1 |
曲长文, 何友, 马强. 应用多属性决策的威胁评估方法[J]. 系统工程与电子技术, 2000, 22(5): 26-29.
|
|
Qu Changwen, He You, Ma Qiang. Threat Assessment Using Multiple Attribute Decision Making[J]. Systems Engineering and Electronics, 2000, 22(5): 26-29.
|
2 |
董彦非, 郭基联, 张恒喜. 多机空战目标威胁评估算法[J]. 火力与指挥控制, 2002, 27(4): 73-76.
|
|
Dong Yanfei, Guo Jilian, Zhang Hengxi. Threat Assessment for Multi-aircraft-air Combat[J]. Fire Control & Command Control, 2002, 27(4): 73-76.
|
3 |
杨妹. 面向高层辅助决策支持的军事分析仿真系统关键技术研究[D]. 长沙: 国防科学技术大学, 2014.
|
|
Yang Mei. Research on Key Technologies of Military Analytic Simulation for High Level Decision-making[D]. Changsha: National University of Defense Technology, 2014.
|
4 |
黄炎焱, 雷震, 薄煜明. 基于概率本体和多实体贝叶斯网络的目标威胁评估[C]//第八届中国指挥控制大会论文集. 北京: 中国指挥与控制学会, 2020: 656-661.
|
5 |
陆遥, 李东生. 基于威胁概率图的无人机作战场景模型设计[J]. 电子信息对抗技术, 2018, 33(5): 60-66, 79.
|
|
Lu Yao, Li Dongsheng. Design of UAV Combat Scenario Model Based on Threat Probability Graph[J]. Electronic Information Warfare Technology, 2018, 33(5): 60-66, 79.
|
6 |
Wen Jiaxing, Zhang Qijia, Li Yunchen. UUV Mission Re-planning Based on Threat Assessment of Uncertain Events[C]//2023 38th Youth Academic Annual Conference of Chinese Association of Automation (YAC). Piscataway: IEEE, 2023: 341-346.
|
7 |
Li Danyi, Liu Meiqin, Zhang Senlin. Underwater Target Threat Assessment Method Based on Bayesian Network[C]//2021 40th Chinese Control Conference (CCC). Piscataway: IEEE, 2021: 3363-3367.
|
8 |
Cao Xiang, Sun Changyin, Wang Xuerao. Threat Assessment Strategy of Human-in-the-loop Unmanned Underwater Vehicle Under Uncertain Events[J]. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2024, 54(1): 520-532.
|
9 |
Shi Guoqing, Pu Junwei, Zhang Lin, et al. Situation Assessment Based on Multi-entity Bayesian Network[C]//2020 IEEE 16th International Conference on Control & Automation (ICCA). Piscataway: IEEE, 2020: 702-707.
|
10 |
Gao Yang, Li Dongsheng, Zhong Hua. A Novel Target Threat Assessment Method Based on Three-way Decisions Under Intuitionistic Fuzzy Multi-attribute Decision Making Environment[J]. Engineering Applications of Artificial Intelligence, 2020, 87: 103276.
|
11 |
Zhang Jinhuan, Shan Yujie, Dong Jian. A Threat Assessment Method Based on Correlation-similarity Information and Three-way Decisions in Interval Intuitionistic Fuzzy Environment[J]. Engineering Applications of Artificial Intelligence, 2024, 135: 108793.
|
12 |
Lu Yanli, Lei Xiaoli, Zhou Zhiping, et al. Approximate Reasoning Based on IFRS and DS Theory with Its Application in Threat Assessment[J]. IEEE Access, 2020, 8: 160558-160568.
|
13 |
Zhang Kun, Kong Weiren, Liu Peipei, et al. Assessment and Sequencing of Air Target Threat Based on Intuitionistic Fuzzy Entropy and Dynamic VIKOR[J]. Journal of Systems Engineering and Electronics, 2018, 29(2): 305-310.
|
14 |
Li Yiyuan, Chen Weiyi, Liu Shukan, et al. Multi-UAV Cooperative Air Combat Target Assignment Method Based on VNS-IBPSO in Complex Dynamic Environment[J]. International Journal of Aerospace Engineering, 2024, 2024(1): 9980746.
|
15 |
王毅, 刘三阳, 张文, 等. 属性权重不确定的直觉模糊多属性决策的威胁评估方法[J]. 电子学报, 2014, 42(12): 2509-2514.
|
|
Wang Yi, Liu Sanyang, Zhang Wen, et al. Threat Assessment Method with Uncertain Attribute Weight Based on Intuitionistic Fuzzy Multi-attribute Decision[J]. Acta Electronica Sinica, 2014, 42(12): 2509-2514.
|
16 |
Zhou Lin, Zhang Meng, Weiwei Shuai, et al. Air Target Threat Assessment and Prediction Based on Improved GM(1,1) Model[C]//2023 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC). Piscataway: IEEE, 2023: 1-6.
|
17 |
Wang Yu, Fan Zilin, Ren Tianjun, et al. Target Threat Assessment in Air Combat with Incomplete Information[C]//2022 34th Chinese Control and Decision Conference (CCDC). Piscataway: IEEE, 2022: 5326-5330.
|
18 |
Ristic Branko, Benavoli Alessio, Skvortsov Alex. Robust Target Area Search Using Sets of Probabilities[J]. Digital Signal Processing, 2023, 142: 104195.
|
19 |
Yu Liang, Lin Da. Bayesian-based Search Decision Framework and Search Strategy Analysis in Probabilistic Search[J]. Scientific Programming, 2020, 2020(1): 8865381.
|
20 |
Ganter B, Rudolf W. Formal Concept Analysis: Mathematical Foundations[M]. Switzerland: Springer, 1999.
|
21 |
Agrawal R, Srikant R. Fast Algorithms for Mining Association Rules in Large Databases[C]//Proceedings of the 20th International Conference on Very Large Data Bases. San Francisco: Morgan Kaufmann Publishers Inc., 1994: 487-499.
|
22 |
贺毅辉. 作战模拟基础[M]. 北京: 国防工业出版社, 2012.
|
|
He Yihui. Fundamentals of Operational Simulation[M]. Beijing: National Defense Industry Press, 2012.
|
23 |
张堃, 周德云. 熵权与群组AHP相结合的TOPSIS法多目标威胁评估[J]. 系统仿真学报, 2008, 20(7): 1661-1664.
|
|
Zhang Kun, Zhou Deyun. Application of TOPSIS Based on Entropy and GD-AHP in Evaluating Sequence of Air Target Threat[J]. Journal of System Simulation, 2008, 20(7): 1661-1664.
|