
19;
D O I
10.4304/jsw.8.8.2032-2038
中图分类号
学科分类号
摘要
引用
收藏
页码:2032 / 2038
相关论文
共 50 条
  • [31] Comparison analysis on vulnerability of metro networks based on complex network
    Zhang, Jianhua
    Wang, Shuliang
    Wang, Xiaoyuan
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2018, 496 : 72 - 78
  • [32] THE VULNERABILITY ASSESSMENT METHOD OF RAILWAY NETWORK
    Wang Wei
    Liu Jun
    Li Haiying
    Jiang Xi
    PROCEEDINGS OF THE ASME JOINT RAIL CONFERENCE, VOL 1: RAILROAD INFRASTRUCTURE ENGINEERING SAFETY, SECURITY AND ENVIRONMENT, 2010, : 461 - 465
  • [33] An assessment method for highway network vulnerability
    El-Rashidy, Rawia Ahmed
    Grant-Muller, Susan M.
    JOURNAL OF TRANSPORT GEOGRAPHY, 2014, 34 : 34 - 43
  • [34] Vulnerability Analysis of the Financial Network
    Khabazian, Aein
    Peng, Jiming
    MANAGEMENT SCIENCE, 2019, 65 (07) : 3302 - 3321
  • [35] A framework for network vulnerability analysis
    Qu, GZ
    Rudraraju, J
    Modukuri, R
    Hariri, S
    Raghavendra, CS
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INTERNET, AND INFORMATION TECHNOLOGY, 2002, : 289 - 294
  • [36] Topological vulnerability analysis and countermeasures of electrical communication network based on complex network theory
    School of Electrical Engineering, Wuhan University, Wuhan
    Hubei Province
    430072, China
    Dianwang Jishu, 12 (3615-3621):
  • [37] Complex Network-Based Cascading Faults Graph for the Analysis of Transmission Network Vulnerability
    Wei, Xiaoguang
    Gao, Shibin
    Huang, Tao
    Bompard, Ettore
    Pi, Renjian
    Wang, Tao
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (03) : 1265 - 1276
  • [38] Survey on Software Vulnerability Analysis method based on Machine Learning
    Gong Jie
    Kuang Xiao-hui
    Liu Qiang
    2016 IEEE FIRST INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC 2016), 2016, : 642 - 647
  • [39] Seismic vulnerability analysis of tunnel based on modified IDA method
    Dong Z.
    Liu G.
    Zeng F.
    Kang S.
    Zhendong yu Chongji/Journal of Vibration and Shock, 2021, 40 (17): : 106 - 115and166
  • [40] A Protocol Vulnerability Analysis Method Based on Logical Attack Graph
    Zhang, Chunrui
    Wang, Shen
    Zhan, Dechen
    ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PT II, 2018, 82 : 309 - 317