[1] Dittrich K, Duysters G. Networking as a means to strategy change: The case of open innovation in mobile telephony[J]. Journal of Product Innovation Management, 2007, 24(6): 510-521.[2] Todtling F. Innovation networks, collective learning, and industrial policy in regions of Europe[J]. European Planning Studies, 1999, 7(6): 693-697.[3] Zhang Y, Yang N. Research on robustness of R&D network under cascading propagation of risk with gray attack information[J]. Reliability Engineering and System Safety, 2013, 117: 1-8.[4] Garas A, Argyrakis P, Rozenblat C, et al. Worldwide spreading of economic crisis[J]. New Journal of Physics, 2010, 12(11): 113043.[5] 马源源, 庄新田, 李凌轩. 股市中危机传播的SIR模型及其仿真[J]. 管理科学学报, 2013, 16(7): 80-94.[6] 邓超, 陈学军. 基于复杂网络的金融传染风险模型研究[J]. 中国管理科学, 2014, 22(11): 11-18.[7] 赵钢, 杨英宝, 包旭. 供应链网络风险扩散动力学模型及其应用[J]. 系统工程理论与实践, 2015, 35(8): 2014-2024.[8] 刘纯霞, 舒彤, 汪寿阳,等. 基于小世界网络的供应链中断风险传导路径研究[J]. 系统工程理论与实践, 2015, 35(3): 608-615.[9] 杨康, 张仲义. 基于复杂网络理论的供应链网络风险传播机理研究[J]. 系统科学与数学, 2013, 33(10): 1224-1232.[10] 李钊, 徐国爱, 班晓芳,等. 基于元胞自动机的复杂信息系统安全风险传播研究[J]. 物理学报, 2013, 62(20): 200203.[11] 张永铮, 方滨兴, 迟悦. 用于评估网络信息系统的风险传播模型[J]. 软件学报, 2007, 18(1): 137-145.[12] 尹洪英, 权小锋. 交通运输网络级联失效影响规律及影响范围[J]. 系统管理学报, 2013, 22(6): 869-875.[13] Li Y F, Sansavini G, Zio E. Non-dominated sorting binary differential evolution for the multi-objective optimization of cascading failures protection in complex networks[J]. Reliability Engineering & System Safety, 2013, 111: 195-205.[14] Arroyo J M, Fernández F J. A genetic algorithm approach for the analysis of electric grid interdiction with line switching[C]//In: Proceedings of the 15th International Conference on Intelligent System Applications to Power Systems. Curitiba, 2009: 1-6.[15] Bier V M, Gratz E R, Haphuriwat NJ, et al. Methodology for identifying near-optimal interdiction strategies for a power transmission system[J]. Reliability Engineering and System Safety, 2007, 92(9): 1155-1161.[16] Salmeron J, Wood K, Baldick R. Analysis of electric grid security under terrorist threat[J]. IEEE Transactions on Power Systems, 2004, 19(2): 905-912.[17] Rocco S C M, Ramirez-Marquez J E. Deterministic network interdiction optimization via an evolutionary approach[J]. Reliability Engineering and System Safety, 2009, 94(2): 568-576.[18] Shao W, Vittal V. Corrective switching algorithm for relieving overloads and voltage violations[J]. IEEE Transactions on Power Systems, 2005, 20(4): 1877-1885.[19] Granelli G, Montagna M, Zanellini F, et al. Optimal network reconfiguration for congestion management by deterministic and genetic algorithms[J]. Electric Power Systems Research, 2006, 76(6-7): 549-556.[20] Zio E, Golea L R, Sansavini G. Optimizing protections against cascades in network systems: A modified binary differential evolution algorithm[J]. Reliability Engineering & System Safety, 2012, 103: 72-83.[21] Li Y F, Sansavini G, Zio E. Non-dominated sorting binary differential evolution for the multi-objective optimization of cascading failures protection in complex networks[J]. Reliability Engineering & System Safety, 2013, 111: 195-205.[22] Liu C, Li D, Fu B, et al. Modeling of self-healing against cascading overload failures in complex networks[J]. Europhysics Letters, 2014, 107(6): 68003.[23] 张超, 韩传峰, 孟令鹏,等. 供电和供水系统关联失效动力学模型及修复策略[J]. 系统管理学报, 2012, 21(4): 564-570.[24] Yi C, Bao Y, Jiang J, et al. Mitigation strategy against cascading failures on social networks[J]. China Communications, 2014, 11(8):37-46.[25] Yang R, Wang W X, Lai Y C. Optimal weighting scheme for suppressing cascades and traffic congestion in complex networks[J]. Physical Review E, 2009, 79(2): 026112.[26] Wang J W. Robustness of complex networks with the local protection strategy against cascading failures[J]. Safety Science, 2013, 53: 219-225.[27] Wang J W. Mitigation strategies on scale-free networks against cascading failures[J]. Physica A, 2013, 392(9): 2257-2264.[28] Wang J W, Jiang C, Qian J F. Robustness of Internet under targeted attack: A cascading failure perspective[J]. Journal of Network and Computer Applications, 2014, 40(7): 97-104.[29] Hanaki N, Nakajima R, Ogura Y. The dynamics of R&D network in the IT industry[J]. Research policy, 2010, 39(3): 386-399.[30] Broekel T, Hartog M. Determinants of cross-regional R&D collaboration networks: an application of exponential random graph models[R]. Marburg: Philipps-University Marburg, 2013.[31] Cloodt M, Hagedoorn J, Roijakkers N. Inter-firm R&D networks in the global software industry: an overview of major trends and patterns[J]. Business History, 2010, 52(1): 120-149.[32] Roediger-Schluga T, Barber M J. R&D collaboration networks in the European framework programmes: Data processing, network construction and selected results[J]. International Journal of Foresight and Innovation Policy, 2008, 4(3-4): 321-347.[33] Protogerou A, Caloghirou Y, Siokas E. The nature of EU-funded R&D collaboration networks in the area of information society technologies[C]//Proceedings of the DIME Conference on Distributed Networks and the Knowledge-based Economy. Juan Les Pins, France, 2007: 1-32.[34] Barber M J, Paier M, Scherngell T. Analyzing and modeling European R&D collaborations: challenges and opportunities from a large social network[M]//Dehmer M, Emmert-Streib F. Analysis of Complex Networks: From Biology to Linguistics. Weinheim, Germany: Wiley-VCH Verlag GmbH & Co. KGaA, 2009.[35] Autant-Bernard C, Mairesse J, Massard N. Spatial knowledge diffusion through collaborative networks[J]. Papers in Regional Science, 2007, 86(3): 341-350.[36] Newman M E J. The structure and function of complex networks[J]. SIAM Review, 2003, 45(2): 167-256.[37] 王建伟, 荣莉莉, 王铎. 基于节点局域特征的复杂网络上相继故障模型[J]. 管理科学学报, 2010, 13(8): 42-50.[38] Motter A E, Lai Y C. Cascade-based attacks on complex networks[J]. Physical Review E, 2002, 66(6): 065102.[39] Crucitti P, Latora V, Marchiori M. Model for cascading failures in complex networks[J]. Physical Review E, 2004, 69(4): 045104. |