1 |
CHEN Z W , HONG D P , CUI W W , et al. Resilience evaluation and optimal design for weapon system of systems with dynamic reconfiguration[J]. Reliability Engineering & System Safety, 2023, 237, 109409.
|
2 |
陈志伟, 焦健, 赵廷弟, 等. 武器装备体系弹性技术研究综述[J]. 系统工程与电子技术, 2023, 45 (7): 7- 15.
|
|
CHEN Z W , JIAO J , ZHAO T D , et al. A review on weapon systems of systems resilience[J]. Systems Engineering and Electronics, 2023, 45 (7): 7- 15.
|
3 |
CHEN Z W , ZHAO T D , JIAO J , et al. Performance-threshold-based resilience analysis of system of systems by considering dynamic reconfiguration[J]. Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture, 2022, 236 (14): 1828- 1838.
doi: 10.1177/0954405420937528
|
4 |
杨克巍, 赵青松, 谭跃进. 体系需求工程技术与方法[M]. 北京: 科学出版社, 2011.
|
|
YANG K W , ZHAO Q S , TAN Y J . System requirements engineering techniques and methods[M]. Beijing: Science Press, 2011.
|
5 |
李清韦, 刘俊先, 陈涛. 基于活动环路的作战网络节点重要度评估方法[J]. 火力与指挥控制, 2019, 44 (8): 12- 16.
|
|
LI Q W , LIU J X , CHEN T . Method for node importance eva-luation in operational network based on active loop[J]. Fire Control and Command Control, 2019, 44 (8): 12- 16.
|
6 |
赵青松, 杨克巍, 陈英武, 等. 体系工程与体系结构建模方法与技术[M]. 北京: 国防工业出版社, 2013.
|
|
ZHAO Q S , YANG K W , CHEN Y W , et al. System engineering and architecture modeling methods and techniques[M]. Beijing: National Defence Industry Press, 2013.
|
7 |
刘俊先, 罗爱民, 陈涛, 等. 军事架构技术[M]. 北京: 科学出版社, 2018.
|
|
LIU J X , LUO A M , CHEN T , et al. Military architecture technology[M]. Beijing: Science Press, 2018.
|
8 |
潘星, 张振宇, 张曼丽, 等. 基于SoSE的装备体系RMS论证方法研究[J]. 系统工程与电子技术, 2019, 41 (8): 1771- 1779.
|
|
PAN X , ZHANG Z Y , ZHANG M L , et al. Research on RMS demonstration method of equipment RMS based on SoSE[J]. Systems Engineering and Electronics, 2019, 41 (8): 1771- 1779.
|
9 |
龙慧. 基于复杂网络的武器装备体系风险评价方法[D]. 成都: 电子科技大学, 2022.
|
|
LONG H. Risk assessment method of weapon system-of-systems based on complex network[D]. Chengdu: University of Electronic Science and technology, 2022.
|
10 |
DUI H Y , ZHANG C , BAI G H , et al. Mission reliability modeling of UAV swarm and its structure optimization based on importance measure[J]. Reliability Engineering & System Safety, 2021, 215, 107879.
|
11 |
WANG L Z , ZHAO X J , ZHANG Y , et al. Unmanned aerial vehicle swarm mission reliability modeling and evaluation method oriented to systematic and networked mission[J]. Chinese Journal of Aeronautics, 2021, 34 (2): 466- 478.
doi: 10.1016/j.cja.2020.02.026
|
12 |
LIANG Q W , SUN T Y , WANG D D . Reliability indexes for multi-AUV cooperative systems[J]. Journal of Systems Engineering and Electronics, 2017, 28 (1): 179- 186.
doi: 10.21629/JSEE.2017.01.20
|
13 |
LI J C , TAN Y J , YANG K W , et al. Structural robustness of combat networks of weapon system-of-systems based on the operation loop[J]. International Journal of Systems Science, 2016, 48 (3): 659- 674.
|
14 |
陈志伟, 王靖, 谷长超, 等. 考虑动态重构的装备体系可用性及弹性分析[J]. 系统工程与电子技术, 2021, 43 (8): 2347- 2354.
|
|
CHEN Z W , WANG J , GU C C , et al. Performance availability and resilience analysis of weapon system of systems considering dynamic reconfiguration[J]. Systems Engineering and Electronics, 2021, 43 (8): 2347- 2354.
|
15 |
CHEN Z W , ZHOU Z M , ZHANG L G , et al. Mission reliability modeling and evaluation for reconfigurable unmanned weapon system-of-systems based on effective operation loop[J]. Journal of Systems and Engineering and Electronics, 2023, 34 (3): 588- 597.
doi: 10.23919/JSEE.2023.000082
|
16 |
SUN L N, LIU J Y, ZHAO Z M, et al. A combat capability evaluation method of UAV swarm based on kill chain[C]// Proc. of the International Conference on Autonomous Unmanned Systems, 2023: 1378-1385.
|
17 |
LI J C , ZHAO D L , JIANG J , et al. Capability oriented equipment contribution analysis in temporal combat networks[J]. IEEE Trans.on Systems, Man, and Cybernetics: Systems, 2021, 51 (2): 696- 704.
doi: 10.1109/TSMC.2018.2882782
|
18 |
HAHN A , THOMAS R K , LOZANO I , et al. A multi-layered and killchain based security analysis framework for cyber-physical systems[J]. International Journal of Critical Infrastructure Protection, 2015, 11, 39- 50.
doi: 10.1016/j.ijcip.2015.08.003
|
19 |
SINGH V K, GOVINDARASU M. Cyber kill chain-based hybrid intrusion detection system for smart grid[M]//HAES A H, ABDELAZIZ A Y, SIAND P. Wide area power system stability. protection, and security. Cham: Springer, 2021.
|
20 |
JIA N P , YOU Y Q , LU Y J , et al. Research on the search and rescue system-of-systems capability evaluation index system construction method based on weighted supernetwork[J]. IEEE Access, 2019, 7, 97401- 97425.
doi: 10.1109/ACCESS.2019.2929235
|
21 |
XU B , BAI G H , ZHANG Y A , et al. Failure analysis of unmanned autonomous swarm considering cascading effects[J]. Journal of Systems Engineering and Electronics, 2022, 33 (3): 759- 770.
doi: 10.23919/JSEE.2022.000069
|
22 |
LIU K K , ZHONG J L , BAI G H , et al. A complex networks approach for reliability evaluation of swarm systems under malicious attacks[J]. IEEE Access, 2020, 8, 81209- 81219.
doi: 10.1109/ACCESS.2020.2991211
|
23 |
LI J C , JIANG J , YANG K W , et al. Research on functional robustness of heterogeneous combat networks[J]. IEEE Systems Journal, 2019, 13 (2): 1487- 1495.
doi: 10.1109/JSYST.2018.2828779
|
24 |
SUN Q , LI H X , WANG Y Z , et al. Multi-swarm-based cooperative reconfiguration model for resilient unmanned weapon system-of-systems[J]. Reliability Engineering & System Safety, 2022, 222, 108426.
|
25 |
王耀祖, 尚柏林, 宋笔锋, 等. 基于杀伤链的作战体系网络关键节点识别方法[J]. 系统工程与电子技术, 2023, 45 (3): 736- 744.
|
|
WANG Y Z , SHANG B L , SONG B F , et al. Identification method of key node in operational system-of-systems network based on kill chain[J]. Systems Engineering and Electronics, 2023, 45 (3): 736- 744.
|
26 |
白光晗, 张驰, 兑红炎, 等. 无人机集群任务可靠性建模及重要度分析[J]. 机械工程, 2022, 58 (10): 361- 373.
|
|
BAI G H , ZHANG C , DUI H Y , et al. Mission reliability modeling and importance analysis of UAV swarm[J]. Journal of Mechanical Engineering, 2022, 58 (10): 361- 373.
|
27 |
ALBERT R , JEONG H , BARABASI A L . Error and attack tolerance of complex networks[J]. Nature, 2000, 406 (6794): 378- 382.
doi: 10.1038/35019019
|
28 |
HAO Y H , HAN J H , LIN Y , et al. Vulnerability of complex networks under three-level-tree attacks[J]. Physica A: Statistical Mechanics and Its Applications, 2016, 462, 674- 683.
doi: 10.1016/j.physa.2016.06.130
|