588
Views
34
CrossRef citations to date
0
Altmetric
Original Articles

Structural robustness of combat networks of weapon system-of-systems based on the operation loop

, , , &
Pages 659-674 | Received 27 Jan 2015, Accepted 27 Jun 2016, Published online: 26 Jul 2016

References

  • Bellingeria, M., Cassi, D., & Vincenzi, S. (2014). Efficiency of attack strategies on complex model and real-world networks. Physica A: Statistical Mechanics and its Applications, 414(15), 174–180.
  • Cares, J.R. (2004). An information age combat model. Newport: Alidade.
  • Dekker, A. (2006). Measuring the agility of networked military forces. Journal of Battlefeild Technology, 9(1), 19–24.
  • Deller, S., Rabadi, G., Tolk, A., & Bowling, S. (2012). Organizing for improved effectiveness in networked operations. Military Operations Research, 17(1), 5–16.
  • Di, P., Hu, T., Hu, B., & Zheng, J. (2011). Research on invulnerability of combat net model based on complex networks. Journal of System Simulation, 23(1), 56–60.
  • Estrada, E., Hatanoe, N., & Benzi, M. (2012). The physics of communicability in complex networks. Physics Reports, 514(3), 89–119.
  • Fiedler, M. (1973). Algebra connectivity of graphs. Czechoslovak Mathematical Journal, 23(1), 298–305.
  • Ge, B., Hipel, K.W., Yang, K., & Chen, Y. (2013). A data-centric capability-focused approach for system-of-systems architecture modeling and analysis. Systems Engineering, 16(3), 363–377.
  • Herrmann, H., Schneider, C., Moreira, A., Andrade, J., & Havlin, S. (2011). Onion-like network topology enhances robustness against malicious attacks. Journal of Statistical Mechanics: Theory and Experiment, 2011(1), 1–9.
  • Iyer, S., Killingback, T., Sundaram, B., & Wang, Z. (2013). Attack robustness and centrality of complex networks. PLoS One, 8(4), 1–17.
  • Jin, W., & Xiao, T. (2012). Research on the vulneralbility of the SoS network with spectral analysis of its laplacian matrix eigenvalues. System Simulation Technology & Application, 14(1), 11–15.
  • Jin, X., & Yang, G. (2011). Distributed robust adaptive control for a class of dynamics complex networks against imperfect communications. International Journal of Systems Science, 42(3), 457–468.
  • Liu, Y.D., Dai, H.D., & Xiao, Q. (2015). Invulnerability evaluation of equipment support force system based on complex networks. Journal of Military Transportation University, 17(7), 36–48.
  • Peng, W., Li, Z., Su, J., & Dong, M. (2011). Evaluation of topological vulnerability of the internet under regional failures. Lecture Notes in Computer Science, 6908(1), 164–175.
  • Peng, G.S., & Wu, J. (2015). Optimal network topology for structural robustness based on natural connectivity. Physical A: Statistical Mechanics and its Applications, 443(C), 212–220.
  • Qi, Y., Liu, Z., & Chen, H. (2013). Distributed combat system of systems network modeling. Journal of Networks, 8(1), 1906–1912.
  • Qi, Y., Liu, Z., & Xu, J. (2013). Combat system of systems network modeling and networked effects analysis. Fire Control & Command Control, 38(5), 66–69.
  • Randles, M., Lamb, D., Odat, E., & Taleb-Bendiab, A. (2011). Distributed redundancy and robustness in complex systems. Journal of Computer and System Sciences, 77(2), 293–304.
  • Shang, Y. (2012). Biased edge failure in scale-free networks based on natural connectivity. Indian Journal of Physics, 86(6), 485–488.
  • Tang, H., Zhang, K., Yu, N., & Mao, X. (2013). Research on invunnerability measure of directed and weighted complex network. Computer Engineering, 39(1), 23–28.
  • Wang, B., Ma, R., & Wang, G. (2015). Research on invulnerability of complex networks based on natural connectivity. Computer Simulation, 8(1), 315–318.
  • Wang, C., Wu, X., & Luo, X.J. (2015). Method for invulnerability evaluation of WSNs based on between centrality. Transducer and Microsystem Technologies, 35(5), 19–25.
  • Wu, J., Barahona, M., Tan, Y.J., & Deng, H.Z. (2010). Natural connectivity of complex networks. Chinese Physics Letters, 27(7), 78902–78905.
  • Wu, J., Barahona, M., Tan, Y.J., & Deng, H.Z. (2011a). Robustness of regular ring lattices based on natural connectivity. International Journal of Systems Science, 42(1), 1085–1092.
  • Wu, J., Barahona, M., Tan, Y.J., & Deng, H.Z. (2011b). Spectral measure of robustness in complex networks. IEEE Transactions on Systems, Man, and Cybernetics A, 41(6), 1244–1252.
  • Wu, J., Deng, H.Z., Tan, Y.J., & Zhu, D.Z. (2007). Vulnerability of complex networks under intentional attack with incomplete information. Journal of Physics A: Mathematical and Theoretical, 40(11), 2665–2671.
  • Wu, J., Tan, S., Tan, Y., & Deng, H. (2014). Analysis of invulnerability in complex networks based on natural connectivity. Complex Systems and Complex Science, 11(1), 77–87.
  • Xue, S., & Yang, Q. (2013). Operational ability evaluation model of the armored weapon system of system. In 2013 25th Chinese Control and Decision Conference (pp. 2161–2163). Guiyang, China: IEEE.
  • Yang, Z., Shibuya, Y., & Qin, P. (2013). Distributed robust control for synchronised tracking of networked euler-lagrange systems. International Journal of Systems Science, 46(4), 720–732.
  • Zhang, M.Z., Ma, L., & Ji, M. (2015). Networked system-of-systems combat OODA command circulation time measuring modeling and experiment. Journal of Command and Control, 1(1), 50–55.
  • Zhao, Q.S., Li, S.F., & Dou, Y.J. ( 2015). An Approach for weapon system of systems scheme generation based on a supernetwork granular analysis. IEEE Systems Journal, PP(99), 1–12.
  • Zhu, G., Tan, X., Wang, H., & Bi, H. (2014). SD model of information, human and weapons relationship in the system of systems combat. Journal of Equipment Academy, 25(1), 133–137.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.