1 |
GAO J R, LIAO Y Y, GAO J The connotation of information warfare. Electronic Information Warfare Technology, 2020, 35 (3): 50- 53.
|
2 |
LONG J, LIU D S Overview of information superiority measurement methods. Journal of Ordance Equipment Engineering, 2018, 39 (10): 168- 172.
|
3 |
LI L L, LU Y F, ZHUANG Z, et al Construction and modeling of indicator system of accusation system based on information superiority. Systems Engineering and Electronics, 2018, 40 (3): 577- 582.
|
4 |
ZIBETTI G R, WICKBOLDT J A, FREITAS E P D Context-aware environment monitoring to support LPWAN-based battlefield applications. Computer Communications, 2022, 189, 18- 27.
|
5 |
ALBERT D, GARSTKA J. The basic principles and measurement of network centric operations. LANCO research center. Trans. Beijing: National Defense Industry Press, 2007. (in Chinese)
|
6 |
SOPILKO I, SVINTSYTSKYI A, KRASOVSKA Y, et al Information wars as a threat to the information security of Ukraine. Conflict Resolution Quarterly, 2021, 39 (3): 333- 347.
|
7 |
ZHANG J G Mobilization of the technique and information resources in the information war. Journal of Academy of Equipment, 2012, 23 (2): 22- 27.
|
8 |
LIANG S, SHI H, LI Z D, et al Generalized Lanchester war model for information warfare. Mathematics in Practice and Theory, 2017, 47 (9): 291- 296.
|
9 |
WAGENHALS L W, SHIN I, KIM D, et al C4ISR architectures: II. A structured analysis approach for architecture design. Systems Engineering, 2000, 3 (4): 248- 287.
|
10 |
LI X M, LI Z F, DAI J J, et al Research on architecture of networked targeting system based on C4KISR. Electronics Optics & Control, 2012, 19 (1): 1- 4, 37.
|
11 |
ZHANG J G. Information entropy-theory and application. Beijing: China Water Resources and Hydropower Press, 2021. (in Chinese)
|
12 |
CIFTCIOGLU E N, YENER A, GOVINDAN R, et al. Operational information content sum capacity: from formulation and examples. Proc. of the 14th International Conference on Information Fusion, 2011: 5−8.
|
13 |
BAR-NOY A, CIRINCIONE G, GOVINDAN R, et al. Quality-of-information aware networking for tactical military networks. Proc. of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2011: 2−7.
|
14 |
CANSEVER D. Value of information. Proc. of the IEEE Military Communications Conference, 2013: 1105−1108.
|
15 |
KONG R Y, SHEN Y L, XIAO T S, et al Research on battlefield information value measurement model based on information entropy. Journal of China Institute of Electronic Science, 2019, 2, 139- 145.
|
16 |
HE Y, NIU R X, TONG L Z Value analysis and application of decision information based on transfer entropy. Value Engineering, 2013, 15, 159- 160.
|
17 |
LIU W G, ZHANG G A, WANG W, et al. Research on digital operational command. Beijing: PLA Press, 2012. (in Chinese)
|
18 |
JIA G H, ZHOU J, LI J Y Reliability evaluation of command information system under different attack modes. IOP Conference Series: Materials Science and Engineering, 2021, 1043 (3): 032051.
|
19 |
EDWARD W. Information warfare: principles and operations. Norwood: Artech House, 1998.
|
20 |
HU X F. War engineering theory-war methodology towards the information age. Beijing: Science Press, 2017. (in Chinese)
|
21 |
TIMOTHY L T. Kosovo and the current myth of information superiority. Parameters, 2020, 30(1): 13−29.
|
22 |
HYUN S Y, LEE D H, LEE G, et al. A study on the information superiority of network centric warfare of future battlefield. Proc. of the International Conference on information Science and Security, 2008: 224−231.
|
23 |
ZHANG Y, XIAO Q L, DENG X Y, et al A multi-source information fusion method for ship target recognition based on Bayesian inference and evidence theory. Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 2022, 42 (3): 2331- 2346.
|
24 |
LI Y F, HUANG H Z, ZHANG T Y Reliability analysis of C4ISR systems based on goal-oriented methodology. Applied Sciences, 2021, 11 (14): 6335.
doi: 10.3390/app11146335
|
25 |
ARIFIN H, IWAN N, LAILATUL Q, et al. Evaluating the interoperability of C4ISR system using cyber six-ware framework. Proc. of the International Conference on Advanced Computer Science and Information Systems, 2021: 1−7.
|
26 |
JIAO Z Q, ZHANG J Y, YAO P Y, et al C4ISR service deployment based on an improved quantum evolutionary algorithm. IEEE Trans. on Network and Service Management, 2021, 18 (2): 2405- 2419.
doi: 10.1109/TNSM.2021.3054752
|
27 |
LAN Y S, YI K, WANG H, et al Delay assessment method for networked C4ISR system architecture. Systems Engineering and Electronics, 2013, 35 (9): 1908- 1914.
|
28 |
DONG Q C, WANG Z X, CHEN G Y, et al Domain-specific modeling and verification for C4ISR capability requirements. Journal of Central South University of Technology, 2012, 19 (5): 1334- 1340.
|
29 |
LAN Y S, DENG K B, MAO S J, et al Adaptive evolvement of information age C4ISR structure. Journal of Systems Engineering and Electronics, 2015, 26 (2): 301- 316.
|