2016 2nd International Conference on Control Science and Systems Engineering (ICCSSE) 2016
DOI: 10.1109/ccsse.2016.7784363
|View full text |Cite
|
Sign up to set email alerts
|

Measure of invulnerability for command and control network based on network invulnerability entropy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…However, there are still some deficiencies. First, with the change of the operational concept, the information flow model proposed by the existing research cannot be well applied to the future information warfare battlefield [8][9]; Second, the existing research on the performance analysis of information flow patterns mostly focuses on the topological structure characteristics of complex networks, and does not establish a method for analyzing the overall performance of information flow [10][11][12] [13].Therefore, based on the analysis of the requirements and characteristics of information warfare, this paper uses the complex network theory to construct the battlefield information flow model, and constructs the characteristic efficiency factor to evaluate the overall performance of the information flow network. The experiment verifies the rationality of the constructed information flow model and the optimization of the overall performance.…”
Section: Introductionmentioning
confidence: 99%
“…However, there are still some deficiencies. First, with the change of the operational concept, the information flow model proposed by the existing research cannot be well applied to the future information warfare battlefield [8][9]; Second, the existing research on the performance analysis of information flow patterns mostly focuses on the topological structure characteristics of complex networks, and does not establish a method for analyzing the overall performance of information flow [10][11][12] [13].Therefore, based on the analysis of the requirements and characteristics of information warfare, this paper uses the complex network theory to construct the battlefield information flow model, and constructs the characteristic efficiency factor to evaluate the overall performance of the information flow network. The experiment verifies the rationality of the constructed information flow model and the optimization of the overall performance.…”
Section: Introductionmentioning
confidence: 99%
“…[27] established a topology model of sensor network and used artificial immune algorithm to solve the model; Wang Y.M. [28] used complex networks theory to address the structural characteristics of the accusation control network, focusing on the network destruction resistance measure based on the efficiency of the accusation link. However, the above studies mostly focus on the topology of network, and there are fewer studies related to the optimization of network robustness and vulnerability, especially for C2.…”
Section: Introductionmentioning
confidence: 99%