• Electronics Optics & Control
  • Vol. 21, Issue 1, 28 (2014)
XIONG Jin-shi1、2, LI Jian-hua1, SHEN Di1, and GUO Wei-wu3
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • 3[in Chinese]
  • show less
    DOI: 10.3969/j.issn.1671-637x.2014.01.007 Cite this Article
    XIONG Jin-shi, LI Jian-hua, SHEN Di, GUO Wei-wu. Security Risk Propagation of Information Systems Under Condition of Nodes Breakdown[J]. Electronics Optics & Control, 2014, 21(1): 28 Copy Citation Text show less
    References

    [1] WU X P FU Y.Security risk assessment theory and methods for information systems[M].Beijing:Science Press 2011.

    [2] FENG D G ZHANG Y ZHENG Y Q.Survey of information security risk assessment[J].Journal of China Institute of Communications 2004 7(25):10-18.

    [3] MAO H D.A novel assessment approach based on logial exploitation graph model for network security[D].Chang-sha:National University of Defense Technology 2008.

    [4] ZHANG Y Z FANG B X CHI Y et al.Risk propagation model for assessing network information systems[J].Journal of Software 2007 18(1):137-145.

    [5] ZHANG Y Z TIAN Z H FANG B X, et al.Approximate arithmetic for solving problem of network risk propagation and its performance analysis[J].Science in China(Series E:Information Sciences) 2008 38(8):1157-1168.

    [6] WANG J W RONG L L.Cascading failures on complex networks based on the local preferential redistribution rule of the load[J].Acta Phys.Sin. 2009 58(6):3714-3721.

    [7] WANG J W RONG L L.Universal cascading failures on complex networks based on attacks[J].Journal of Management Science 2009 22(3):113-120.

    [8] WANG J W RONG L L WANG D.Model for cascading failures on complex networks based on local characteristics of nodes[J].Journal of Management Sciences in China 2010 13(8):42-50.

    [9] WANG J W.Study on cascading failure models on networks[D].Dalian:Dalian University of Technology 2010.

    [10] WU J J GAO Z Y SUN H J.Cascade and breakdown in scale-free networks with community structure[J].Physical Review E 2006 74(6):066111(5).

    [11] ALBERT R JEONG H BARABSI A L.Error and attack tolerance in complex networks[J].Nature 2000 406(6794):378-382.

    [12] VALENTE X C N SARKAR A STONE H A.Two-peak and three-peak optimal complex networks[J].Physical Review Letters 2004 92(11):118702(1)-118702(4).

    [13] BOLLOBS B RIORDAN O.Robustness and vulnerabi-lity of scale-free random graphs[J].Internet Mathema-tics 2001 1(1):1-35.

    [14] BRODER A KUMAR R MAGHOUL F et al.Graph structure in the web[J].Compute Networks 2000 33(1-6):309-320.

    [15] WANG L ZHANG J J.Centralization of complex networks[J].Complex Systems and Complexity Science 2006 3(1):13-20.

    [16] XIONG J S LI J H YANG Y H et al.Compare of centrality measures of military communication network based on complexity theory[J].Science & Technology Review 2011 29(36):38-41.

    XIONG Jin-shi, LI Jian-hua, SHEN Di, GUO Wei-wu. Security Risk Propagation of Information Systems Under Condition of Nodes Breakdown[J]. Electronics Optics & Control, 2014, 21(1): 28
    Download Citation