基于复杂网络理论的基础设施系统脆弱性分析
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
基础设施是一类为社会生产和居民生活提供服务的物质工程设施,它们是社会赖以生存和发展的一般性物质条件,也是典型的复杂系统。当今社会越来越依赖于基础设施系统提供的各种服务以维持其正常运行。然而近年来以北美大停电、08年中国南方雪灾为代表的各类灾害频繁爆发,给基础设施系统的安全敲响了警钟。鉴于基础设施系统对社会生产和人民生活的重要性,研究基础设施系统在不同扰动下的响应情形,分析、理解、识别基础设施系统的脆弱性,进而提出相应的抗干扰措施和改进策略,提高基础设施系统的可靠性,成为了当前研究的一个热点课题。
     围绕基础设施系统的脆弱性研究及其应用,国内外众多研究机构和学者分别采用投入产出模型、系统动力学模型、Agent仿真模型,探讨了灾害对基础设施系统中的经济体、功能器件、业务流程等的影响并取得了若干初步成果,但是就总体而言,基础设施系统脆弱性的研究尚处于起步阶段,特别地,对于关联基础设施系统脆弱性研究目前仍然是一个较新的研究领域。
     复杂网络作为大量真实复杂系统的高度抽象,其理论与应用研究已渗透到数理、生命和工程学科等众多不同的领域。利用复杂网络的理论和方法能够很好的描述基础设施系统的内部结构和彼此间的关联关系,为基础设施系统脆弱性的研究提供一个全新的视角和研究方法,有助于从整体上把握系统的复杂性和系统响应的动力学特性。基于此,本文运用复杂网络的理论和方法,从单一基础设施系统入手,以关联基础设施系统为研究重点分析基础设施系统的脆弱性。主要研究内容如下:
     首先,利用复杂网络的理论和方法对基础设施系统进行了拓扑描述和功能刻画,介绍并总结了描述基础设施系统的聚类系数、度相关性、介数等参量,以便更深刻的理解基础设施系统结构与功能特性,给出了基础设施系统的脆弱性分析理论框架。
     针对以往单一基础设施系统网络脆弱性研究中对边的级联故障和社团脆弱性很少提及这一情形,本文在一般脆弱性分析的基础上,建立了节点和边的级联故障模型,分析了基础设施系统网络在节点故障和边故障下的脆弱性。同时利用模块度优化算法给出了社团结构划分方法,并结合基础设施系统网络的结构特性和功能特点分别提出了结构和功能脆弱性指标,用以寻找网络最脆弱和鲁棒的社团。
     对于关联基础设施系统,本文分别从关联类型、运行状态、基础设施特性、故障类型、耦合和响应行为、基础设施环境等不同方面分析了其关联性,结合基础设施系统脆弱性分析框架,对关联基础设施系统进行了脆弱性分析。在研究中对每一个具体系统进行了拓扑结构抽象,结合其运行机制建立了功能模型,考虑了不同系统间的关联关系,并给出了关联基础设施系统接口设计策略。利用网络效率、雪崩规模等性能指标分析了系统在不同接口、不同扰动策略下的脆弱性,得出了关联基础设施系统的故障容忍性和最优的接口设计标准。
     脆弱性分析的目的是为了更好的保护基础设施系统。在单一和关联基础设施系统脆弱性分析基础上,探讨了基础设施系统的关键组件辨识方法,以便对这些关键组件进行重点保护。通过纳入缓冲、增加冗余、故障修复等手段讨论了基础设施系统的改进策略,为控制基础设施系统的级联故障、增强系统的抗干扰能力提供决策支持。
Infrastructure systems are the framework of material engineering facilities thatprovide service for the social production and the resident's life. It is the general materialcondition of survival and development for society. It is a topical complex system.Societies today are increasingly dependent on such systems to maintain normal operation.However, events of recent years such as the North American blackout and the ChineseSouthern snowstorm have raised alarms in regards to overall safety. In view of theimportance of infrastructure systems for social well-being and sustenance, studyingresponse of infrastructure systems under different types of disturbances, analyzing,understanding and identifying vulnerability of infrastructure systems for the purpose ofimprovement, has become a focal area for the process of optimizing infrastructure designand protection.
     Utilizing IIM, system dynamics model and agent simulation model, manyauthoritative agencies and researchers have made an research on the tender inside theinfrastructure systems, and discussed the disaster affection to the economic system,functional device and the business processes, etc. But the researchers only get certainpreliminary achievements because of the complexity of infrastructure systems. Therefore,the study in vulnerability analysis of infrastructure systems has been at the beginning stagewithout forming a complete theoretical and methodological system.
     As abstraction of many real complex systems, complex network theory has beenapplied to the area of mathematics, life sciences and engineering. It thus provides a newperspective and applied research method to vulnerability analysis of infrastructure systems,allowing a level of analysis that can approach the overall complexity and dynamics ofinfrastructure systems. Using the theory and method of complex networks, this paperstudies the vulnerability of infrastructure systems, starting from a single system and thenprogressing to interdependent systems. Main contributions of this dissertation aresummarized as follows:
     First, this paper gives the theoretical framework for vulnerability analysis, andanalyses the complexity of infrastructure systems. Combined with the theories and methods of complex network, topology description and functional characterizations ofinfrastructure systems are studied. Meanwhile, to give a more profound understanding ofthe structural and functional features of the infrastructure systems, parameters such asclustering coefficient, degree, and betweenness are introduced and summarized.
     Because vulnerability analysis of single infrastructure systems often focuses on nodecascading failures and the impact of external factors (such as natural disasters,) edgecascading failures, community structure implementation and community structuralvulnerabilities are rarely mentioned. This article establishes a model of edges cascadingfailures, and analyses the vulnerability of infrastructure systems. Meanwhile, a communitydetection method and vulnerability metric are proposed to locate the weakest and mostrobust communities.
     Interdependent infrastructure system vulnerability analysis is a relatively new area ofresearch. Current research in this area has not yet reached maturation of theory andmethodology, especially in the field of modeling. Thus, this paper first studies theinfrastructure system from different aspects such as interdependency types, operationstates, infrastructure characteristics, failure types, coupling and response behavior, andinfrastructure environment. It then establishes a framework for vulnerability analysis.
     The purpose of vulnerability analysis is to better protect the infrastructure systems.On the basis of vulnerability analysis on single and interdependent infrastructure systems,by considering the performance loss of systems undergoing edge or node failures, keycomponents of an infrastructure system are proposed and identified and networkinterventions as well as improvement strategies are discussed to better protect theinfrastructure systems.
引文
[1] President's Commission on Critical Infrastructure Protection, Critical Foundations:Protecting America's Infrastructures (1997).[Online]. Available:http://www.ciao.gov
    [2] Due as-Osorio L. Interdependent Response of Networked Systems to NaturalHazards and Intentional Disruptions. PhD thesis.2005
    [3] U.S.–Canada Power System Outage Task Force. Final report on the August14,2003Blackout in the United States and Canada: causes and recommendations.2004
    [4]史培军.从南方冰雪灾害成因看巨灾防范对策.中国减灾,2008,2:12-15
    [5] Haimes YY, Horowitz BM, Lambert JH, et al. Inoperability input–output model forinterdependent infrastructure sectors. I:Theory and methodology. Journal ofInfrastructure Systems,2005,11(2):67–79
    [6] Adachi T, Ellingwood B. Serviceability of earthquake-damaged systems:effects ofelectrical power availability and back-up systems on system vulnerability.Reliability Engineering&System Safety,2008,93(1):78–88
    [7] North M, Thimmapuram P, Macal C. EMCAS: An Agent-Based Tool for ModelingElectricity Markets. Proceedings of the Agent2003Conference on Challenges inSocial Simulation, Argonne National Laboratory/The University of Chicago,Chicago, IL.2003
    [8] Bush B, Guere P. Interdependent Energy Infrastructure Simulation System. LosAlamos National Laboratory. NISAC Capabilities Demonstrations
    [9] Basu N, Pryor R, Quint T. Aspen: A Microsimulation Model of the Economy. NM:Sandia National Laboratories.1996
    [10]刘建香.复杂网络及其在国内研究进展的综述.系统科学学报,2009,17(5):31-37
    [11]汪小帆,李翔,陈关荣.复杂网络理论及其应用.北京:清华大学出版社,2006
    [12] Erd s P, Rényi A. On the evolution of random graphs. Publications of theMathematical Institute of the Hungarian Academy of Science,1960,5:17-60
    [13] Bollobas B. Random Graphs. New York: Academic Press,2nded.,2001
    [14] Watts DJ, Strogatz SH. Collective dynamics of “small-world” networks. Nature,1998,393:440-442
    [15]孟仲伟,鲁宗相,宋靖雁.中美电网的小世界拓扑模型比较分析.电力系统自动化,2004,25(15):21-24
    [16]丁明,韩平平.小世界电网的连锁故障传播机理分析.电力系统自动化,2007,31(18):6-10
    [17] Barrat A, Weigt M. On the properties of small world networks. European PhysicalJournal B,2000,13:547-560
    [18] Newman MEJ, Watts DJ. Renormalization group analysis of the small-worldnetwork model. Physics Letters A,1999,263:341-346.
    [19] Barabasi AL, Albert R. Emergence of scaling in random networks. Science,1999,286:509-512
    [20] Dobson I, Carreras BA, Lynch V E, et al. An initial model for complex dynamics inelectric power system blackouts. In proc. Of34th international conference onsystem sciences. Maui, hawaii,2001:710-718
    [21] Paolo Crueitti, Vito Latora, Massimo Marehiori. A topological analysis of the Italianelectric Power grid. Physica A,2004,338(l-2):92-97
    [22]世界银行.《1994年世界发展报告:为发展提供基础设施》(中译本).毛晓威译.中国财政经济出版社,1994
    [23] Presidential Decision Directive63.[Online]. Available: http://www.ciao.gov.
    [24] Waldrop M著.复杂:诞生于秩序与混沌边缘的科学.陈玲译.生活·读书·新知三联书店,1997
    [25]李宏亮.基于Agent的复杂系统分布仿真:[博士论文].国防科学技术大学,2001.10
    [26]韦琦.复杂系统脆性理论及其在危机分析中的应用:[博士论文].哈尔滨工程大学,2004.2
    [27] Lewis HW, Budnitz RJ, Rowe WD, et al. Risk assessment review group report tothe US Nuclear Regulatory Commission. IEEE Transactions on Nuclear Science,1979, NS-26:4686-4690
    [28] Apostolakis GE. How useful is quantitative risk assessment?. Risk Analysis,2004,24:515-520
    [29] Pate-Cornell ME, Dillon R. Probabilistic Risk Analysis for the NASA space shuttle:a brief history and current work. Reliability Engineering&System Safety,2001,74:345-352
    [30] Davidson RA, Liu H, Sarpong I, et al. Electric power distribution systemperformance in Carolina hurricanes. Natural Hazards Review,2003,4(1):36-45
    [31] Liu H, Davidson RA, Rosowsky DV, et al. Negative binomial regression of electricpower outages in hurricanes. Journal of Infrastructure Systems,2005,11(4):258-267
    [32] Liu H, Davidson RA, Tatiyana VA. Spatial generalized linear mixed models ofelectric power outages due to hurricanes and ice storms. Reliability Engineering&System Safety,2009,93:875-890
    [33] Xu N, Nozick LK, Turnquist MA, et al. Optimizing investment for recovery ininterdependent infrastructures. Big Island, HI, United states: Inst. of Elec. and Elec.Eng. Computer Society.2007
    [34] Porcellinis S, Setola R, Panzieri S, et al. Simulation of heterogeneous andinterdependent critical infrastructures. International Journal of CriticalInfrastructures,2008,4(1-2):110-128
    [35] Kroger W. Critical infrastructures at risk: A need for a new conceptual approach andextended analytical tools. Reliability Engineering&System Safety,2008,93(12):1781-1787
    [36] Bekkers V, Thaens M. Interconnected networks and the governance of risk and trust.Information Polity,2005,10(1-2):37-48
    [37] Santos JR, Haimes YY. Demand-reduction input-output (I-O) analysis for modelinginterconnectedness. Santa Barbara, CA, United states: American Society of CivilEngineers.2002
    [38] Leung M, Haimes YY, Santos JR. Supply and output-side extensions to theinoperability input-output model for interdependent infrastructures. Journal ofInfrastructure Systems,2007,13(4):299-310
    [39] Conrad SH, LeClaire RJ, O'Reilly GP, et al. Critical national infrastructurereliability modeling and analysis. Bell Labs Technical Journal,2006,11(3):57-71
    [40] Jurkauskas A, Miceviciene D, Prunskiene J. The main principles of modelling theinteraction between transport infrastructure development and economy. Transport,2005,20(3):117-122
    [41] Tolk A, Uhrmacher AM. Agents: agenthood, agent architecture, and agenttaxonomies. agent-directed simulation and systems engineering. WILEYVCH.2009
    [42] Barton D, Eidson E, Schoenwald D. Aspen-EE: An Agent-Based Model ofInfrastructure Interdependency. NM Sandia National Laboratories.1998
    [43] Schoenwald D, Barton D, M Ehlen. An Agent-Based Simulation Laboratory forEconomics and Infrastructure Interdependency. Proceeding of the2004AmericanControl Conference Boston, Massachusetts.2004
    [44] Haimes YY, Risk Modeling, Assessment and Management. New York: Wiley.2004
    [45] Haimes YY, Santos J, Crowther K. Risk Analysis in interdependent infrastructuresIFIP International Federation for Information Processing. Critical InfrastructureProtection,2004,253:297-310
    [46] Leontief WW. The structure of the American economy. New York: Oxford Univ.Press.1951
    [47] Leontief WW. Input-output economics. Science America.1951,10:15-21
    [48] Oosterhaven J. Leontief versus Ghoshian price and quantity models. SouthernEconomic Journal,1996,62(3):750-759
    [49] Haimes YY, Jiang P. Leontief-based model of risk in complex interconnectedinfrastructures. Journal of Infrastructure Systems,2001,7(1):1-12
    [50] Haimes YY, Horowitz BM, Lambert JH, et al. Inoperability input-output model forinterdependent infrastructure sectors. II: Case studies. Journal of InfrastructureSystems,2005,11(2):80-92
    [51] Jiang P. Input-output inoperability risk model and beyond: a holistic approach. Ph.D. dissertation. Systems and Information E ngineering Dept., Univ. of Virginia,Charlottes ville, Va.2003
    [52] Santos J R. Inoperability input-output modeling of disruptions to interdependenteconomic systems. Journal of Systems Engineering and Electronics,2001,9(1):20-34
    [53] United States Department of Commerce. Benchmark input-output accounts of theUnited States, Bureau of Economic Analysis, U.S. Government Printing Office,Washington, D.C.1992
    [54] Borshchev A, Filippov A. From system dynamics and discrete event to practicalagent based modeling: reasons, techniques, tools. In: Proceedings of the22ndinternational conference of the system dynamics society.2004
    [55] GO Reilly, Uzunalioglu H, Conrad S, et al. Inter-Infrastructure Simulations AcrossTelecom, Power and Emergency Services [C]. Proc.5th Internet Workshop onDesign of Reliable Commun. Networks (DRCN'05), Ischia.2005.http://www.sandia.gov/nisac/docs/Inter-Infrastructure_Simulation_04-04-2005.doc
    [56] Brown T, Beyeler W, Barton D. Assessing Infrastructure Interdependencies: TheChallenge of Risk Analysis for Complex Adaptive Systems. International Journal ofCritical Infrastructures,2004,1(1):108-117
    [57] Beyeler W, Conrad S, Corbet T, et al. Inter-Infrastructure Modeling Ports andTelecommunications. Bell Labs Technical Journal,2004,9(2):91-105
    [58]谭跃进,吴俊,邓宏钟等.复杂网络抗毁性研究综述.系统工程,2006,24(10):1-5
    [59]邓宏钟,吴俊,李勇等.复杂网络拓扑结构对系统抗毁性影响研究.系统工程与电子技术,2008,30(12):2425-2428
    [60] Zhou T, Fu ZQ, Wang BH. Epidemic dynamics on complex networks. Progress inNatural Science,2006,16(5):452-457
    [61] Holme P, Kim BJ, Yoon CN, et al. Attack vulnerability of complex networks.Physical Review E,2002,65(1):056109
    [62] Criado R, Garcia A, Hernández-Bermejo B, et al. New results on computableefficiency and its stability for complex networks. Journal of Computational andApplied Mathematics,2006,192(1):59-74
    [63] Crucitti P, Latora V, Marchiori M, et al. Efficiency of scale-free networks: Error andattack tolerance. Physica A,2003,320:622-642
    [64] Criado R, Flores J, Hernández-Bermejo B, et al. Effective measurement of networkvulnerability under random and intentional attacks. Journal of MathematicalModeling and Algorithms,2005,4(3):307-316
    [65] Alina Beygelzimer, Geoffrey Grinstein. Improving network robustness by edgemodification. Physica A,2005,357:593-612
    [66] Wang B, Tang H, Guo C, et al. Optimization of network structure to random failures.Physica A,2006,368:607-614
    [67] Wang B, Tang H, Guo C, et al. Entropy Optimization of Scale-free NetworksRobustness to Random Failures. Physica A,2005,363:591-596
    [68] Rinaldi SM, Peerenboom JP, Kelley TK. Identifying, understanding, and analyzingcritical infrastructure interdependencies. IEEE Control Systems Magazine,2001,21(6):11-25
    [69] McDaniels T, Chang S, Peterson K, et al. Empirical framework for characterizinginfrastructure failure interdependencies. Journal of Infrastructure Systems,2007,13(3):175-184
    [70] Earl EL, John EM, William AW. Restoration of services ininterdependentinfrastructure systems: a network flows approach. IEEE Transactionson Systems, Man, and Cybernetics—Part C: Application and Reviews,2007,37(6):1303-1317
    [71] Svendsen NK, Wolthusen SD. Connectivity models of interdependency inmixed-type critical infrastructure networks. Information Security Technical Report.2007,(12):44-55
    [72] Svendsen NK, Wolthusen SD. Multigraph Dependency Models for HeterogeneousCritical Infrastructures [C]. In Proceedings of the First Annual IFIP TC11.10International Conference on Critical Infrastructure Protection. Hanover, NH, USA,Springer-Verlag.2007:337-350
    [73] Svendsen NK, Wolthusen SD. Analysis and Statistical Properties ofCriticalInfrastructure Interdependency Multiflow Models [C]. In Proceedings fromthe Eighth Annual IEEE SMC Information Assurance Workshop, United StatesMilitary Academy. IEEE Press,2007:247-254
    [74] Svendsen NK, Wolthusen SD. Graph Models of Critical InfrastructureInterdependencies [C]. In Inter-Domain Management, Proceedings of the FirstInternational Conference on Autonomous Infrastructure, Management, and Security(AIMS2007)(Oslo, Norway, Jun.2007). A. K. Bandara and M. Burgess, Eds., vol.4543of Lecture Notes in Computer Science, Springer-Verlag,2007:208-211
    [75] Utne IB, Hokstad P, Vatn J. A method for risk modeling of interdependencies incritical infrastructures. Reliability Engineering&System Safety,2011,98(6):671-678
    [76] Utne IB, Hokstad P, Vatn J. A method to modeling interdependencies in RiskAnalysis of critical infrastructures. In: Reliability, risk and safety: theory andapplications. CRC Press;2009
    [77] Zhang P, Peeta S. A generalized modeling framework to analyze interdependenciesamong infrastructure systems. Transportation Research Part B,2011,45:553-579
    [78] Rosato V, Issacharoff L, Tiriticco F, et al. Modelling interdependent infrastructuresusing interacting dynamical models. International Journal of Critical Infrastructures,2008,4:63-79
    [79] Haimes YY. On the definition of vulnerabilities in measuring risks to infrastructures.Risk Analysis,2006,26(2):293-296
    [80] Ouyang M, Hong L, Mao Z, et al. A methodological approach to analyzevulnerability of interdependent infrastructures. Simulation Modelling Practice andTheory,2009,17:817(1-12)
    [81] Newman MEJ, GirvanM. Finding and evaluating Community structure in networks.Physical Review E,2004,69:026113
    [82] Dilley M, Boudreau T. Coming to terms with vulnerability: a critique of the foodsecurity definition. Food Policy,2001,26(3):229-247
    [83] Einarsson S, Rausand M. An approach to vulnerability analysis of complexindustrial systems. Risk Analysis,1998,15(5):535-546
    [84] Holmgren. Vulnerability Analysis of Electrical Power Delivery Networks,Licentiate thesis, Department of Transport and Economics, Royal Institute ofTechnology, Stockholm, Sweden.2004
    [85] Kaplan S, Garrick BJ. On the quantitative definition of risk. Risk Analysis,1981,1(1):11-27
    [86] Johansson J. Risk and Vulnerability Analysis of Interdependent TechnicalInfrastructures. PhD thesis.2010
    [87] Hansson SO. The Epistemology of Technological Risk, Techné: Research inPhilosophy and Technology,2005,9(2):68-80
    [88] Aven T. A unified framework for risk and vulnerability analysis covering both safetyand security. Reliability Engineering&System Safety,2007,92:745-754
    [89] Hollnagel E, Woods DD, Leveson N, et al. Resilience Engineering: Concepts andprecepts, Ashgate Publishing Limited, Aldershot, UK.2006
    [90] McDaniels T, Chang S, Cole D, et al. Fostering resilience to extreme events withininfrastructure systems: Characterizing decision contexts for mitigation andadaptation. Global Environmental Change,2008,18(2):310-318
    [91] Zio E. Reliability Engineering: Old Problems and New Challenges. ReliabilityEngineering&System Safety,2009,94:125-141
    [92] Hansson SO, Helgesson G. What is stability?. Synthese,2003,136(2):219-235
    [93]殷剑宏,吴开亚.图论及其算法.合肥:中国科学技术大学出版社,2004
    [94] Strogatz S H. Exploring complex networks. Nature,2001,410:268-276
    [95] Watts DJ. Small worlds: the dynamics of networks between order and randomness.Princeton:Princeton University Press.1998
    [96] Haimes YY, Longstaff T. The Role of Risk Analysis in the Protection of CriticalInfrastructures Against Terrorism. Risk Analysis,2002,22(3):439-444
    [97] Johansson J, J nsson H, Johansson H. Analysing the Vulnerability of ElectricDistribution Systems: A Step Towards Incorporating the Societal Consequences ofDisruptions. International Journal of Emergency Management,2007,4(1):4-17
    [98] Little RG. A socio-technical systems approach to understanding and enhancing thereliability of interdependent infrastructure systems. International Journal ofEmergency Management,2004,2(1-2):98-110
    [99] Motter A, Nishikawa T, Lai Y. Cascade-based attacks on complex networks.Physical Review E,2002,66:065102(1-4)
    [100] Motter A. Cascade Control and Defense in Complex Networks. Physical ReviewLetter,2004,93:098701(1-4)
    [101]王茂林.新中国城市经济五十年.北京:经济管理出版社,2000
    [102]Cohen R. Resilience of the Internet to Random Breakdowns. Physical Review Letter,2000,85:4626-4628
    [103] Cohen R. Breakdown of the Internet under Intentional Attack. Physical ReviewLetter,2001,86:3682-3685
    [104] Wang WX, Chen GR. Universal robustness characteristic of weighted networksagainst cascading failure. Physical Review E,2008,77,026101
    [105] Mirzasoleiman B, Babaei M, Jalili M, et al. Cascaded failures in weighted networks.Physical Review E,2011,84(4):046114(1-8)
    [106] Newman MEJ. Fast algorithm for detecting community structure in networks.Physical Review E,2004,69(6):066133
    [107] Girvan M, Newman MEJ. Community structure in social and biological networks.Proceedings of the National Academy of Sciences,2002,99(12):7821-7826
    [108] Newman MEJ. Analysis of weighted networks. Physical Review E,2004,70:056131.
    [109] Donath W, Hoffman A. Lower bounds for the partitioning of graphs. IBM JournalOf Research and Development,1973,17(5):420
    [110] Fiedler M. Algebraic connectivity of graphs. Czechoslovak Mathematical Journal,1973,23(98):298-305
    [111] KernighanBW, Lin S. An efficient heuristic procedure for partitioning graphs. BellSystem Technical Journal,1970,49:291-307
    [112] HastieT, Tibshirani R, Friedman J H. The Elements of Statistical Learning. Springer,Berlin, Germany, ISBN03879528452001
    [113] Newman MEG. Assortative Mixing in Networks. Physical Review Letter,2002,89:208701(1-4)
    [114] Clauset A, Newman MEJ, Moore C. Finding community structure in very largenetworks. Physical Review E,2004,70(6):066111.
    [115] Cui D, Gao ZY, Zhao XM. Cascades with coupled map lattices in preferentialattachment community networks. Chinese Physics B,2008,17:1703-1708
    [116] Claudio M. Rocco S., Jose Emmanuel Ramirez-Marquez. Vulnerability metrics andanalysis for communities in complex networks. Reliability Engineering&SystemSafety,2011,96:1360-1366
    [117]武汉城市总体规划(2006-2020).武汉市城市规划设计研究院
    [118] Zimmerman R, Restrepo CE. The next step: quantifying infrastructureinterdependencis to improve security. International Journal of CriticalInfrastructures,2006,2(3):215-230
    [119] Eusgeld I, Nan C, Dietz S.‘‘System-of-systems’’ approach for interdependentcritical infrastructures. Reliability Engineering&System Safety,2011,96:1-8
    [120] Eusgeld I, Kroger W, Sansavini G, et al. The role of network theory andobject-oriented modeling within a framework for the vulnerability analysis ofcritical infrastructures. Reliability Engineering&System Safety,2009,94:954–963
    [121] Winkler J, Due as-Osorio L, Stein R, et al. Interface network models for complexurban infrastructure systems. Journal of Infrastructure Systems,2011,17(4):138-150
    [122] Carvalho R, Buzna L, Bono F, et al. Robustness of trans-European gas networks.Physical Review E,2009,80:016106
    [123] Volkanovski A, Cepin M, Mavko B. Application of the fault tree analysis forassessment of power system reliability. Reliability Engineering&System Safety,2009,94(6):1116-1127
    [124] Zio E, Golea LR. Analyzing the topological, electrical and reliability characteristicsof a power transmission system for identifying its critical elements. ReliabilityEngineering&System Safety,2012,101:67-74