1 |
FAN J R , LI D G , LI R P , et al. Analysis on MAV/UAV coope- rative combat based on complex Network[J]. Defence Technology, 2020, 16 (1): 150- 157.
doi: 10.1016/j.dt.2019.09.002
|
2 |
陈侠, 赵明明, 徐光延. 基于合作联盟的多无人机对地攻防对抗策略[J]. 兵工自动化, 2014, 33 (1): 49- 55.
|
|
CHEN X , ZHAO M M , XU G Y . Multiple UAV operation strategy attack-defense confrontation to ground based on coopera- tive alliance[J]. Ordnance Industry Automation, 2014, 33 (1): 49- 55.
|
3 |
LIN L , GOODRICH M . Hierarchical heuristic search using a Gaussian mixture model for UAV coverage planning[J]. IEEE Trans.on Cybernetics, 2014, 44 (12): 2532- 2544.
doi: 10.1109/TCYB.2014.2309898
|
4 |
何道敬, 杜晓, 乔银荣, 等. 无人机信息安全研究综述[J]. 计算机学报, 2019, 42 (5): 1076- 1094.
|
|
HE D J , DU X , QIAO Y R , et al. A survey on security of unmanned aerial vehicles[J]. Chinese Journal of Computers, 2019, 42 (5): 1076- 1094.
|
5 |
程翔. 人工智能时代马赛克战致胜机理研究[J]. 舰船电子对抗, 2020, 43 (2): 12- 15.
doi: 10.16426/j.cnki.jcdzdk.2020.02.003
|
|
CHENG X . Research into the winning mechanism of Mosaic warfare in AI era[J]. Shipboard Electronic Countermeasure, 2020, 43 (2): 12- 15.
doi: 10.16426/j.cnki.jcdzdk.2020.02.003
|
6 |
张婷婷, 蓝羽石, 宋爱国. 无人集群系统自主协同技术综述[J]. 指挥与控制学报, 2021, 7 (2): 127- 136.
doi: 10.3969/j.issn.2096-0204.2021.02.0127
|
|
ZHANG T T , LAN Y S , SONG A G . An overview of autonomous collaboration technologies for unmanned swarm systems[J]. Journal of Command and Control, 2021, 7 (2): 127- 136.
doi: 10.3969/j.issn.2096-0204.2021.02.0127
|
7 |
喻煌超, 牛轶峰, 王祥科. 无人机系统发展阶段和智能化趋势[J]. 国防科技, 2021, 42 (3): 18- 24.
|
|
YU H C , NIU Y F , WANG X K . Stages of development of unmanned aerial vehicles[J]. National Defense Technology, 2021, 42 (3): 18- 24.
|
8 |
LEVIS A , LEE W . C4ISR architectures: I. developing a process for C4ISR architecture design[J]. Systems Engineering, 2000, 3 (4): 225- 247.
doi: 10.1002/1520-6858(2000)3:4<225::AID-SYS4>3.0.CO;2-#
|
9 |
戴浩. 无人机系统的指挥控制[J]. 指挥与控制学报, 2016, 2 (1): 5- 8.
|
|
DAI H . Command and control for unmanned aerial vehicles[J]. Journal of Command and Control, 2016, 2 (1): 5- 8.
|
10 |
宋晓程, 高晗. 面向无人作战的智能平行指控系统架构研究[C]//第七届中国指挥控制大会, 2019: 212-216.
|
|
SONG X C, GAO H. Intelligent parallel C2 system architecture for unmanned warfare[C]//Proc. of the 7th China Confe- rence on Command and Control, 2019: 212-216.
|
11 |
ARSLAN O, INALHAN G. Design of a decision support architecture for human operators in UAV fleet C2 applications[C]//Proc. of the 14th International Command and Control Research and Technology Symposium, 2009.
|
12 |
王勃, 姚佩阳, 贾方超, 等. 多无人机任务集结合作博弈优化自组织协同控制[J]. 电光与控制, 2014, 21 (11): 5- 13.
|
|
WANG B , YAO P Y , JIA F C , et al. Optimal self-organized cooperative control for mission rendezvous of multiple UAVs[J]. Electronics Optics & Control, 2014, 21 (11): 5- 13.
|
13 |
周翔翔, 姚佩阳, 王欣, 等. 指挥控制组织结构扁平化分析及测度[J]. 火力与指挥控制, 2012, 37 (8): 14- 18.
|
|
ZHOU X X , YAO P Y , WANG X , et al. Research on analysis and measure of combat command and control organization flattening[J]. Fire Control & Command Control, 2012, 37 (8): 14- 18.
|
14 |
孙鹏, 武君胜, 陈冠宇, 等. 基于人工蜂群算法的指控结构适应性调整方法[J]. 计算机应用研究, 2019, 36 (3): 681- 686.
|
|
SUN P , WU J S , CHEN G Y , et al. Adaptive adjustment of command and control structure based on artificial bee colony algorithm[J]. Application Research of Computers, 2019, 36 (3): 681- 686.
|
15 |
CHEN C , BAO W D , ZHU X M , et al. AGILE: a terminal energy efficient scheduling method in mobile cloud computing[J]. Transactions on Emerging Telecommunications Technologies, 2015, 26 (12): 1323- 1336.
|
16 |
闫晶晶, 端木竹筠, 周晓明, 等. 指挥控制任务共同体动态重构机制研究[J]. 指挥信息系统与技术, 2010, 1 (4): 20- 25.
|
|
YAN J J , DUANMU Z Y , ZHOU X M , et al. Research of dynamic reconfiguration mechanism for C2 communities of interest[J]. Command Information System & Technology, 2010, 1 (4): 20- 25.
|
17 |
吕学志, 胡晓峰, 吴琳, 等. 基于贝叶斯网络的任务共同体识别[J]. 计算机工程与应用, 2019, 55 (5): 251- 257.
|
|
LYU X Z , HU X F , WU L , et al. Identification method of mission community based on Bayesian network[J]. Computer Engineering and Applications, 2019, 55 (5): 251- 257.
|
18 |
金欣, 陆晓明, 端木竹筠, 等. 基于软件定义的服务化指控系统灵活重构方法[C]//第三届中国指挥控制大会, 2015: 387-392.
|
|
JIN X, LU X M, DUANMU Z Y, et al. Software defined method on service-based flexible reconfiguration of command & control system[C]//Proc. of the 3th China Conference on Command and Control, 2015: 387-392.
|
19 |
张壮, 李琳琳, 魏振华, 等. 基于变权-投影灰靶的指控系统动态效能评估[J]. 系统工程与电子技术, 2019, 41 (4): 801- 809.
|
|
ZHANG Z , LI L L , WEI Z H , et al. Dynamic effectiveness evaluation of command and control system based on variable weight-projection gray target[J]. Systems Engineering and Electronics, 2019, 41 (4): 801- 809.
|
20 |
蓝羽石, 易侃, 王珩, 等. 网络化C4ISR系统结构时效性分析方法[J]. 系统工程与电子技术, 2013, 35 (9): 1908- 1914.
|
|
LAN Y S , YI K , WANG H , et al. Delay assessment method for networked C4ISR system architecture[J]. Systems Engineering and Electronics, 2013, 35 (9): 1908- 1914.
|
21 |
BAYNE J S. A theory of enterprise command and control[C]//IEEE Military Communications Conference, 2006.
|
22 |
孙海洋, 张安, 高飞. 云协同中作战资源两阶段虚拟化方法[J]. 系统工程与电子技术, 2018, 40 (5): 1036- 1042.
|
|
SUN H Y , ZHANG A , GAO F . Combat resource two-stage virtualization method in cloud cooperation[J]. Systems Engineering and Electronics, 2018, 40 (5): 1036- 1042.
|
23 |
BOYD J. A discourse on winning and losing[R]. Alabama: Air University Library, 1987.
|
24 |
阳东升, 张维明. PREA环及其平行智能[J]. 指挥与控制学报, 2019, 5 (4): 275- 281.
|
|
YANG D S , ZHANG W M . PREA loop and its parallel intelligence[J]. Journal of Command and Control, 2019, 5 (4): 275- 281.
|
25 |
BUETTNER R P. A headquarters effectiveness assessment tool(HEAT) evaluation of headquarters military airlift command(HQ MAC) powder river 1985 (PR85) command post exercise (CPX)[R]. Monterey CA: Naval Postgraduate School, 1985.
|
26 |
HE H , WANG W W , ZHU Y F , et al. Function chain-based mission planning method for hybrid combat SoS[J]. IEEE Access, 2019, 7, 100453- 100466.
|
27 |
王维平, 李小波, 杨松, 等. 智能化多无人集群作战体系动态适变机制设计方法[J]. 系统工程理论与实践, 2021, 41 (5): 1096- 1106.
|
|
WANG W P , LI X B , YANG S , et al. A design method of dynamic adaption mechanism for intelligent multi-unmanned-cluster combat system-of-systems[J]. Systems Engineering-Theory & Practice, 2021, 41 (5): 1096- 1106.
|
28 |
PETTER H , KIM J B , CHANG Y . Attack vulnerability of complex networks[J]. Physical Review E, 2002, 65 (5): 21- 36.
|
29 |
PENG G S , WU J . Optimal network topology for structural robustness based on natural connectivity[J]. Physica A: Statistical Mechanics and its Applications, 2016, 443, 212- 220.
|