. . . "of network, such as network security, information security, users security, controllability, and manageability.Conflict of InterestsThe authors declare that there is no conflict of interests regarding the publication of this paper.AcknowledgmentsThis work was supported in part by the National Grand Fundamental Research 973 Program of China under Grant no. 2012CB315901, the Key Project of Technolog" . .