共 15 条
- [1] Yu B, Feng C, Zhu Q, Vulnerability analysis of China's high speed railway network, China Safety Science Journal, 27, 9, pp. 110-115, (2017)
- [2] Yu Y, Guo L, Huang J, A cross-layer security monitoring selection algorithm based on traffic prediction, IEEE Access, 6, pp. 35382-35391, (2018)
- [3] Yu Y, Guo L, Liu Y, An efficient SDN-based DDoS attack detection and rapid response platform in vehicular networks, IEEE Access, 6, pp. 44570-44579, (2011)
- [4] Yu Y, Ning Z, Guo L, A secure routing scheme based on social network analysis in wireless mesh networks, Science China Information Sciences, 59, 12, pp. 143-154, (2016)
- [5] Borgatti S P, Everett M G, A graph-theoretic perspective on centrality, Social Networks, 28, 4, pp. 466-484, (2006)
- [6] Jiang Y S, Key node identification of navigation network based on structural centrality, Computer and Modernization, 7, pp. 108-113, (2018)
- [7] Yu Y, Peng Y, Yu Y, A new dynamic hierarchical reputation evaluation scheme for hybrid wireless mesh networks, Computers & Electrical Engineering, 40, 2, pp. 663-672, (2014)
- [8] Reggiani A, Nijkamp P, Lanzi D, Transport resilience and vulnerability: The role of connectivity, Transportation Research Part A, 81, pp. 4-15, (2015)
- [9] Dinh T N, Xuan Y, Thai M T, On new approaches of assessing network vulnerability: Hardness and approximation, IEEE/ACM Transactions on Networking, 20, 2, pp. 609-619, (2012)
- [10] Shen Y, Nguyen N P, Xuan Y, On the discovery of critical links and nodes for assessing network vulnerability, IEEE/ACM Transactions on Networking, 21, 3, pp. 963-973, (2013)