{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T13:35:23Z","timestamp":1772717723839,"version":"3.50.1"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2022A1515010737"],"award-info":[{"award-number":["2022A1515010737"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2023A1515011568"],"award-info":[{"award-number":["2023A1515011568"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Special for key areas of Guangdong Provincial Department of Education","award":["2021ZDZX1021"],"award-info":[{"award-number":["2021ZDZX1021"]}]},{"name":"Guangdong Province Intelligent Control Engineering Technology Research Center","award":["2019GCZX008"],"award-info":[{"award-number":["2019GCZX008"]}]},{"name":"Science and Technology of Zhanjiang City"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Sci. Eng."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1109\/tnse.2024.3443191","type":"journal-article","created":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T17:35:43Z","timestamp":1723570543000},"page":"5744-5759","source":"Crossref","is-referenced-by-count":7,"title":["Modeling Dual-Layer Interdependent Command and Control Networks for Integrated Reconnaissance-Strike and OODA-Loop Capabilities"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9689-1252","authenticated-orcid":false,"given":"Bo","family":"Chen","sequence":"first","affiliation":[{"name":"Intelligent Control and Network key Laboratory, Lingnan Normal University, Zhanjiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8379-0342","authenticated-orcid":false,"given":"Guimei","family":"Pang","sequence":"additional","affiliation":[{"name":"Intelligent Control and Network key Laboratory, Lingnan Normal University, Zhanjiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4025-6348","authenticated-orcid":false,"given":"Zhengtao","family":"Xiang","sequence":"additional","affiliation":[{"name":"Automotive Information Control and Network Technology Institute, Hubei University of Automotive Technology, Shiyan, China"}]},{"given":"Xiue","family":"Gao","sequence":"additional","affiliation":[{"name":"Intelligent Control and Network key Laboratory, Lingnan Normal University, Zhanjiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0793-1698","authenticated-orcid":false,"given":"Yufeng","family":"Chen","sequence":"additional","affiliation":[{"name":"Automotive Information Control and Network Technology Institute, Hubei University of Automotive Technology, Shiyan, China"}]},{"given":"Shifeng","family":"Chen","sequence":"additional","affiliation":[{"name":"Intelligent Control and Network key Laboratory, Lingnan Normal University, Zhanjiang, China"}]}],"member":"263","reference":[{"issue":"5","key":"ref1","first-page":"1066","article-title":"Research on network modeling and optimization of operation system of systems based on complex network","volume":"37","author":"Zhang","year":"2015","journal-title":"Syst. Eng. Electron."},{"key":"ref2","article-title":"An information age combat model","author":"Cares","year":"2004"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.08.020"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.21236\/ADA406255","volume-title":"Network-Centric Warfare: Developing and Leveraging Information Superiority 2nd Edition","author":"Alberts","year":"2000"},{"issue":"3","key":"ref5","first-page":"134","article-title":"Formalized description of service view and evolution within CAISR architecture","volume":"33","author":"Wang","year":"2011","journal-title":"J. Nat. Univ. Defense Technol."},{"issue":"9","key":"ref6","first-page":"1997","article-title":"Intelligent wargaming system: Change needed by next generation need to be changed","volume":"33","author":"Hu","year":"2021","journal-title":"J. Syst. Simul."},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSEE.2015.00036"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.21629\/JSEE.2020.01.12"},{"issue":"4","key":"ref9","first-page":"60","article-title":"Modeling method of command and control network based on multi-attribute weighting","volume":"46","author":"Pan","year":"2018","journal-title":"Modern Defence Technol."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12051180"},{"issue":"2","key":"ref11","first-page":"8","article-title":"Network modeling and analysis of the joint operations command and control system based on networks","volume":"40","author":"Liu","year":"2018","journal-title":"Command Control Simul."},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2889983"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2021.126051"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/e25030471"},{"issue":"6","key":"ref15","first-page":"641","article-title":"Robustness of interdependent networks with degree correlated asymmetric inter-layer dependency links","volume":"20","author":"Han","year":"2019","journal-title":"J. Inf. Eng. Univ."},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1063\/1.5139254"},{"issue":"9","key":"ref17","first-page":"1918","article-title":"Evolution model of equipment support network considering interdependent relationship","volume":"40","author":"Zhang","year":"2020","journal-title":"Acta Armamentarii"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2022.128406"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1061\/JITSE4.ISENG-2185"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4251"},{"issue":"1","key":"ref21","first-page":"34","article-title":"Network modeling and analysis of combat system based on complex network dependence","volume":"31","author":"Zhu","year":"2017","journal-title":"Mil. Oper. Res. Syst. Eng."},{"issue":"2","key":"ref22","first-page":"53","article-title":"Construction and analysis of asymmetric dependent command and control network model","volume":"38","author":"Yue","year":"2023","journal-title":"Mil. Oper. Res. Assessment"},{"issue":"9","key":"ref23","first-page":"129","article-title":"Modeling method of cyberspace operation systems based on complex networks","volume":"45","author":"Xing","year":"2020","journal-title":"Fire Control Command Control"},{"issue":"11","key":"ref24","first-page":"2865","article-title":"Bi-Layered network model of command information system based on task flow","volume":"29","author":"Cui","year":"2017","journal-title":"J. Syst. Simul."},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2022.127919"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2022.111819"},{"issue":"6","key":"ref27","article-title":"Robustness of edge-coupled interdependent networks with reinforced edges","volume":"11","author":"Zhang","year":"2022","journal-title":"J. Complex Netw."},{"key":"ref28","article-title":"Robustness of edge-coupled interdependent networks with reinforced edges","volume":"142","author":"Zhang","year":"2022","journal-title":"J. Complex Netw."},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2023.01.060"},{"issue":"3","key":"ref30","doi-asserted-by":"crossref","DOI":"10.1209\/0295-5075\/127\/38003","article-title":"Cascading failures in interdependent scale-free networks of different coupling preferences with the harmonic closeness","volume":"127","author":"Hao","year":"2018","journal-title":"Europhys. Lett."},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1142\/S0129183121501011"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2017.11.037"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2023.3245105"},{"issue":"10","key":"ref34","first-page":"120","article-title":"Cascading failure model of asymmetrical interdependent operational networks under edge attack","volume":"49","author":"Han","year":"2017","journal-title":"J. Harbin Inst. Technol."},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2903520"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-022-04876-8"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0033799"},{"key":"ref38","article-title":"Invulnerability model of command and control network based on complex network","author":"Wang","year":"2017"},{"issue":"1","key":"ref39","first-page":"122","article-title":"Review of the interdependent networks","volume":"38","author":"Lao","year":"2016","journal-title":"J. Nat. Univ. Defense Technol."},{"issue":"4","key":"ref40","first-page":"149","article-title":"Cascading model in interdependent networks with edge weight and coupled strength","volume":"32","author":"Wang","year":"2018","journal-title":"J. Ind. Eng.\/Eng. Manage."},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2020.2967340"},{"issue":"12","key":"ref42","first-page":"88","article-title":"Edge importance identification method based on improved bridging coefficients","volume":"47","author":"Xiang","year":"2022","journal-title":"Fire Control Command Control"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1016\/j.ins.2017.10.035","article-title":"Measure of invulnerability for command and control network based on mission link","volume":"426","author":"Wang","year":"2018","journal-title":"Inf. Sci."},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12051180"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2016.03.023"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-019-09038-8"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-019-08746-5"}],"container-title":["IEEE Transactions on Network Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488902\/10758414\/10636023.pdf?arnumber=10636023","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T18:19:40Z","timestamp":1732731580000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10636023\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":47,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tnse.2024.3443191","relation":{},"ISSN":["2327-4697","2334-329X"],"issn-type":[{"value":"2327-4697","type":"electronic"},{"value":"2334-329X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11]]}}}