1 |
ADMIRAL V , CEBROWSKI A K , GARSTKA J J , et al. Network-centric warfare: its origin and future[J]. US Naval Institute Proceedings, 1998, 124 (1): 28- 35.
|
2 |
LEE Y , SHIN S W , PARK M S , et al. Agent-based simulation and its application to analyze combat effectiveness in network-centric warfare considering communication failure environments[J]. Mathe-matical Problems in Engineering, 2018, 2018 (2): 1- 9.
|
3 |
XIN B , WANG Y P , CHEN J . An efficient marginal-return-based constructive heuristic to solve the sensor-weapon-target assignment problem[J]. IEEE Trans.on Systems, Man and Cybernetics: Systems, 2018, 49 (12): 1- 12.
|
4 |
DAS S K , MUKHERJEE S . Agent based decision making for integrated air defense system[J]. Journal of Battlefield Technology, 2011, 14 (1): 1- 8.
|
5 |
ZHOU J , YU X , LU J A . Node importance in controlled complex networks[J]. IEEE Trans.on Circuits and Systems Ⅱ Express Briefs, 2019, 66 (3): 437- 441.
doi: 10.1109/TCSII.2018.2845940
|
6 |
LIU J X, CHEN S D, WANG Y G. Study on node importance of complex network based military command control networks[C]//Proc.of the International Conference on Machine Learning and Cybernetics 2012: 920-923.
|
7 |
WEN R, CHEN X Q, DONG Z B, et al. Modeling for military system by weighted complex networks[C]//Proc.of the IEEE International Conference on Control & Automation, 2010.
|
8 |
QI Y B , LIU Z , CHEN H D , et al. Distributed combat system of systems network modeling[J]. Journal of Networks, 2013, 8 (8): 1906- 1912.
|
9 |
GUO N , GUO P , DONG H Y , et al. Modeling and analysis of cascading failures in projects: a complex network approach[J]. Computers and Industrial Engineering, 2019, 127, 1- 7.
doi: 10.1016/j.cie.2018.11.051
|
10 |
NAIMISHA K , BALAKRISHNAN N . Influence maximization from cascade information traces in complex networks in the absence of network structure[J]. IEEE Trans.on Computational Social Systems, 2019, 6 (6): 1147- 1155.
doi: 10.1109/TCSS.2019.2939841
|
11 |
PARK C , PATTIPATI K R , AN W , et al. Quantifying the impact of information and organizational structures via distributed auction algorithm: point-to-point communication structure[J]. IEEE Trans.on Systems, Man, and Cybernetics: Systems, 2012, 42 (1): 68- 85.
doi: 10.1109/TSMCA.2011.2157139
|
12 |
JIANG Y, WANG Y B. Analysis of attack and defense strategies on complex network[C]//Proc.of the International Conference on Sensor Network Security Technology and Privacy Communication System, 2013: 58-62.
|
13 |
TORLEIV M , RANDALL L . Network centric military communication[J]. IEEE Communication Magazine, 2007, 45 (10): 42- 44.
doi: 10.1109/MCOM.2007.4342821
|
14 |
LEVCGHUK G M, YU F L, PATTIPATI K R, et al. From hierarchies to heterarchies: application of network optimization to design of organization structures[C]//Proc.of the Command and Control Research and Technology Symposium, 2003.
|
15 |
LIU J X . A regulative arithmetic on the contingency communication in the damaged military communication network[J]. Applied Mechanics and Materials, 2014, 571, 364- 367.
|
16 |
YAO F F, LIANG Q, XU R J, et al. Some key issues on modeling and simulation of military communication network[C]//Proc.of the International Conference on Computer Science and Electronics Engineering, 2012: 532-535.
|
17 |
石福丽.基于超网络的军事通信网络建模、分析与重构方法研究[D].长沙:国防科技大学, 2013.
|
|
SHI F L. Research on super network based modeling and analysis for military communication network reconfiguration[D]. Changsha: National University of Defense Technology, 2013.
|
18 |
卜广志. 武器装备体系中的信息流分析与评估研究[J]. 系统工程与电子技术, 2007, 29 (8): 1309- 1313, 1321.
|
|
BU G Z . Study on information flow and its evaluation in armaments systems[J]. Systems Engineering and Electronics, 2007, 29 (8): 1309- 1313, 1321.
|
19 |
李尔玉, 龚建兴, 黄健, 等. 基于功能链的作战体系复杂网络节点重要性评价方法[J]. 指挥与控制学报, 2018, 4 (1): 42- 49.
|
|
LI E Y , GONG J X , HUANG J , et al. Node importance analysis of complex networks for combat systems based on function chain[J]. Journal of Command and Control, 2018, 4 (1): 42- 49.
|
20 |
李琳, 刘雅奇. 通信网节点重要性的多指标评价方法[J]. 海军工程大学学报, 2010, 22 (5): 69- 73, 102.
|
|
LI L , LIU Y Q . Node importance evaluation in communication network with respect to multiple network performance measures[J]. Journal of Naval University of Engineering, 2010, 22 (5): 69- 73, 102.
|
21 |
TIAN H, NIE B, ZHANG W J. Military units importance evaluation based on complex network[C]//Proc.of the International Conference on Machine Vision and Human-machine Interface, 2010: 737-740.
|
22 |
XIONG J S , LI J H , YANG Y H , et al. Comparision of centrality measures for military communication network based on complex theory[J]. Science and Technology Review, 2011, 29 (36): 38- 41.
|
23 |
LATORA V , MARCHIORI M . A measure of centrality based on network efficiency[J]. New Journal of Physics, 2007, 9 (6): 188- 188.
doi: 10.1088/1367-2630/9/6/188
|
24 |
GAO X , LI K Q , CHEN B . Invulnerability measure of a military heterogeneous network based on network structure entropy[J]. IEEE Access, 2018, 6, 6700- 6708.
doi: 10.1109/ACCESS.2017.2769964
|
25 |
GUO X L, SHI F L. Survivability analysis for military communication network considering customer types and traffic association[C]//Proc.of the IEEE International Conference on Electronics Computer Society, 2012.
|
26 |
FRANK H , FRISCH I . Analysis and design of survivable network[J]. IEEE Trans.on Communication Technology, 1970, 18 (5): 567- 662.
|
27 |
SCHNEIDER C M , ANDRE A M , JOSE S , et al. Onion-like network topology enhance robustness against malicious attacks[J]. Journal of Statistical Mechanics: Theory and Experiment, 2011, 2011 (1): P01027.
|
28 |
ZENG A , LIU W P . Enhancing network robustness against malicious attacks[J]. Physical Review E-Statistical, Nonlinear and Soft Matter Physics, 2012, 85 (6): 066130.
doi: 10.1103/PhysRevE.85.066130
|
29 |
陈建国. 抗毁地域综合通信网络拓扑规划算法研究[J]. 军事通信技术, 2005, 26 (2): 10- 13.
|
|
CHEN J G . Algorithm for planning survivable topology of regional integrated communication network[J]. Journal of Military Communication Technology, 2005, 26 (2): 10- 13.
|
30 |
陈建国, 姜锋. 通信网基于业务的抗毁性分析[J]. 无线电通信技术, 1998, 24 (3): 20- 22.
|
|
CHEN J G , JIANG F . Traffic-based survivability analysis on communication networks[J]. Radio Communications Technology, 1998, 24 (3): 20- 22.
|
31 |
孙梅, 詹武. 一种基于业务的Intranet抗毁性分析方法[J]. 计算机工程, 2007, 33 (10): 117- 119, 152.
|
|
SUN M , ZHAN W . An analytical method of Intranet survivability performance based on traffic[J]. Computer Engineering, 2007, 33 (10): 117- 119, 152.
|