首页 | 本学科首页   官方微博 | 高级检索  
   检索      

复杂系统脆弱性综合分析方法
引用本文:张旺勋,李群,王维平,李海兵.复杂系统脆弱性综合分析方法[J].国防科技大学学报,2016,38(2):150-155.
作者姓名:张旺勋  李群  王维平  李海兵
作者单位:国防科学技术大学 信息系统与管理学院,国防科学技术大学 信息系统与管理学院,国防科学技术大学 信息系统与管理学院,国防科学技术大学 信息系统与管理学院
基金项目:国家自然科学基金项目(91024015)
摘    要:为全面识别复杂系统中的脆弱点,科学评价其脆弱性,针对纯拓扑脆弱性分析方法的不足,在考虑非拓扑因素条件下,提出一种结合复杂网络技术和效能评估技术的复杂系统脆弱性综合分析方法,从拓扑结构和非拓扑因素两方面全面分析复杂系统的脆弱性。以复杂网络的中心性指标为基础,通过广义指标法进行拓扑脆弱性分析;借鉴概率风险评价理论,从易攻性和易坏性两个方面对非拓扑脆弱性进行评价;通过对两者结果的综合得到总的脆弱性分析结果。示例结果表明:拓扑和非拓扑分析的结果有交集但又有所区别,两者密切相关且互为补充,并能共同筛选出复杂系统中的关键环节。较之纯粹的拓扑结构分析,综合分析得到的结果更为全面。

关 键 词:复杂系统  脆弱性  复杂网络  效能评估  拓扑
收稿时间:2015/3/26 0:00:00

Comprehensive analysis method for vulnerability of complex systems
ZHANG Wangxun,LI Qun,WANG Weiping and Li Haibing.Comprehensive analysis method for vulnerability of complex systems[J].Journal of National University of Defense Technology,2016,38(2):150-155.
Authors:ZHANG Wangxun  LI Qun  WANG Weiping and Li Haibing
Institution:College of Information System and Management, National University of Defense Technology, Changsha 410073, China,College of Information System and Management, National University of Defense Technology, Changsha 410073, China,College of Information System and Management, National University of Defense Technology, Changsha 410073, China and College of Information System and Management, National University of Defense Technology, Changsha 410073, China
Abstract:In order to identify vulnerable points in complex system roundly and assess its vulnerability scientifically, to improve the insufficiency of the pure topological methods, an analysis method integrated complex network theories and effectiveness assessment (CNEA) technologies was proposed, which considers both the topological and non-topological factors of vulnerability. Firstly, based on centricity measurements of complex network, a generalized indicators method was used for topological vulnerability analysis. At the same time, refering to the probability risk assessment theory, non-topological vulnerability was analyzed from susceptibility and brittleness. Then the final vulnerability results were integrated from the former two results. The demonstration results show that there is a intersecion set but also some differences between topological and non-topological analysis. These two asepects of vulnerability are correlative and complementary close, they both contribute to the screening of critical points and links in a complex system, and comprared to purely topological study, conclusions from integrated analysis were more comprehensive.
Keywords:complex system  vulnerability  complex network  effectiveness assessment  topology
本文献已被 CNKI 等数据库收录!
点击此处可从《国防科技大学学报》浏览原始摘要信息
点击此处可从《国防科技大学学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号