[1] ZHU S.Shute from the Israeli air strikes in Syria[J].International Electronic Warfare,2010(7):18-21.
[2] DELLER S,BOWIING S R,RABADI G A,et al.Applying the information age combat model:quantitative analysis of network centric operations[J].The International C2 Journal,2009(1):24-26.
[3] QI J Q,WANG C Y,ZHOU X Z.Network countermeasure effectiveness evaluation model based on maximum flow theory and its application[J].Military Operations in System Engineering,2009,23(2):48-50.
[4] ZHU T,CHANG G C,SHI X A.Research on topology model of command information system based on complex network[J].Journal of System Simulation,2008,20(6):1574-1576,1581.
[5] WANG Y J,JIANG L,XIAN M,et al.Research of online evaluation model and algorithm for network attack effect[J].Computer Science,2007,34(5):72-74.
[6] ALBERTS D S,JAMES M.Network centric warfare and complexity theory[J].Translated by YU J,BEN K G.Beijing:Publishing House of Electronics Industry,2004.
[7] YANG R,WANG B H,REN J,et al.Epidemic spreading on heterogeneous networks with identical infectivity[J].Physics Letters A:Statistical Mechanics and its Applications,2007,364(3):189-193.
[8] ASHA J,NEWTH D.Optimizing complex networks for resilience against cascading failure[J].Physica A:Statistical Mechanics and Its Applications,2007,380:673-683.
[9] LIU J,WANG Y J,ZHANG Y R.Application of analytic hierarchy process to network attack effect evaluation[J].Computer Application Research,2004,21(3):113-115.