{"id":"https://openalex.org/W2775452967","doi":"https://doi.org/10.1109/iecon.2017.8217213","title":"Vulnerability assessment of navigation station equipment network based on complex network theory","display_name":"Vulnerability assessment of navigation station equipment network based on complex network theory","publication_year":2017,"publication_date":"2017-10-01","ids":{"openalex":"https://openalex.org/W2775452967","doi":"https://doi.org/10.1109/iecon.2017.8217213","mag":"2775452967"},"language":"en","primary_location":{"id":"doi:10.1109/iecon.2017.8217213","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iecon.2017.8217213","pdf_url":null,"source":{"id":"https://openalex.org/S4363608531","display_name":"IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009600888","display_name":"Songchen Han","orcid":"https://orcid.org/0000-0001-8598-6558"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Han Songchen","raw_affiliation_strings":["School of Aeronautics & Astronautics, Sichuan University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Aeronautics & Astronautics, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I24185976"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101617869","display_name":"Peng Li","orcid":"https://orcid.org/0000-0003-2226-0500"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Peng","raw_affiliation_strings":["School of Aeronautics & Astronautics, Sichuan University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Aeronautics & Astronautics, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I24185976"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5009600888"],"corresponding_institution_ids":["https://openalex.org/I24185976"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.31769148,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":null,"first_page":"6940","last_page":"6945"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13371","display_name":"Military Defense Systems Analysis","score":0.9835000038146973,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9803000092506409,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.49674373865127563},{"id":"https://openalex.org/keywords/betweenness-centrality","display_name":"Betweenness centrality","score":0.4604225158691406},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4410734176635742},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4240735173225403},{"id":"https://openalex.org/keywords/network-information-system","display_name":"Network information system","score":0.41862937808036804},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4042205810546875},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.397983193397522},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.3079259693622589},{"id":"https://openalex.org/keywords/network-architecture","display_name":"Network architecture","score":0.24251559376716614},{"id":"https://openalex.org/keywords/network-management-station","display_name":"Network management station","score":0.23334193229675293},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19418269395828247}],"concepts":[{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.49674373865127563},{"id":"https://openalex.org/C117045392","wikidata":"https://www.wikidata.org/wiki/Q4899215","display_name":"Betweenness centrality","level":3,"score":0.4604225158691406},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4410734176635742},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4240735173225403},{"id":"https://openalex.org/C25536438","wikidata":"https://www.wikidata.org/wiki/Q1549841","display_name":"Network information system","level":4,"score":0.41862937808036804},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4042205810546875},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.397983193397522},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.3079259693622589},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.24251559376716614},{"id":"https://openalex.org/C16986412","wikidata":"https://www.wikidata.org/wiki/Q918419","display_name":"Network management station","level":3,"score":0.23334193229675293},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19418269395828247},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C53811970","wikidata":"https://www.wikidata.org/wiki/Q5062194","display_name":"Centrality","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iecon.2017.8217213","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iecon.2017.8217213","pdf_url":null,"source":{"id":"https://openalex.org/S4363608531","display_name":"IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.49000000953674316,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W223943637","https://openalex.org/W1520500625","https://openalex.org/W1594036152","https://openalex.org/W1777106694","https://openalex.org/W1979043229","https://openalex.org/W1982951849","https://openalex.org/W2013990708","https://openalex.org/W2058890778","https://openalex.org/W2068083563","https://openalex.org/W2349193064","https://openalex.org/W2410991632","https://openalex.org/W2461458936","https://openalex.org/W2466870725","https://openalex.org/W2468940162","https://openalex.org/W2528487512","https://openalex.org/W3113871131","https://openalex.org/W3117595984"],"related_works":["https://openalex.org/W1516497519","https://openalex.org/W2356738361","https://openalex.org/W4403306003","https://openalex.org/W2012724202","https://openalex.org/W3006871705","https://openalex.org/W4205555748","https://openalex.org/W2166456073","https://openalex.org/W2886295835","https://openalex.org/W2118175818","https://openalex.org/W2067279514"],"abstract_inverted_index":{"To":[0],"deal":[1],"with":[2,77,123],"the":[3,31,38,45,62,69,82,108,118,124,132,145,152,166,171,176,179,187,192,217,224],"impact":[4,218],"of":[5,20,41,64,71,117,126,137,154,163,178,182,194,210,219,227],"emergent":[6],"events":[7,221],"and":[8,17,74,161,190,208,222],"keep":[9],"air":[10],"traffic":[11,156],"control":[12,177],"(ATC)":[13],"equipment":[14,22,67,98,138,142,197,213],"operation,":[15],"planning":[16,207],"expansion":[18,209],"research":[19],"ATC":[21],"has":[23],"become":[24],"an":[25],"urgent":[26],"problem.":[27],"In":[28],"this":[29],"paper,":[30],"network":[32,51,72,75,83,99,109,155],"model":[33],"is":[34,100],"constructed":[35],"based":[36],"on":[37],"route":[39],"structure":[40,73],"navigation":[42,65,119,128,183,195,211],"station":[43,66,97,120,129,184,196,212],"in":[44,84,186],"ATC.":[46],"Using":[47],"maximal":[48],"connected":[49],"subset,":[50],"efficiency,":[52],"node":[53,121],"vulnerability,":[54],"maintenance":[55],"efficiency":[56,110],"fusing":[57],"flight":[58,172],"flow,":[59],"we":[60,87,148],"evaluate":[61],"vulnerability":[63,114,193],"from":[68],"perspective":[70],"combined":[76],"physical":[78],"condition.":[79],"By":[80],"analyzing":[81],"Southwest":[85],"China,":[86],"find":[88],"that":[89],"random":[90],"attacks":[91,106],"lead":[92,139],"to":[93,140,158],"lowest":[94],"vulnerability.":[95],"Navigation":[96],"a":[101,202],"scale-free":[102],"network.":[103,164,198],"Node":[104],"betweenness":[105],"cause":[107],"changing":[111,170],"rapidly.":[112],"The":[113],"assessment":[115],"value":[116],"integrated":[122],"contribution":[125],"adjacent":[127],"nodes":[130,185],"follows":[131],"power-law":[133],"distribution.":[134],"Unreasonable":[135],"distributions":[136],"some":[141],"redundancy.":[143],"At":[144],"same":[146],"time,":[147],"can":[149,174],"also":[150],"balance":[151],"distribution":[153],"load":[157,181,189],"improve":[159],"reliability":[160],"sustainability":[162],"Considering":[165],"actual":[167],"flow":[168,173],"load,":[169],"ensure":[175],"working":[180],"limit":[188],"reduce":[191,216],"These":[199],"methods":[200],"provide":[201],"new":[203],"theoretical":[204],"basis":[205],"for":[206],"network,":[214],"greatly":[215],"unexpected":[220],"maintain":[223],"stable":[225],"operation":[226],"civil":[228],"aviation.":[229]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
