1 |
CHEN G Y , SUN P , ZHANG J Y . Repair strategy of military communication network based on discrete artificial bee colony algorithm[J]. IEEE Access, 2020, 8, 73051- 73060.
doi: 10.1109/ACCESS.2020.2987860
|
2 |
HE Z Q, WANG L H, LIU W F. Model and effectiveness analysis for C4ISR system structure based on complex network[C]//Proc. of the 10th in International Conference on Intelligent Human Machine Systems and Cybernetics, 2018.
|
3 |
CHAN K S , JOHNSEN F T . Military communications and networks[J]. IEEE Communications Magazine, 2020,
doi: 10.1109/MCOM.2020.9183742
|
4 |
XIN B , WANG Y P , CHEN J . An efficient marginal-return-based constructive heuristic to solve the sensor-weapon-target assignment problem[J]. IEEE Trans.on Systems, Man, and Cybernetics: Systems, 2018, 49 (12): 2536- 2547.
|
5 |
LIU J X . A regulative arithmetic on the contingency communication in the damaged military communication network[J]. Applied Mechanics and Materials, 2014, 364, 571- 572.
|
6 |
PARK C , PATTIPATI K R , AN W , et al. Quantifying the impact of information and organizational structures via distributed auction algorithm: point-to-point communication structure[J]. IEEE Trans.on System Man and Cybernetics Part A Systems and Humans, 2012, 42 (1): 68- 86.
doi: 10.1109/TSMCA.2011.2157139
|
7 |
GAO X E , LI K Q , CHEN B . Invulnerability measure of a military heterogeneous network based on network structure entropy[J]. IEEE Access, 2018, 6, 6700- 6708.
doi: 10.1109/ACCESS.2017.2769964
|
8 |
TORLEIV M , RANDALL L . Network centric military communications[J]. IEEE Communication Magazine, 2008, 46 (11): 30- 32.
doi: 10.1109/MCOM.2008.4689241
|
9 |
SONG X , SHI W , TAN G , et al. Multi-level tolerance opinion dynamics in military command and control networks[J]. Physica A: Statal Mechanics and its Applications, 2015, 473, 322- 332.
|
10 |
ANAND K , BIANCONI G . Entropy measures for networks: toward an information theory of complex topologies[J]. Physical Review E, 2009, 80 (4): 045102.
doi: 10.1103/PhysRevE.80.045102
|
11 |
SCHEIDT D, SCHULTZ K. On optimizing command and control structures[C]//Proc. of the 16th International Command and Control Research and Technology Symposium, 2011.
|
12 |
LU Y , ZHAO Y J , SUN F C , et al. Measuring and improving communication robustness of networks[J]. IEEE Communications Letters, 2019, 23 (12): 2168- 2171.
doi: 10.1109/LCOMM.2019.2941940
|
13 |
WEN R, CHEN X Q, DONG Z B, et al. Modeling for military system by weighted complex networks[C]//Proc. of the IEEE International Conference on Control and Automation, 2010.
|
14 |
LIU J X, CHEN S D, WANG Y G. Study on node importance of complex network based military command control networks[C]//Proc. of the International Conference on Machine Learning and Cybernetics, 2012.
|
15 |
QI Y B , LIU Z , CHEN H D , et al. Distributed combat system of systems network modeling[J]. Journal of Networks, 2013, 8 (8): 1906- 1912.
|
16 |
石福丽. 基于超网络的军事通信网络建模、分析与重构方法研究[D]. 长沙: 国防科学技术大学, 2013.
|
|
SHI F L. Research on super network based modeling and analysis for military communication network reconfiguration[D]. Changsha: National University of Defense Technology, 2013.
|
17 |
LI J C , JIANG J , YANG K W , et al. Research on functional robustness of heterogeneous combat networks[J]. IEEE Systems Journal, 2019, 13 (2): 1487- 1495.
doi: 10.1109/JSYST.2018.2828779
|
18 |
DEKKER A H . Measuring the agility of networked military forces[J]. Journal of Battlefield Technology, 2006, 9 (1): 19- 24.
|
19 |
CARES J R. An information age combat model[R]. U.S. : Produced for the United States Office of the Secretary of Defense, 2004.
|
20 |
朱刚, 谭贤四, 王红, 等. NSHT预警装备体系网络化建模与分析[J]. 火力与指挥控制, 2015, 40 (2): 118- 122.
doi: 10.3969/j.issn.1002-0640.2015.02.029
|
|
ZHU G , TAN X S , WANG H , et al. NSHT early warning system-of-systems networked modeling and analyzing[J]. Fire Control and Command Control, 2015, 40 (2): 118- 122.
doi: 10.3969/j.issn.1002-0640.2015.02.029
|
21 |
李尔玉, 龚建兴, 黄健, 等. 基于功能链的作战体系复杂网络节点重要性评价方法[J]. 指挥与控制学报, 2018, 4 (1): 42- 49.
doi: 10.3969/j.issn.2096-0204.2018.01.0042
|
|
LI E Y , GONG J X , HUANG J , et al. Node importance analysis of complex networks for combat systems based on function chain[J]. Journal of Command and Control, 2018, 4 (1): 42- 49.
doi: 10.3969/j.issn.2096-0204.2018.01.0042
|
22 |
邢焕革, 彭义波. 条件攻击策略下作战体系网络抗打击性能分析[J]. 计算机工程与设计, 2015, 36 (4): 866- 871.
|
|
XING H G , PENG Y B . Anti-attack performance analysis of combat system network under selectivity attack strategy[J]. Computer Engineering and Design, 2015, 36 (4): 866- 871.
|
23 |
JIN W X, SONG P, LIU G Z. The vulnerability of the military SOS networks under different attack and defense strategies[C]//Proc. of the IEEE International Conference on Service Operations and Logistics and Informatics, 2014: 68-75.
|
24 |
SCHNEIDER C M , ANDRE A M , JOSE S , et al. Onion-like network topology enhance robustness against malicious attacks[J]. Journal of Statistical Mechanics: Theory and Experiment, 2011, 1, P01027.
|
25 |
QIU T , ZHAO A Y , XIA F , et al. Rose: robustness strategy for scale-free wireless sensor networks[J]. IEEE/ACM Trans.on Networking, 2017, 25 (5): 2944- 2959.
doi: 10.1109/TNET.2017.2713530
|
26 |
QIU T , LIU J , SI W S , et al. Robustness optimization scheme with multi-population co-evolution for scale-free wireless sensor networks[J]. IEEE/ACM Trans.on Networking, 2019, 27 (3): 1028- 1042.
doi: 10.1109/TNET.2019.2907243
|
27 |
WANG S , LIU J , JIN Y C . A computationally efficient evolutionary algorithm for multi-objective network robustness optimization[J]. IEEE Trans.on Evolutionary Computation, 2021,
doi: 10.1109/TEVC.2020.3048174
|
28 |
WANG S , LIU J , JIN Y C . Surrogate-assisted robust optimization of large-scale networks based on graph embedding[J]. on Evolutionary Computation, 2020, 24 (4): 735- 749.
doi: 10.1109/TEVC.2019.2950935
|
29 |
ZHOU M X , LIU J . A memetic algorithm for enhancing the robustness of scale-free networks against malicious attacks[J]. Physica A: Statistical Mechanics and its Applications, 2014, 410, 131- 143.
doi: 10.1016/j.physa.2014.05.002
|
30 |
汪小帆, 李翔, 陈关荣. 复杂网络理论及其应用[M]. 北京: 清华大学出版社, 2006.
|
|
WANG X F , LI X , CHEN G R . Complex network and its application[M]. Beijing: Tsinghua Press, 2006.
|