李思.基于业务重要度的电力通信网可靠性评估[D].保定:华北电力大学, 2010.Li Si.The reliability evaluation of power communication networks based on service importance[D].Baoding, China:North China Electric Power University, 2010(in Chinese).
[2]
中国南方电网有限责任公司.Q/CSG 110020-2011 南方电网通信网络生产应用接口技术规范[S].广东:中国南方电网系统运行部, 2012.China Southern Power Grid Corporation.Q/CSG 110020-2011 Application of communication network interface technical specifications of CSG[S].Guangdong:System Operation Department of CSG, 2012(in Chinese).
[3]
Vardi Y, Zhang Cun Hui.Measures of network vulnerability[J].IEEE Signal Processing Letters, 2007, 14(5):313-316.
[4]
Peng Wei, Li Zimu, Liu Yujing, et al.Assessing the vulnerability of network topologies under large-scale regional failures[J].IEEE Journal of Communications and Networks, 2012, 14(4):451-460.
[5]
Wang Xiaoliang, Jiang Xiaohong, Pattavina A.Assessing network vulnerability under probabilistic region failure model[C]//IEEE 12th International Conference on High Performance Switching and Routing (HPSR).Cartagena, Spain:IEEE, 2011.
[6]
丁道奇.复杂大电网安全性分析:智能电网的概念与实现[M].北京:中国电力出版社, 2010:306.Ding Daoqi.Security analysis of large and complex grid:the concepts and the realization of smart grid [M].Beijing:China Electric Power Press, 2010:306(in Chinese).
[7]
Hauser C H, Bakken D E, Bose A.A failure to communicate:next generation communication requirements, technologies, and architecture for the electric power grid[J].IEEE Power & Energy Magazine, 2005, 3(2):47-55.
[8]
Zhaoxia X, Manimaran G, Vittal V.An information architecture for future power systems and its reliability analysis[J].IEEE Transactions on Power Systems, 2002, 17(3):857-863.
[9]
Chvatal V.Tough graphs and Hamiltonian circuits [J].Discrete Mathematics, 1973, 5(3):215-228.
[10]
Barefoot C A, Entringer R, Swart H.Vulnerability in graphs-a comparative survey[J].Journal of Combinatorial Mathematics and Combinatorial Computing, 1987(1):13-22.
[11]
Cozzens M, Moazzami D, Stueckle S.The tenacity of a graph[C]//Seventh International Conference on the Theory and Applications of Graphs.New York, USA:Wiley, 1995:1111-1122.
[12]
Jung H A.Class of posets and corresponding comparability graphs[J].Journal of Combinatorial Theory Series B, 1978, 24(2):125-133.
[13]
Bassalygo L A, Pinsker M S.The complexity of an optimal non-blocking communication scheme without reorganization[J].Problemy Peredaci Informacii, 1973, 9(1):84-87.
[14]
Wu J, Barahona M, Tan Y J, et al.Natural connectivity of complex networks[J].Chinese Physics Letters, 2010, 27(7):295-298.
[15]
Dinh T N, Ying Xuan, Thai M T, et al.On new approaches of assessing network vulnerability: hardness and approximation[J].IEEE/ACM Transactions on Networking, 2012, 20(2):609-619.
[16]
彭静, 卢继平, 汪洋, 等.广域测量系统通信主干网的风险评估[J].中国电机工程学报, 2010, 30(5):84-90.Peng Jing, Lu Jiping, Wang Yang, et al.Risk assessment of backbone communication network in WAMS [J].Proceedings of the CSEE, 2010, 30(5):84-90(in Chinese).
[17]
刘文霞, 罗红, 张建华.WAMS通信业务的系统有效性建模与仿真[J].中国电机工程学报, 2012, 32(16):144-150.Liu Wenxia, Luo Hong, Zhang Jianhua.Modeling and simulation on effectiveness of communication services system in WAMS[J].Proceedings of the CSEE, 2012, 32(16):144-150(in Chinese).