[1] Alberts D S, Garstka J J, Stein F P. Network centric warfare: developing and leveraging information superiority[M]. Washingtong DC: Command and Control Research Program Publication Series, 1999. [2] Alberts D S. The agility advantage: a survival guide for complex enterprises and endeavors[M].Washingtong DC:Command and Control Research Program Publication Series, 2011. [3] David A G, Swati D A, Michael J S.Widely distributed C4ISR[C]∥Defense Transformation and Net-Centric System. Orland, Florida, US: SPIE, 2007. [4] Jefferey R C.Distributed networked operations-the foundation of network centric warfare[M]. Newport:Alidade Press, 2005. [5] 孙屹. OPNET通信仿真开发手册[M]. 北京: 国防工业出版社, 2005. SUN Yi. OPNET communication simulation development manual[M]. Beijing: National Defense Industry Press, 2005.(in Chinese) [6] Lindy E, Dimarogonas J, McConnell J, et al. Representing operational architectures into a modeling and environment for analyzing communications architectures[C]∥Military Communication Conference. Monterey CA: IEEE, 2004: 1456-1462. [7] 王智源, 丁泽中, 胡广水. 军事通信网络拓扑结构抗毁性仿真[J]. 计算机系统应用, 2010, 19(20): 109-113. WANG Zhi-yuan, DING Ze-zhong, HU Guang-shui. Invulnerability simulation of military communication networks topology[J]. Computer Systems Applications, 2010, 19(20): 109-113.(in Chinese) [8] Li B Q, Si S K, Li B, et al. A method to generate C4ISR architecture framework and cascading failure of constructed network[C]∥2nd International Conference on Artificial Intelligence, Management Science and Electronic. Zhenzhou, China: IEEE, 2011: 34-37. [9] 张斌, 胡晓峰, 姜忠钦. 战场通信网络环境仿真研究[J]. 系统仿真学报, 2011, 23(1): 217-221. ZHANG Bin, HU Xiao-feng, JIANG Zhong-qin. Study of battlefield communication networks environment simulation[J]. Journal of System Simulation, 2011, 23(1): 217-221. (in Chinese) [10] Dekker A H. C4ISR architectures, applying social network analysis concepts to military C4ISR architectures[J]. Connections, 2001, 24(3): 93-103. [11] Dekker A H. Applying social network analysis concepts to military C4ISR architectures[J]. Connections, 2002, 24(3): 93-103. [12] 路建伟, 姚增建, 王濛. 基于无标度网络的防空反导系统构建[J]. 指挥控制与仿真, 2013, 35(3): 10-13. LU Jian-wei, YAO Zeng-jian, WANG Meng. Construction for air defense anti-missile based on scale-free networks[J]. Command Control & Simulation, 2013, 35(3): 10-13.(in Chinese) [13] 孙家平. 网络化防空系统研究[J]. 现代雷达, 2013, 35(5): 14-17. SUN Jia-ping. A study on networked air defense system[J]. Modern Radar, 2013, 35(5): 14-17. (in Chinese) [14] 班克斯 J.离散事件系统仿真[M].肖田元,范文慧,译.北京:机械工业出版社,2007. Banks J. Discrete event system simulation[M]. XIAO Tian-yuan, FAN Wen-hui, translated. Beijing: China Machine Press, 2007. (in Chinese) [15] 丁鹭飞,陈建春. 雷达原理[M].北京:电子工业出版社,2009. DING Lu-fei, CHEN Jian-chun. Radar theory[M]. Bejing: Publishing House of Electronics Industry, 2009. (in Chinese) |