[1] 刘炜伦, 张衡阳, 郑博, 等.支持混合业务传输的蜂群无人机自组网多路访问控制协议[J].兵工学报, 2019, 40(4): 820-828. LIU W L,ZHANG H Y,ZHENG B,et al. A novel media access control protocol for multiple priority services in FANETs[J].Acta Armamentarii, 2019, 40(4): 820-828.(in Chinese) [2] 张双雄, 李晶晶, 尹帅, 等.无人机蜂群作战分析[J].现代信息科技,2020, 4(12): 22-24. ZHANG S X,LI J J,YIN S,et al. Analysis of drone swarm combat[J].Modern Information Technology,2020,4(12): 22-24.(in Chinese) [3] 姜俊新.无人机蜂群对防空作战的威胁与对策[J].国防科技, 2019, 40(6): 108-113. JIANG J X.Threats and countermeatures of unmanned aerial vehicle swarm to aerial defense[J].National Defense Technology, 2019, 40(6): 108-113.(in Chinese) [4] 武梅丽文, 王蒙一, 王晓东, 等.面向集群攻防作战的等效验证与训练评估[J].指挥与控制学报, 2020, 6(3): 192-197. WUM L W,WANG M Y,WANG X D,et al.Equivalent verification and training evaluation for the cluster attack and defense combat[J]. Journal of Command and Control, 2020, 6(3): 192-197.(in Chinese) [5] 刘丽, 王森, 胡然.美军主要无人机集群项目发展浅析[J].飞航导弹, 2018(7): 37-43. LIU L,WANG S,HU R. Analysis on the development of the main UAV swarm projects of the US military[J]. Aerospace Technology, 2018(7): 37-43. (in Chinese) [6] 顾海燕.美军无人机集群作战的发展启示[J].电讯技术, 2018, 58(7): 865-870. GU H Y.Development Inspirations of US multiple-UAV cooperative engagement[J].Telecommunication Engineering,2018, 58(7): 865-870. (in Chinese) [7] 李鹏举, 毛鹏军, 耿乾, 等.无人机集群技术研究现状与趋势[J].航空兵器, 2020, 27(4): 25-32. LI P J,MAO P J,GENG Q,et al.Research status and trend of UAV swarm technology[J].Aero Weaponry, 2020, 27(4): 25-32. (in Chinese) [8] 刘献伟, 陈虎林, 李飞, 等.一网打尽-无人集群时代的新攻防[J].航空兵器, 2019, 26(1):70-75. LIU X W,CHEN H L,LI F,et al.Catch all in nets: new attack and defense in the age of unmanned cluster[J].Aero Weaponry, 2019, 26(1):70-75. (in Chinese) [9] PHAM L,DICKERSON B, SANDERS J.UVA Swarm attack: protection systems alternatives for destroyers[D].Monterey,CA,US:Naval Postgraduate School, 2012. [10] 李兵, 廖志远, 滕传福, 等.小型有人/无人协同特混编队对舰攻击策略研究[J].无人系统技术,2020, 3(4):58-65. LI B,LIAO Z Y,TENG C F,et al.Research on the attack strategy of small manned/unmanned coordinated special mixed formations on ships[J].Unmanned Systems Technology, 2020, 3(4):58-65. (in Chinese) [11] 焦士俊, 刘锐, 刘剑豪,等.无人机蜂群威胁效能评估[J]. 舰船电子对抗, 2019, 42(3): 17-20,76. JIAO S J,LIU R,LIU J H,et al.Threat effectiveness evaluation of UAV swarm[J].Shipboard Electronic Countermeasure, 2019, 42(3): 17-20,76. (in Chinese) [12] 黄勇, 王越, 李元锋.无人机蜂群对海作战威胁分析[J]. 指挥控制与仿真, 2019, 41 (6): 1-6. HUANG Y,WANG Y,LI Y F.Threat analysis of UAV swarm concerning naval attack[J].Command Control & Simulation,2019, 41(6): 1-6. (in Chinese) [13] XU Y J, WANG Y G, MIU X D. Multi-attribute decision making method for air target threat evaluation based on intuitionistic fuzzy sets[J]. Journal of Systems Engineering and Electronics, 2012, 23(6):891-897. [14] ZHANG K, PIAO H Y, KONG W R, et al.The improved VIKOR method based on dynamic parameters optimization in multi-target threat assessment[C]∥Proceedings of the 17th AIAA Aviation Technology, Integration, and Operations Conference.Denver, CO,US:AIAA,2017:1-8. [15] 袁宇,关涛,闫相斌,等.基于混合VIKOR方法的供应商选择决策模型[J].控制与决策, 2014,29(3): 551-558. YUAN Y, GUAN T, YAN X B, et al.Baesd on hybrid VIKORmethod decision making model for supplier selection[J].Control and Decision,2014,29(3): 551-558.(in Chinese) [16] BENAVOLI A, RISTIC B, FARINA A, et al. An application of evidential networks to threat assessment[J]. IEEE Transactions on Aerospace and Electronic Systems, 2009, 45(2):620-639. [17] 雷英杰, 王宝树,路艳丽.基于自适应直觉模糊推理的威胁评估方法[J].电子与信息学报, 2007, 29(12): 2805-2809. LEI Y J,WANG B S,LU Y L.Techniques for threat assessment based on adaptive intuitionistic fuzzy reasoning[J].Journal of Electronics & Information Technology, 2007, 29(12): 2805-2809. (in Chinese) [18] 范翔宇,王红卫,索中英,等.基于粗糙集-信息熵的辐射源威胁评估方法[J].北京航空航天大学学报, 2016, 42(8): 1755-1761. FAN X Y,WANG H W,SUO Z Y,et al.Radiator threat evaluating method based on rough set and information entropy[J].Journal of Beijing University of Aeronautics and Astronautics,2016, 42(8):1755-1761.(in Chinese) [19] KUMAR S, TRIPATHI B K.Modelling of threat evaluation for dynamic targets using Bayesian network approach[J]. Procedia Technology, 2016, 24:1268-1275. [20] AFSHAN N, SYED T H S, SHOAB A K, et al.Decision support system for optimum decision making process in threat evaluation and weapon assignment:current status, challenges and future directions[J].Annual Reviews in Control, 2017, 43(4): 169-187. [21] 代进进, 李相民. 舰艇编队网络化防空作战空袭目标威胁评估[J]. 系统工程与电子技术, 2013, 35(3): 532-538. DAI J J,LI X M.Threat evaluation of air strike targets for warship formation networked air-defense operation[J]. Systems Engineering and Electronics,2013,35(3): 532-538.(in Chinese) [22] 徐浩, 邢清华, 王伟, 等.基于改进结构熵权法的目标威胁灰色综合评估[J].信息工程大学学报, 2016, 17(5): 620-625. XU H,XIBNG Q H,WANG W,et al.Threat assessment based on improved structure entropy and gray theory[J]. Journal of Information Engineering University, 2016, 17(5): 620-625.(in Chinese) [23] TING K.A modified TOPSIS with a different ranking index[J].European Journal of Operational Research, 2017, 260(1): 152-160. [24] ZYOUD S H,FUCHS-HANUSCH D.A bibliometric-based survey on AHP and TOPSIS techniques[J]. Expert Systems with Applications, 2017, 78: 158-181.
|