Wei Qi.Brittleness Theory of Complex System and Its Application to Crisis Analysis [D].Harbin:Harbin Engineering University,2004.
[2]
[3] Zhang P, Peeta S. A generalized modeling framework to analyze interdependencies among infrastructure systems [J]. Transportation Research Part B: Methodological,2011,45(3):553-579.
[3]
[4] Adachi T, Ellingwood B R. Serviceability of earthquake-damaged water systems: Effects of electrical power availability and power backup systems on system vulnerability [J]. Reliability Engineering & System Safety,2008,93(1):78-88.
[8] Fang C, Marle F, Zio E, et al. Network theory-based analysis of risk interactions in large engineering projects [J].Reliability Engineering & System Safety,2012,106:1-10.
[6]
[9] Li Y F, Sansavini G, Zio E. Non-dominated sorting binary differential evolution for the multi-objective optimization of cascading failures protection in complex networks [J].Reliability Engineering & System Safety,2013,111:195-205.
[7]
[10]Zio E, Golea L R, Sansavini G. Optimizing protections against cascades in network systems: A modified binary differential evolution algorithm [J].Reliability Engineering & System Safety,2012,103:72-83.
[8]
[13]Wang J. Robustness of complex networks with the local protection strategy against cascading failures [J].Safety Science,2013,53:219-225.
[9]
[14]Wang J. Mitigation strategies on scale-free networks against cascading failures [J].Physical A: Statistical Mechanics and its Applications,2013,392(9):2257-2264.
[10]
[21]Conrad S H, LeClaire R J, O’Reilly G P, et al. Critical national infrastructure reliability modeling and analysis [J].Bell Labs Technical Journal,2006,11(3):57-71.
Zhu Qin, Peng Xizhe, Wu Kaiya. Calculation and analysis on indirect carbon emissions from residential consumption based on input-output model [J].Journal of Natural Resources,2012,27(12):2018-2029.
[14]
[34]Konig M D, Battiston S, Napoletano M, et al. The efficiency and stability of R & D networks [J].Games and Economic Behavior,2012,75(2):694-713.
[15]
[35]Criado R, García del Amo A, Hernández-Bermejo B, et al. New results on computable efficiency and its stability for complex networks [J].Journal of Computational and Applied Mathematics,2006,192(1):59-74.
[16]
[42]McDaniels T, Chang S, Peterson K, et al. Empirical framework for characterizing infrastructure failure interdependencies [J].Journal of Infrastructure Systems,2007,13(3): 175-184.
[17]
[43]Lee E E, Mitchell J E, Wallace W A. Restoration of services in interdependent infrastructure systems: A network flows approach [J].Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on,2007,37(6):1303-1317.
[18]
[44]Utne I B, Hokstad P, Vatn J. A method for risk modeling of interdependencies in critical infrastructures [J].Reliability Engineering & System Safety,2011,96(6):671-678.
[19]
[45]Gao J, Buldyrev S V, Stanley H E, et al. Networks formed from interdependent networks [J].Nature Physics,2011,8(1):40-48.
[20]
[46]Zhang P, Peeta S. A generalized modeling framework to analyze interdependencies among infrastructure systems [J].Transportation Research Part B: Methodological,2011,45(3):553-579.
[21]
[47]Rosato V, Issacharoff L, Tiriticco F, et al. Modeling interdependent infrastructures using interacting dynamical models [J].International Journal of Critical Infrastructures,2008,4(1):63-79.
[22]
[48]Haimes Y Y. On the definition of vulnerabilities in measuring risks to infrastructures [J].Risk Analysis,2006,26(2):293-296.
[23]
[49]Ouyang M, Hong L, Mao Z J, et al. A methodological approach to analyze vulnerability of interdependent infrastructures [J].Simulation Modeling Practice and Theory,2009,17(5):817-828.
[24]
[1] Duenas-Osorio L. Interdependent Response of Networked Systems to Natural Hazards and Intentional Disruptions [D]. Houston: Rice University,2005.
[25]
[2] 韦琦.复杂系统脆性理论及其在危机分析中的应用[D].哈尔滨:哈尔滨工程大学,2004.
[26]
Word Bank.World Development Report of 1994-Providing Infrastructure for the Development [M].Mao Xiaowei,translation.Beijing:China Financial & Econoric Publishing House,1994.
Wardrop M.Complication: the Science Born on the Bound between Order and Chaos [M].Chen Ling,translation,Beijing: Life, Reading, Awakening Joint Bookstore,1997.
[29]
[7] 李宏亮. 基于 Agent 的复杂系统分布仿真[D].长沙: 国防科学技术大学,2001.
[30]
Li Hongliang. Distributed Simulation of Complex Systems Based on Agent [D].Changsha: National University of Defense Technology,2001.
[31]
[11]Pate-Cornell E, Dillon R. Probabilistic risk analysis for the NASA space shuttle: a brief history and current work [J].Reliability Engineering & System Safety,2001,74(3):345-352.
[32]
[12]Davidson R A, Liu H, Sarpong I, et al. Electric power distribution system performance in Carolina hurricanes [J].Natural Hazards Review,2003,4(1):36-45.
[33]
[15]De Porcellinis S, Setola R, Panzieri S, et al. Simulation of heterogeneous and interdependent critical infrastructures [J].International Journal of Critical Infrastructures,2008,4(1):110-128.
[34]
[16]Macchi M, Garetti M, Centrone D, et al. Maintenance management of railway infrastructures based on reliability analysis [J].Reliability Engineering & System Safety,2012,104:71-83.
[35]
[17]Kroger W. Critical infrastructures at risk: A need for a new conceptual approach and extended analytical tools [J].Reliability Engineering & System Safety,2008,93(12):1781-1787.
[36]
[18]Bekkers V, Thaens M. Interconnected networks and the governance of risk and trust [J].Information Polity,2005,10(1):37-48.
Yin Xianggen, Chen Qingqian, Wang Bo, et al. Vulnerability assessment of the power system based on a four layer collecting model [J].Transactions of China Electrotechnical Society,2013(1):225-233.
[39]
[20]Leung M, Haimes Y Y, Santos J R. Supply-and output-side extensions to the inoperability input-output model for interdependent infrastructures [J].Journal of Infrastructure Systems,2007,13(4):299-310.
[40]
Chen Guoyan, Zhang Zhe, Yin Xianggen. Design of wide-area backup protection simulation platform based on HLA/Agent [J].China Journal of Electrical Engineering,2013,33(1):153-162.
[41]
[23]Haimes Y Y, Santos J, Crowther K. Risk analysis in interdependent infrastructures[J].Critical Infrastructure Protection,2004,253:297-310.
[42]
[24]Leontief W W. The Structure of American Economy, 1919-1939: An Empirical Application of Equilibrium Analysis [M].New York: Oxford University Press,1953.
[43]
[25]Leontief W W. Input-output economics [J].Sci Am,1951,185(4):15-21.
[44]
[26]Oosterhaven J. Leontief versus Ghoshian price and quantity models [J].Southern Economic Journal,1996,62(3):750-759.
[45]
[27]Haimes Y Y, Jiang P. Leontief-based model of risk in complex interconnected infrastructures [J].Journal of Infrastructure Systems,2001,7(1):1-12.
Gu Jie, Qin Yue, Bao hailong, et al. Comprehensive and dynamic evaluation of the distribution network planning based on entropy weight and system dynamics [J].Power System Protection and Control,2013,41(1):76-83.
[48]
[30]Brown T, Beyeler W, Barton D. Assessing infrastructure interdependencies: the challenge of risk analysis for complex adaptive systems [J].International Journal of Critical Infrastructures,2004,1(1):108-117.
[49]
[31]Beyeler W E, Conrad S H, Corbet T F, et al. Inter-infrastructure modeling: ports and telecommunications [J].Bell Labs Technical Journal,2004,9(2):91-105.
Liu Jianxiang.Complex network and roview of domestic research[J].Chinese Journal of System Science,2009,17(4):417-418.
[52]
[33]Tao Z, Zhongqian F, Binghong W. Epidemic dynamics on complex networks [J].Progress in Natural Science,2006,16(5):452-457.
[53]
[36]Crucitti P, Latora V, Marchiori M, et al. Efficiency of scale-free networks: error and attack tolerance [J].Physical A: Statistical Mechanics and its Applications,2003,320:622-642.
[54]
[37]Criado R, Flores J, Hernandez-Bermejo B, et al. Effective measurement of network vulnerability under random and intentional attacks [J].Journal of Mathematical Modeling and Algorithms,2005,4(3):307-316.
[55]
[38]Ouyang M, Duenas-Osorio L, Min X. A three-stage resilience analysis framework for urban infrastructure systems [J].Structural Safety,2012,36:23-31.
[56]
[39]Ramirez-Marquez J E, Rocco C M, Levitin G. Optimal network protection against diverse interdictor strategies [J].Reliability Engineering & System Safety,2011,96(3):374-382.
[57]
[40]Zio E, Golea L R, Rocco S C M. Identifying groups of critical edges in a realistic electrical network by multi-objective genetic algorithms [J].Reliability Engineering & System Safety,2012,99:172-177.
[58]
[41]Rinaldi S M, Peerenboom J P, Kelly T K. Identifying, understanding, and analyzing critical infrastructure interdependencies [J].Control Systems, IEEE,2001,21(6):11-25.