[1] |
SHIREY R, NATARIAN B, LUU J, et al. Blue Guardian Open Adaptable Architecture for C4ISR[C]// Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2018.Bellingham:SPIE, 2018:1-9.
|
[2] |
牟能冶, 康秋萍. 基于节点重要度网络结构熵的城市快递网络抗毁性测度[J]. 综合运输, 2020, 42(3):108-113.
|
|
MU Nengye, KANG Qiuping. Invulnerability Measurement of Urban Express Network Based on Node Importance Network Structure Entropy[J]. China Transportation Review, 2020, 42(3):108-113.
|
[3] |
ALBERT R, JEONG H, BARABASI A L. Error and Attack Tolerance of Complex Networks[J]. Nature, 2000, 406:378-382.
doi: 10.1038/35019019
|
[4] |
DELLER S, TOLK A, RABADI G, et al. Improving C2 Effectiveness Based on Robust Connectivity[J]. Military Operations Research Journal, 2012, 17(1):5-16.
|
[5] |
CARES J R. An Information Age Combat Model[C]// 9th International Command and Control Research and Technology Symposium Southampton (ICCRTS).Washington:ICCRTS, 2004:166-167.
|
[6] |
田旭光, 朱元昌, 邸彦强. 指挥控制系统网络动态抗毁性[J]. 火力与指挥控制, 2012, 37(6):88-91.
|
|
TIAN Xuguang, ZHU Yuanchang, DI Yanqiang. Study on Dynamic Invulnerability of Command and Control Netwok[J]. Fire Control & Command Control, 2012, 37(6):88-91.
|
[7] |
吴俊, 谭索怡, 谭跃进, 等. 基于自然连通度的复杂网络抗毁性分析[J]. 复杂系统与复杂性科学, 2014, 11(1):77-86.
|
|
WU Jun, TAN Suoyi, TAN Yuejin, et al. Analysis of Invulnerability in Complex Networks Based on Natural Connectivity[J]. Complex Systems and Complex Science, 2014, 11(1):77-86.
|
[8] |
冯树民, 麻海洲, 吕天玲, 等. 考虑攻击程度的城市轨道交通网络抗毁性分析[J]. 武汉理工大学学报:交通科学与工程版, 2019, 43(3):379-384.
|
|
FENG Shumin, MA Haizhou, LYU Tianling, et al. Analysis on the Invulnerability of Urban Rail Transit Network Considering the Degree of Attack[J]. Journal of Wuhan University of Technology:Transportation Science & Engineering, 2019, 43(3):379-384.
|
[9] |
LIU C X, XIONG W, ZHANG Y, et al. Research on Invulnerability Technology of Node Attack in Space-Based Information Network Based on Complex Network[J]. Electronics, 2019, 8(5):507.
doi: 10.3390/electronics8050507
|
[10] |
张明智, 彭军. 网络信息体系抗毁性研究[J]. 计算机仿真, 2017, 34(8):1-5.
|
|
ZHANG Mingzhi, PENG Jun. Research on Invulnerability of Network Information Systems of System[J]. Computer Simulation, 2017, 34(8):1-5.
|
[11] |
BOYD J R. A Discourse on Winning and Losing[M]. Alabama: USA Air University Press, 2018:383.
|
[12] |
GHERMAN L. Defence Architecture Based on Information Age OODA Loop[J]. Review of the Air Force Academy, 2017, 35(3):111-118.
|
[13] |
WANG Y M, CHEN S, PAN C S, et al. Measure of Invulnerability for Command and Control Network Based on Mission Link[J]. Information Sciences, 2018, 426(2):148-159.
doi: 10.1016/j.ins.2017.10.035
|
[14] |
GAO X, LI K Q, CHEN B. Invulnerability Measure of a Military Heterogeneous Network Based on Network Structure Entropy[J]. IEEE ACCESS, 2018, 6(3):6700-6708.
doi: 10.1109/ACCESS.2017.2769964
|
[15] |
张多平. 基于累积K-shell的指挥控制网络级联抗毁性研究[D]. 大连: 大连大学, 2018.
|
[16] |
郝羽成, 李成兵, 魏磊. 考虑节点过载的复杂网络级联失效模型[J]. 系统工程与电子技术, 2018, 40(10):2282-2287.
|
|
HAO Yucheng, LI Chengbing, WEI Lei. Cascading Failure Model of Complex Networks Considering Overloaded Nodes[J]. Systems Engineering and Electronics, 2018, 40(10):2282-2287.
|
[17] |
慕彩红, 柴文壹, 刘逸, 等. 一种改进的网络鲁棒性与有效性增强方法[J]. 西安电子科技大学学报, 2018, 45(4):6-11.
|
|
MU Caihong, CHAI Wenyi, LIU Yi, et al. Improved Approach to Enhancingthe Robustness and Effectiveness of Networks[J]. Journal of Xidian University, 2018, 45(4):6-11.
|
[18] |
WILENSKY U. (NetLogo 2020)[EB/OL].[2020-08-03].http://ccl.northwestern.edu/netlogo.
|
[19] |
GIT H. The NetLogo NW Extension for Network Analysis(2019)[EB/OL].[2019-12-02]. https://github.com/NetLogo/NW-Extension.
|
[20] |
MOHAMMAD E, ALI E, HOMAYUN M. Dijkstra Algorithm for Shortest Path Problem under Interval-Valued Pythagorean Fuzzy Environment[J]. Complex & Intelligent Systems, 2019, 5 (2):93-100.
|
[21] |
SHANNON C E. A Mathematical Theory of Communication[J]. Bell Systems Technical Jourhal, 1948, 27(4):623-656.
|
[22] |
孙玺菁, 司守奎. 复杂网络算法与应用[M]. 北京: 国防工业出版社, 2015.
|
[23] |
翟峰, 冯云, 程凯, 等. 基于信息熵的多源电力物联终端设备信任度评价方法[J]. 中国电力, 2022, 55(5):158-165.
|
|
ZHAI Feng, FENG Yun, CHENG Kai, et al. Information Entropy-Based Multi-Source Power IoT Terminal Equipment Trust Degree Evaluation Method[J]. Electric Power, 2022, 55(5):158-165.
|
[24] |
YANG G Z, QI X G, LIU L F. Research on Network Robustness Based on Different Deliberate Attack Methods[J]. Physica A:Statistical Mechanics and its Applications, 2020, 545:123588.
doi: 10.1016/j.physa.2019.123588
|
[25] |
GUO L, MAN R X, WU Y X, et al. Anti-Injury Function of Complex Spiking Neural Networks Under Random Attack and Its Mechanism Analysis[J]. IEEE ACCESS, 2020, 8:153057-153066.
doi: 10.1109/ACCESS.2020.3017746
|