[1] 格雷厄姆. 高边疆-新的国家战路[M]. 张健志,马俊才,付家祯,译.北京:军事科学出版社, 1998: 5. [2] Sun Shiguo, Luo Senlin, Li Xiang, et al.The Research on Network Vulnerability Analysis Methods [C]// [1]格雷厄姆. 高边疆-新的国家战路[M]. 张健志,马 俊才,付家祯,译.北京:军事科学出版社, 1998: 5. [3] Sun Shiguo, Luo Senlin, Li Xiang, et al.The Research on Network Vulnerability Analysis Methods[C]//Proceedings of 2012 Intermational Conference on Inelligeant Systems Design and Engineering Application,Hainan, China, USA: IEEE, 2012: 593-597. [4] 蔡洪亮,卢昱.基于拓扑结构的空间信息网络脆弱性[J].军械工程学院学报, 2010, 5022): 64-67. [5] Xiang Li, Bai Lin, Daqi Li.A gapb-model-based structure vulnerability analyzing method on satellite network[C]// Proceedings of 2010 IEEE Youth Conference on Information, Computing and Telecommunications, Beiing. China. USA: IEEE, 2010: 218-221. [6] Zhao Dongjie, Yang Haitao, Jiang Jian, et al.Modeling and simulation of the invulnerability of space information network[C]// Intermet Technology and Application, ITAP2010, Wuhan, China. USA: IEEE, 2010: 1-5. [7] 马满好, 邱涤珊,王亮天基信息系统网络拓扑结构建模方法研究[J]武汉大学学报(信息科学版), 2009, 5(34): 606-610. [8] Minsu Huang, Siyuan Chen, Ying Zhu, et al.Topology control for time evolving and predictable delay-tolerant networks[C] 2011 Eighth IEEE Intemational Conference on Mobile Ad-Hoc and Sensor Systems. USA: IEEE, 2011: 82-91. [9] Nicolai V, Lucente M, Piantieni G, et al.Multi-purpose satellites constellations propagator tokit[J] Proceedings of the 2007 IEEE Acrospace Conference, Montana, USA USA: IEEE, 2007: 1-9. [10] 汪小帆, 李翔,陈关荣.网络科学导论[M].北京:商等教育出版社, 2012: 87-89. |