Telecommunications Science ›› 2019, Vol. 35 ›› Issue (11): 9-18.doi: 10.11959/j.issn.1000-0801.2019273

• Enterprises: • Previous Articles     Next Articles

Structural properties and static robustness of Linux software network

Ershen WANG1,Yu LI1,Chen HONG2,3,Qinghua SUN2,3,Chang LIU2,3   

  1. 1 School of Electronic and Information Engineering,Shenyang Aerospace University,Shenyang 110136,China
    2 Beijing Key Laboratory of Information Service Engineering,Beijing Union University,Beijing 100101,China
    3 College of Robotics,Beijing Union University,Beijing 100101,China
  • Revised:2019-10-22 Online:2019-11-20 Published:2019-12-23
  • Supported by:
    The National Natural Science Foundation of China(61571309);The National Natural Science Foundation of China(6184160);Liaoning Baiqianwan Talents Program(04021407);Natural Science Foundation of Liaoning Province(2019-MS-251);Scientific Study Project for Liaoning Province Ministry of Education(L201705);Scientific Study Project for Liaoning Province Ministry of Education(L201716);Liaoning Excellent Talents in University(LR2016069);The Beijing Municipal Education Commission Science and Technology Project(KM201811417005);The Beijing Municipal Education Commission Science and Technology Project(KM201711417011);The Beijing Municipal Education Commission Science and Technology Project(KM201911417010);The Major Project of Technological Innovation 2030 - “New Generation Artificial Intelligence”(2018AAA0100800)

Abstract:

The source code of the Linux software was analyzed,and the directed function call network model,the weak coupling network model of software system,the strong coupling network model and the strong connected subgraph model were built.The characteristics and static robustness of the four networks were studied.The results show that four networks all show ‘small-world’ property.The out-degree distribution of the six modules in the Linux network generally follows the exponential distribution,and the in-degree distribution of the six modules follows the power law.The best attacking strategy was distinct when different robustness evaluation indicator was adopted.For the weak connectivity indicator,high in-degree attacking strategy was of the greatest damage to the weakly coupled software network.

Key words: software network, network property, network robustness, complex network, coupled network

CLC Number: 

No Suggested Reading articles found!