1 |
CARES J. An information age combat model[C]//Proc. of the 9th International Command and Control Research and Technology Symposium, 2004.
|
2 |
FENG Y , LI M L , ZENG C Y , et al. Robustness of internet of battlefield things (IoBT): a directed network perspective[J]. Entropy, 2020, 22 (10): 1166.
doi: 10.3390/e22101166
|
3 |
LI J C , JIANG J , YANG K W , et al. Research on functional robustness of heterogeneous combat networks[J]. IEEE Systems Journal, 2019, 13 (2): 1487- 1495.
doi: 10.1109/JSYST.2018.2828779
|
4 |
刘彦, 陈春良, 昝翔, 等. 考虑双层耦合复杂网络的装备重要度评估方法[J]. 兵工学报, 2018, 39 (9): 1829- 1840.
doi: 10.3969/j.issn.1000-1093.2018.09.021
|
|
LIU Y , CHEN C L , ZAN X , et al. Evaluation method for equipment importance considering bi-layer coupled complex network[J]. Acta Armamentarii, 2018, 39 (9): 1829- 1840.
doi: 10.3969/j.issn.1000-1093.2018.09.021
|
5 |
WANG Z Q, PEI X B, WANG Y B, et al. Ranking the key nodes with temporal degree deviation centrality on complex networks[C]//Proc. of the 29th Chinese Control and Decision Conference, 2017: 1484-1489.
|
6 |
PITTWOOD I H, ÇETINKAYA E K. Modeling link weights in backbone networks[C]//Proc. of the 9th International Workshop on Resilient Networks Design and Modeling, 2017.
|
7 |
LIU F , XIAO B , HAO L . Finding key node sets in complex networks based on improved discrete fireworks algorithm[J]. Journal of Systems Science and Complexity, 2021, 34 (3): 1014- 1027.
doi: 10.1007/s11424-020-9023-1
|
8 |
BRIN S , PAGE L . Reprint of: the anatomy of a large-scale hypertextual web search engine[J]. Computer Networks, 2012, 56 (18): 3825- 3833.
doi: 10.1016/j.comnet.2012.10.007
|
9 |
段威. 基于超网络理论的联合作战目标价值评估问题研究[D]. 长沙: 国防科技大学, 2018.
|
|
DUAN W. Research on target value evaluation in joint operations based on hyper-network theory[D]. Changsha: National University of Defense Technology, 2018.
|
10 |
WANG J S , WU X P , YAN B , et al. Improved method of node importance evaluation based on node contraction in complex networks[J]. Procedia Engineering, 2011, 15 (1): 1600- 1604.
|
11 |
李清韦, 刘俊先, 陈涛. 基于活动环路的作战网络节点重要度评估方法[J]. 火力与指挥控制, 2019, 44 (8): 12- 16.
|
|
LI Q W , LIU J X , CHEN T . Method for node importance evaluation in operational network based on active loop[J]. Fire Control & Command Control, 2019, 44 (8): 12- 16.
|
12 |
罗凯, 张明智, 吴曦. 基于作战环的空间信息时效网关键节点分析模型[J]. 系统工程与电子技术, 2016, 38 (7): 1572- 1576.
|
|
LUO K , ZHANG M Z , WU X . Key nodes analysis model for space information temporal network based on operation loop[J]. Systems Engineering and Electronics, 2016, 38 (7): 1572- 1576.
|
13 |
王哲, 李建华, 康东. 网络信息体系双层异质相依网络模型鲁棒性[J]. 系统工程与电子技术, 2021, 43 (4): 961- 969.
|
|
WANG Z , LI J H , KANG D . Robustness of two-layer heterogeneous interdependent network model for networked information system of system[J]. Systems Engineering and Electro-nics, 2021, 43 (4): 961- 969.
|
14 |
明春强. 基于复杂网络的装备体系重要节点识别与链路重构方法研究[D]. 重庆: 重庆邮电大学, 2020.
|
|
MING C Q. Research on key node identification and link reconstruction of equipment system based on complex network[D]. Chongqing: Chongqing University of Posts and Telecommunications, 2020.
|
15 |
CHEN W H , LI J C , JIANG J . Heterogeneous combat network link prediction based on representation learning[J]. IEEE Systems Journal, 2021, 15 (3): 4069- 4077.
doi: 10.1109/JSYST.2020.3028168
|
16 |
PAN X , WANG H X , YANG Y J , et al. Resilience based importance measure analysis for SoS[J]. Journal of Systems Engineering and Electronics, 2019, 30 (5): 920- 930.
doi: 10.21629/JSEE.2019.05.10
|
17 |
CHEN K B , LU Y J , GUO L , et al. A genetic algorithm-based methodology for analyzing the characteristics of high operational capability combat networks[J]. IEEE Access, 2022, 10, 14717- 14730.
doi: 10.1109/ACCESS.2022.3147517
|
18 |
赵丹玲, 谭跃进, 李际超, 等. 基于异质网络的武器装备体系结构抗毁性研究[J]. 系统工程理论与实践, 2019, 39 (12): 3197- 3207.
doi: 10.12011/1000-6788-2018-1302-11
|
|
ZHAO D L , TAN Y J , LI J C , et al. Research on structural robustness of weapon system-of-systems based on heterogeneous network[J]. Systems Engineering-Theory & Practice, 2019, 39 (12): 3197- 3207.
doi: 10.12011/1000-6788-2018-1302-11
|
19 |
BILTGEN P T. A methodology for capability-based technology evaluation for systems-of-systems[D]. Atlanta: Georgia Institute of Technology, 2007.
|
20 |
MARZOLF G S. Time-critical targeting: predictive versus reactionary methods, analysis for the future[D]. Alabama: Air University, 2002.
|
21 |
SMITH R M. Using kill-chain analysis to develop surface ship CONOPs to defend against anti-ship cruise missiles[D]. California: Naval Postgraduate School, 2010.
|
22 |
霍彦宇. 基于杀伤链和模糊聚类的APT攻击场景生成方法的研究与设计[D]. 北京: 北京邮电大学, 2018.
|
|
HUO Y Y. Research and design of APT attack scenario construction method based on intrusion kill chain and fuzzy cluster-ing[D]. Beijing: Beijing University of Posts and Telecommunications, 2018.
|
23 |
VILLALON H A , GISBERT H M , RIPOLL R I . SOC critical path: a defensive kill chain model[J]. IEEE Access, 2022, 10, 13570- 13581.
doi: 10.1109/ACCESS.2022.3145029
|
24 |
赵丹玲. 基于异质网络的武器装备体系贡献率评估方法研究[D]. 长沙: 国防科技大学, 2019.
|
|
ZHAO D L. Research on contribution rate of weapon and equipment system evaluation method based on heterogeneous network[D]. Changsha: National University of Defense Technology, 2019.
|
25 |
CANALE E , ROBLEDO F , ROMERO P , et al. Monte Carlo methods in diameter-constrained reliability[J]. Optical Switch-ing and Networking, 2014, 14 (2): 134- 148.
|
26 |
NGUYEN T, YANG D, GE Y R, et al. Applications of structural equivalence to subgraph isomorphism on multichannel multigraphs[C]//Proc. of the IEEE International Conference on Big Data, 2019: 4913-4920.
|
27 |
ULLMANN J R . An algorithm for subgraph isomorphism[J]. Journal of the Association for Computing Machinery, 1976, 23 (1): 31- 42.
doi: 10.1145/321921.321925
|
28 |
CORDELLA L P , FOGGIA P , SANSONE C , et al. A (sub)graph isomorphism algorithm for matching large graphs[J]. IEEE Trans.on Pattern Analysis and Machine Intelligence, 2004, 26 (10): 1367- 1372.
doi: 10.1109/TPAMI.2004.75
|
29 |
SHANG H C , ZHANG Y , LIN X M , et al. Taming verification hardness: an efficient algorithm for testing subgraph isomorphism[J]. Proceedings of the VLDB Endowment, 2008, 1 (1): 364- 375.
doi: 10.14778/1453856.1453899
|
30 |
RODRIGUES G P W , COSTA L H M , FARIAS G M , et al. A depth-first search algorithm for optimizing the gravity pipe networks layout[J]. Water Resources Management, 2019, 33 (13): 4583- 4598.
doi: 10.1007/s11269-019-02373-x
|
31 |
周琛, 宋笔锋, 尚柏林, 等. 基于作战网络可靠度的体系贡献率评估[J]. 系统工程与电子技术, 2021, 43 (7): 1875- 1883.
|
|
ZHOU C , SONG B F , SHANG B L , et al. Armament system of systems contribution evaluation based on operational network reliability[J]. Systems Engineering and Electronics, 2021, 43 (7): 1875- 1883.
|