2PALMER C R, STEFFAN J G. Generating network topologies that obey power laws[A]. Global Telecommunications Conference, GLOBECOM '00. IEEE[C]. 2000. 434-438. 被引量:1
3ADAMIC L A, HUMBERMAN B, LUKOSE R, PUNIYANI A. Search in power law networks[J]. Physical Review E. 2001, 64(4): 46135- 46143. 被引量:1
4Information Assurance Technical Frame version 3.1, National Security Agency[S]. 2002. 被引量:1
6FANG B X. Architecture for computer emergency response[A]. Proceedings of 2002 Euro-China Co-operation Foum on the Information Society[C]. 2002. 235-238. 被引量:1