{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:10:04Z","timestamp":1755882604406,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1145\/3672919.3672970","type":"proceedings-article","created":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T12:39:43Z","timestamp":1721824783000},"page":"275-280","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on the Optimization Strategy of Command and Control System Based on Complex Network Theory"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4411-7633","authenticated-orcid":false,"given":"Tengda","family":"Li","sequence":"first","affiliation":[{"name":"Air and Missile Defense College, Air Force Engineering University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5957-5947","authenticated-orcid":false,"given":"Gang","family":"Wang","sequence":"additional","affiliation":[{"name":"Air and Missile Defense College, Air Force Engineering University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-2500-9658","authenticated-orcid":false,"given":"Chong","family":"Du","sequence":"additional","affiliation":[{"name":"Air and Missile Defense College, Air Force Engineering University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7780-7185","authenticated-orcid":false,"given":"Qiang","family":"Fu","sequence":"additional","affiliation":[{"name":"Air and Missile Defense College, Air Force Engineering University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-1625-2349","authenticated-orcid":false,"given":"Xiangyu","family":"Liu","sequence":"additional","affiliation":[{"name":"Air and Missile Defense College, Air Force Engineering University, China"}]}],"member":"320","published-online":{"date-parts":[[2024,7,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Gong P and Zhang R H. Military communication network technology","author":"Mu Ch P","year":"2016","unstructured":"Mu Ch P, Gong P and Zhang R H. Military communication network technology. 2016. Beijing: Beijing Institute of Technology Press."},{"key":"e_1_3_2_1_2_1","first-page":"27","volume-title":"Complex Systems and Complexity Science","author":"Hu X F","year":"2010","unstructured":"Hu X F. Overview of warfare complexity network research. Complex Systems and Complexity Science, 2010. (7): 27-28."},{"volume-title":"Military Communications Conference. IEEE, 842-848","author":"Papakostas D","key":"e_1_3_2_1_3_1","unstructured":"Papakostas D, Basaras P, Katsaros D and Tassiulas L. Backbone formation in military multi-layer ad hoc networks using complex network concepts. 2016. Military Communications Conference. IEEE, 842-848."},{"key":"e_1_3_2_1_4_1","volume-title":"Hoge G and Pugin B","author":"Blaser H","year":"2010","unstructured":"Blaser H, Hoge G and Pugin B. 2010.The Application of Complex Network Theory in the Military Domain. National Defense Science & Technology."},{"volume-title":"Proceedings of the Tenth China Command and Control Conference (Previous Book). Weapon Industry Press, 306-311","author":"Zheng Y","key":"e_1_3_2_1_5_1","unstructured":"Zheng Y, Liu X Y, Liang J Q, Qiu Y J and Shi B Z. Research on new system combat accusation system. 2022. Chinese Command and Control Society. Proceedings of the Tenth China Command and Control Conference (Previous Book). Weapon Industry Press, 306-311."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Ai X. Node Importance Ranking of Complex Networks with Entropy Variation. 2017. Entropy 19(7):303.","DOI":"10.3390\/e19070303"},{"issue":"3","key":"e_1_3_2_1_7_1","first-page":"747","article-title":"Evaluation Method for Node Importance in Communication Network Based on Mutual Information","volume":"45","author":"Run-Nian M A","year":"2017","unstructured":"Run-Nian M A, Wang B, Wang G, Guo X C and Liu W B. 2017. Evaluation Method for Node Importance in Communication Network Based on Mutual Information. Tien Tzu Hsueh Pao\/Acta Electronica Sinica, 45(3):747-752.","journal-title":"Tien Tzu Hsueh Pao\/Acta Electronica Sinica"},{"key":"e_1_3_2_1_8_1","volume-title":"Fundamental theory of complex networks","author":"Guo Z","year":"2012","unstructured":"Guo, Sh Z, Lu and Zh M. Fundamental theory of complex networks. 2012. Beijing: Science Press."},{"key":"e_1_3_2_1_9_1","volume-title":"Collective dynamics of 'small-world' networks (see comments)","author":"Watts D","year":"1998","unstructured":"Watts D and Strogatz S. Collective dynamics of 'small-world' networks (see comments). 1998. Nature, 393(6684): 440-442."},{"key":"e_1_3_2_1_10_1","volume-title":"Yu B and Yao B Zl. Detecting delay propagation in regional air transport systems using convergent cross mapping and complex network theory","author":"Guo Z","year":"2022","unstructured":"Guo Z, Hao M, Yu B and Yao B Zl. Detecting delay propagation in regional air transport systems using convergent cross mapping and complex network theory. 2022. Transportation Research Part E: Logistics and Transportation Review, 157."},{"key":"e_1_3_2_1_11_1","volume-title":"Zhu JF and Miao JJ. Robustness study of air-iron composite networks based on complex networks","author":"Xu F","year":"2015","unstructured":"Xu F, Zhu JF and Miao JJ. Robustness study of air-iron composite networks based on complex networks. 2015. Complex Systems and Complexity Science, 12(01):40-45."},{"key":"e_1_3_2_1_12_1","unstructured":"Wu T. Analysis of connectivity reliability of urban rail transit network based on complex network. 2019. Nanjing University of Science and Technology."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.resourpol.2021.102518"},{"key":"e_1_3_2_1_14_1","volume-title":"Ouyang H and Xue M","author":"Zhi Y","year":"2022","unstructured":"Zhi Y, Ouyang H and Xue M. 2022. A research on driver nodes identification in Chinese interbank networks: based on the controllability theory of complex network. Applied Economics Letters, 29."},{"key":"e_1_3_2_1_15_1","volume-title":"Matteo Pellegrini and Miguel A Vega-Palas","author":"Colin F","year":"2022","unstructured":"Colin F, Vaquero-Sedas M I, MD Cubiles, Michael Thompson, Alejandro Vega-Vaquero, Matteo Pellegrini and Miguel A Vega-Palas. 2022. A complex network of interactions governs DNA methylation at telomeric regions. Nucleic Acids Research, (3):3."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ecolind.2021.108101"},{"key":"e_1_3_2_1_17_1","first-page":"121","volume-title":"Safety Science","author":"Zhang W","year":"2014","unstructured":"Zhang W, Pei W and Guo T. An efficient method of robustness analysis for power grid under cascading failure. Safety Science, 2014, 64: 121-126."},{"issue":"06","key":"e_1_3_2_1_18_1","first-page":"118","article-title":"Optimization design of structure invulnerability for air defense multiple sensor network","volume":"38","author":"Sun C Y","year":"2017","unstructured":"Sun C Y, Shen M X, Sheng H and Xiao J K. 2017.Optimization design of structure invulnerability for air defense multiple sensor network. Journal on Communications, 38(06):118-126.","journal-title":"Journal on Communications"},{"issue":"09","key":"e_1_3_2_1_19_1","first-page":"6","article-title":"Hypernetwork modeling research on carrier formation Figurehting SoS","volume":"41","author":"Gang J X","year":"2019","unstructured":"Gang J X, Xiong-Bing Y E and Wang W. 2019. Hypernetwork modeling research on carrier formation Figurehting SoS. Ship Science and Technology,41(09):6-11.","journal-title":"Ship Science and Technology"},{"key":"e_1_3_2_1_20_1","volume-title":"Kou Y X and Wu C","author":"Lei C","year":"2018","unstructured":"Lei C, Kou Y X and Wu C. 2018. Empirical research on complex networks modeling of combat SoS based on data from real war-game, Part I: Statistical characteristics. Physica, A. Statistical mechanics and its applications, 490: 754-773."},{"key":"e_1_3_2_1_21_1","first-page":"2892","volume-title":"Systems Engineering and Electronics Technology","author":"Liu T L","year":"2020","unstructured":"Liu T L, Yang Zh R, Zhang, H, Teng X Y and Liu J. Modeling and performance analysis of military communication networks based on complex networks. Systems Engineering and Electronics Technology, 2020, 42(12):2892-2898."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-013-9163-0"},{"key":"e_1_3_2_1_23_1","volume-title":"Optimal secure two-layer IoT network design","author":"Chen C.","year":"2019","unstructured":"J. Chen, C. Touati and Q. Zhu. Optimal secure two-layer IoT network design. 2019. IEEE Transactions on Control of Network Systems. 7(1) :398\u2013409."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEE.2015.00036"}],"event":{"name":"CSAIDE 2024: 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy","acronym":"CSAIDE 2024","location":"Nanjing China"},"container-title":["Proceedings of the 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672919.3672970","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672919.3672970","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:37:38Z","timestamp":1755880658000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672919.3672970"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":24,"alternative-id":["10.1145\/3672919.3672970","10.1145\/3672919"],"URL":"https:\/\/doi.org\/10.1145\/3672919.3672970","relation":{},"subject":[],"published":{"date-parts":[[2024,3]]},"assertion":[{"value":"2024-07-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}