[1]刘密霞.网络弹性研究进展[J].计算机科学,2013,11(40):46-49.
[2]于海生.协调与弹性[M].北京:科学出版社,2012.
[3]Nicol D M,Sanders W H,Trivedi K S.Model-based evaluation:from dependability to security[J].IEEE Transactions on Dependable and Secure Computing,2004,1(1):48-65.
[4]Kinderman R,Snell K.Markov random fields and their applications[M].Providence,RI,USA:American Mathematical Society,1980.
[5]Koller D,Friedman N.Probabilistic graphical models principles and techniques[M].Cambridge,MA,USA:MIT Press,2009.
[6]Wasserman S,Faust K.Social network analysis:methods and applications[M].Cambridge,UK:Cambridge University Press,1994.
[7]Borgatti S.Identifying sets of key players in a socialnetwork,Comput[J].Mathematic Organization Theory,2006,12(1):21-34.
[8]Heegaard P,Trivedi K B.Survivability quantification of communication services[C].Anchorage,AK,USA:In Proceeding of 38th IEEE Interaction Conference DSN,2008:462-471.
[9]Reinecke P,Wolter K.BAdaptivity metric and performance for restart strategies in web services reliable messaging[C].New York,NY,USA:In Proc.7th Interaction Workshop Software Perform,2008:201-212.
[10]Weiss J.Protecting industrial control systems from electronic threats[M].New York,NY,USA:Momentum Press,2010. |