Open Access
Issue
JNWPU
Volume 42, Number 6, December 2024
Page(s) 1126 - 1134
DOI https://doi.org/10.1051/jnwpu/20244261126
Published online 03 February 2025
  1. CHEN G, SUN P, ZHANG J. Repair strategy of military communication network based on discrete artificial bee colony algorithm[J]. IEEE Access, 2020, 8: 73051–73060. [Article] [NASA ADS] [CrossRef] [Google Scholar]
  2. LI G J, HE G J, ZHENG M F, et al. Uncertain sensor-weapon-target allocation problem based on uncertainty theory[J]. Symmetry, 2023, 15(1): 176. [Article] [CrossRef] [Google Scholar]
  3. GAO X, LI K Q, CHEN B. Invulnerability measure of a military heterogeneous network based on network structure entropy[J]. IEEE Access, 2017, 6: 6700–6708 [Article] [CrossRef] [Google Scholar]
  4. SONG X, SHI W, TAN G, et al. Multi-level tolerance opinion dynamics in military command and control networks[J]. Physica A Statistical Mechanics and Its Applications, 2015, 437(1): 322–332 [CrossRef] [Google Scholar]
  5. SU Zhen, GAO Chao, LI Xianghua. Analysis of the effect of node centrality on diffusion mode in complex networks[J]. Acta Physica Sinica, 2017, 66(12): 12 (in Chinese) [Google Scholar]
  6. YU M, SHANG W P, CHEN Z G. Exponential synchronization for second-order nodes in complex dynamical network with communication time delays and switching topologies[J]. Journal of Control Science & Engineering, 2017, 2017(1): 1–10 [Google Scholar]
  7. CHEN Jing, TIAN Xiaojie, ZENG Xingshan, et al. Military communication modeling and critical node evaluation based on complex network[J]. Command Control & Simulation, 2021, 43(5): 55–59 (in Chinese) [Google Scholar]
  8. SUN Yu, YAO Peiyang, SHEN Jian, et al. Military communication network design for invulnerability optimization based on information flow[J]. Journal of Huazhong University of Science and Technology, 2016, 44(12): 114–120 (in Chinese) [Google Scholar]
  9. CHEN Guanyu, SUN Peng, ZHANG Jieyong, et al. Repair strategy of military communication network[J]. Journal of Zhejiang University, 2019, 53(8): 1536–1545 (in Chinese) [Google Scholar]
  10. YANG Zhicai, QIU Hangping, QUAN Jichuan, et al. Reliability analysis of military communication network based on network flow path model[J]. Computer Engineering, 2015, 41(5): 125–129 (in Chinese) [Google Scholar]
  11. WANG Zhiyuan, DING Zezhong, HU Guangshui, et al. Invulnerability simulation of military communication networks topology[J]. Computer Systems & Applications, 2010, 19(12): 109–113 (in Chinese) [Google Scholar]
  12. YANG Zhirou, ZHANG Hu, LIU Jing, et al. Optimization algorithm of military communication network structure under node attack strategy[J]. Systems Engineering and Electronics, 2021, 43(7): 1848–1855 (in Chinese) [Google Scholar]
  13. LIU Tonglin, YANG Zhirou, ZHANG Hu, et al. Modeling and performance analysis of military communication network based on complex network[J]. Systems Engineering and Electronics, 2020, 42(12): 2892–2898 (in Chinese) [Google Scholar]
  14. ADILI Hailili, WUSIMAN Yushan. Node fault location method of wireless communication network based on cuckoo search algorithm[J]. Yangtze River Information and Communication, 2023, 36(9): 183–185 (in Chinese) [Google Scholar]
  15. LI Peng, WANG Shilin, CEHN Guangwu, et al. Key node mining in complex network based on improved local structural entropy[J]. Journal of Computer Applications, 2023, 43(4): 1109–1114 (in Chinese) [Google Scholar]
  16. SUN Lina, CHEN Yonglu, CHEN Zhiwei. Invulnerability analysis of dynamic reconfiguration combat network based on kill chain[J]. Fire Control & Command Control, 2023, 48(2): 12–18 (in Chinese) [Google Scholar]
  17. CHEN Xiaonan, HU Jianmin, CHI Benliang, et al. Game and reconfiguration method of complex combat network system[J]. Acta Armamentarii, 2021, 42(5): 1111–1120 (in Chinese) [Google Scholar]
  18. ZHENG Changjiang, TAO Tongtong, CHEN Zhichao. Cascading failure model based on flow adjustable redistribution[J].Journal of Jilin University, 2023, 6: 1–9 (in Chinese) [Google Scholar]
  19. KONG Zhi, YUAN Hang, WANG Lifu, et al. Node classification and the influence of node failure on network controllability[J]. Acta Automatica Sinica, 2022, 48(4): 1048–1059 (in Chinese) [Google Scholar]
  20. MOON T, KRUZINS E, CALBERT G. Analyzing the OODA cycle[J]. Phalanx, 2002, 35(2): 9–35 [Google Scholar]
  21. MOTTER A E, LAI Y C. Cascade-based attacks on complex networks[J]. Physical Review E, 2002, 66(6): 065102. [Article] [NASA ADS] [CrossRef] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.