[1] |
SCHUCHARD M , MOHAISEN A , FOO K D ,et al. Losing control of the internet:using the data plane to attack the control plane[C]// The 17th ACM Conference on Computer and Communications Security. ACM, 2010: 726-728.
|
[2] |
DENG W , ZHU P , LU X ,et al. On evaluating BGP routing stress attack[J]. JCM, 2010,5(1): 13-22.
|
[3] |
LI H S , ZHU J H , QIU H ,et al. The new threat to internet:DNP attack with the attacking flows strategizing technology[J]. International Journal of Communication Systems, 2015,28(6): 1126-1139.
|
[4] |
KANG M S , GLIGOR V D , SEKAR V . SPIFFY:inducing cost-detectability tradeoffs for persistent link-flooding at tacks[C]// NDSS. 2016.
|
[5] |
Zheng J , Li Q , Gu G ,et al. Realtime DDoS defense using COTS SDN switches via adaptive correlation analysis[J]. IEEE Transactions on Information Forensics and Security, 2018,13(7): 1838-1853.
|
[6] |
刘建国, 任卓明, 郭强 ,等. 复杂网络中节点重要性排序的研究进展[J]. 物理学报, 2013,62(17):178901.
|
|
LIU J G , REN Z M , GUO Q ,et al. Node importance ranking of complex networks[J]. Acta Physica Sinica, 2013,62(17):178901.
|
[7] |
ROSSI R A , AHMED N K . Role discovery in networks[J]. IEEE Transactions on Knowledge and Data Engineering, 2015,27(4): 1112-1131.
|
[8] |
TENG D , CHU D . A fast frequent directions algorithm for low rank approximation:(previous title:sparse frequent directions algorithm for low rank approximation)[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2018.
|
[9] |
WANG W , TANG M , STANLEY H E ,et al. Unification of theoretical approaches for epidemic spreading on complex networks[J]. Reports on Progress in Physics, 2017,80(3):036603.
|
[10] |
BORGE-HOLTHOEFER J , MORENO Y . Absence of influential spreaders in rumor dynamics[J]. Physical Review E, 2012,85(2):026116.
|
[11] |
GUO Y , WANG Z , LUO S ,et al. A cascading failure model for interdomain routing system[J]. International Journal of Communication Systems, 2012,25(8): 1068-1076.
|
[12] |
刘红军, 胡晓峰, 邓文平 ,等. 基于首选路由的 AS 重要性评估方法[J]. 软件学报, 2012,23(9): 2388-2400.
|
|
LIU H J , HU XF , DENG W P ,et al. Technique of evaluating AS importance based on preferred route[J]. Journal of Software, 2012,23(9): 2388-2400.
|
[13] |
邱菡, 李玉峰, 兰巨龙 ,等. 域间路由系统的级联失效攻击及检测研究[J]. 中国科学:信息科学, 2017,47: 1715-1729.
|
|
QIU H , LI Y F , LAN J L ,et al. Research on cascading failure attack and detection of inner-domain routing system[J]. Scientia Sinica Informations, 2017,47: 1715-1729.
|
[14] |
ZHANG Y , MAO Z M , WANG J . Low-rate TCP-targeted DoS attack disrupts internet routing[C]// NDSS. 2007.
|
[15] |
LIU Y , PENG W , SU J ,et al. Assessing the impact of cascading failures on the inter-domain routing system of the internet[J]. New Generation Computing, 2014,32(3-4): 237-2552.
|
[16] |
YANG B , ZHANG Y , LU Y . A new methods for cascading failures analysis in inter-domain routing system[C]// 2015 Fifth International Conference IEEE on Instrumentation and Measurement,Computer,Communication and Control (IMCCC). 2015: 382-385.
|
[17] |
朱会虎, 邱菡, 王清贤 ,等. 基于双毁伤因素的域间路由系统级联失效模型[J]. 计算机工程与应用, 2019,55(2): 92-99.
|
|
ZHU H H , QIU H , WANG Q X ,et al. Double damage factor based inter-domain routing system cascading failure model[J]. Computer Engineering and Applications, 2019,55(2): 92-99.
|
[18] |
MOTTER A E , LAI Y C . Cascade-based attacks on complex networks[J]. Physical Review E, 2002,66(6):065102.
|
[19] |
任晓龙, 吕琳媛 . 网络重要节点排序方法综述[J]. 科学通报, 2014,59: 1175-1197.
|
|
REN X L,Lü L Y . Review of ranking nodes in complex networks[J]. Chinese Science Bulletin, 2014,59: 1175-1197.
|