Hierarchy-entropy based method for command and control networks reconfiguration
Abstract Network reconfiguration is an important means of improving network invulnerability. However, most existing network reconfiguration methods fail to consider node importance, edge importance, and hierarchical characteristics, and the local and global information of command and control (C2) ne...
Ausführliche Beschreibung
Autor*in: |
Gao, Xiue [verfasserIn] |
---|
Format: |
Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2022 |
---|
Schlagwörter: |
---|
Anmerkung: |
© The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022 |
---|
Übergeordnetes Werk: |
Enthalten in: The journal of supercomputing - Springer US, 1987, 78(2022), 13 vom: 15. Apr., Seite 15229-15249 |
---|---|
Übergeordnetes Werk: |
volume:78 ; year:2022 ; number:13 ; day:15 ; month:04 ; pages:15229-15249 |
Links: |
---|
DOI / URN: |
10.1007/s11227-022-04445-z |
---|
Katalog-ID: |
OLC2079305239 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | OLC2079305239 | ||
003 | DE-627 | ||
005 | 20230506052158.0 | ||
007 | tu | ||
008 | 221220s2022 xx ||||| 00| ||eng c | ||
024 | 7 | |a 10.1007/s11227-022-04445-z |2 doi | |
035 | |a (DE-627)OLC2079305239 | ||
035 | |a (DE-He213)s11227-022-04445-z-p | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 004 |a 620 |q VZ |
100 | 1 | |a Gao, Xiue |e verfasserin |4 aut | |
245 | 1 | 0 | |a Hierarchy-entropy based method for command and control networks reconfiguration |
264 | 1 | |c 2022 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
500 | |a © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022 | ||
520 | |a Abstract Network reconfiguration is an important means of improving network invulnerability. However, most existing network reconfiguration methods fail to consider node importance, edge importance, and hierarchical characteristics, and the local and global information of command and control (C2) networks are difficult to satisfy comprehensively. Therefore, this study designed a hierarchy-entropy-based method for reconfiguring C2 networks. By combining hierarchical and operational link entropy, the probability of inter-node edge reconfiguration based on hierarchy entropy is proposed. Additionally, methods for calculating the node level-up, cross-level, and swap degrees, and a portfolio reconfiguration strategy are proposed. Finally, to validate the proposed method, a case study was simulated, and the repair probability, adjustable parameters, and reconfiguration effects of the different reconfiguration methods and modes were determined. The comparison results demonstrate that the proposed algorithm improves the reconfiguration effect and reduces the reconfiguration cost. | ||
650 | 4 | |a Command and control | |
650 | 4 | |a Network reconfiguration | |
650 | 4 | |a Hierarchy-entropy | |
650 | 4 | |a Complex network | |
700 | 1 | |a Chen, Bo |0 (orcid)0000-0002-9689-1252 |4 aut | |
700 | 1 | |a Jiang, Panling |4 aut | |
700 | 1 | |a Xiang, Zhengtao |4 aut | |
700 | 1 | |a Chen, Yufeng |4 aut | |
700 | 1 | |a Wang, Yunming |4 aut | |
773 | 0 | 8 | |i Enthalten in |t The journal of supercomputing |d Springer US, 1987 |g 78(2022), 13 vom: 15. Apr., Seite 15229-15249 |w (DE-627)13046466X |w (DE-600)740510-8 |w (DE-576)018667775 |x 0920-8542 |7 nnns |
773 | 1 | 8 | |g volume:78 |g year:2022 |g number:13 |g day:15 |g month:04 |g pages:15229-15249 |
856 | 4 | 1 | |u https://doi.org/10.1007/s11227-022-04445-z |z lizenzpflichtig |3 Volltext |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-TEC | ||
912 | |a SSG-OLC-MAT | ||
951 | |a AR | ||
952 | |d 78 |j 2022 |e 13 |b 15 |c 04 |h 15229-15249 |
author_variant |
x g xg b c bc p j pj z x zx y c yc y w yw |
---|---|
matchkey_str |
article:09208542:2022----::irrhetoyaemtofromnadotont |
hierarchy_sort_str |
2022 |
publishDate |
2022 |
allfields |
10.1007/s11227-022-04445-z doi (DE-627)OLC2079305239 (DE-He213)s11227-022-04445-z-p DE-627 ger DE-627 rakwb eng 004 620 VZ Gao, Xiue verfasserin aut Hierarchy-entropy based method for command and control networks reconfiguration 2022 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022 Abstract Network reconfiguration is an important means of improving network invulnerability. However, most existing network reconfiguration methods fail to consider node importance, edge importance, and hierarchical characteristics, and the local and global information of command and control (C2) networks are difficult to satisfy comprehensively. Therefore, this study designed a hierarchy-entropy-based method for reconfiguring C2 networks. By combining hierarchical and operational link entropy, the probability of inter-node edge reconfiguration based on hierarchy entropy is proposed. Additionally, methods for calculating the node level-up, cross-level, and swap degrees, and a portfolio reconfiguration strategy are proposed. Finally, to validate the proposed method, a case study was simulated, and the repair probability, adjustable parameters, and reconfiguration effects of the different reconfiguration methods and modes were determined. The comparison results demonstrate that the proposed algorithm improves the reconfiguration effect and reduces the reconfiguration cost. Command and control Network reconfiguration Hierarchy-entropy Complex network Chen, Bo (orcid)0000-0002-9689-1252 aut Jiang, Panling aut Xiang, Zhengtao aut Chen, Yufeng aut Wang, Yunming aut Enthalten in The journal of supercomputing Springer US, 1987 78(2022), 13 vom: 15. Apr., Seite 15229-15249 (DE-627)13046466X (DE-600)740510-8 (DE-576)018667775 0920-8542 nnns volume:78 year:2022 number:13 day:15 month:04 pages:15229-15249 https://doi.org/10.1007/s11227-022-04445-z lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-TEC SSG-OLC-MAT AR 78 2022 13 15 04 15229-15249 |
spelling |
10.1007/s11227-022-04445-z doi (DE-627)OLC2079305239 (DE-He213)s11227-022-04445-z-p DE-627 ger DE-627 rakwb eng 004 620 VZ Gao, Xiue verfasserin aut Hierarchy-entropy based method for command and control networks reconfiguration 2022 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022 Abstract Network reconfiguration is an important means of improving network invulnerability. However, most existing network reconfiguration methods fail to consider node importance, edge importance, and hierarchical characteristics, and the local and global information of command and control (C2) networks are difficult to satisfy comprehensively. Therefore, this study designed a hierarchy-entropy-based method for reconfiguring C2 networks. By combining hierarchical and operational link entropy, the probability of inter-node edge reconfiguration based on hierarchy entropy is proposed. Additionally, methods for calculating the node level-up, cross-level, and swap degrees, and a portfolio reconfiguration strategy are proposed. Finally, to validate the proposed method, a case study was simulated, and the repair probability, adjustable parameters, and reconfiguration effects of the different reconfiguration methods and modes were determined. The comparison results demonstrate that the proposed algorithm improves the reconfiguration effect and reduces the reconfiguration cost. Command and control Network reconfiguration Hierarchy-entropy Complex network Chen, Bo (orcid)0000-0002-9689-1252 aut Jiang, Panling aut Xiang, Zhengtao aut Chen, Yufeng aut Wang, Yunming aut Enthalten in The journal of supercomputing Springer US, 1987 78(2022), 13 vom: 15. Apr., Seite 15229-15249 (DE-627)13046466X (DE-600)740510-8 (DE-576)018667775 0920-8542 nnns volume:78 year:2022 number:13 day:15 month:04 pages:15229-15249 https://doi.org/10.1007/s11227-022-04445-z lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-TEC SSG-OLC-MAT AR 78 2022 13 15 04 15229-15249 |
allfields_unstemmed |
10.1007/s11227-022-04445-z doi (DE-627)OLC2079305239 (DE-He213)s11227-022-04445-z-p DE-627 ger DE-627 rakwb eng 004 620 VZ Gao, Xiue verfasserin aut Hierarchy-entropy based method for command and control networks reconfiguration 2022 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022 Abstract Network reconfiguration is an important means of improving network invulnerability. However, most existing network reconfiguration methods fail to consider node importance, edge importance, and hierarchical characteristics, and the local and global information of command and control (C2) networks are difficult to satisfy comprehensively. Therefore, this study designed a hierarchy-entropy-based method for reconfiguring C2 networks. By combining hierarchical and operational link entropy, the probability of inter-node edge reconfiguration based on hierarchy entropy is proposed. Additionally, methods for calculating the node level-up, cross-level, and swap degrees, and a portfolio reconfiguration strategy are proposed. Finally, to validate the proposed method, a case study was simulated, and the repair probability, adjustable parameters, and reconfiguration effects of the different reconfiguration methods and modes were determined. The comparison results demonstrate that the proposed algorithm improves the reconfiguration effect and reduces the reconfiguration cost. Command and control Network reconfiguration Hierarchy-entropy Complex network Chen, Bo (orcid)0000-0002-9689-1252 aut Jiang, Panling aut Xiang, Zhengtao aut Chen, Yufeng aut Wang, Yunming aut Enthalten in The journal of supercomputing Springer US, 1987 78(2022), 13 vom: 15. Apr., Seite 15229-15249 (DE-627)13046466X (DE-600)740510-8 (DE-576)018667775 0920-8542 nnns volume:78 year:2022 number:13 day:15 month:04 pages:15229-15249 https://doi.org/10.1007/s11227-022-04445-z lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-TEC SSG-OLC-MAT AR 78 2022 13 15 04 15229-15249 |
allfieldsGer |
10.1007/s11227-022-04445-z doi (DE-627)OLC2079305239 (DE-He213)s11227-022-04445-z-p DE-627 ger DE-627 rakwb eng 004 620 VZ Gao, Xiue verfasserin aut Hierarchy-entropy based method for command and control networks reconfiguration 2022 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022 Abstract Network reconfiguration is an important means of improving network invulnerability. However, most existing network reconfiguration methods fail to consider node importance, edge importance, and hierarchical characteristics, and the local and global information of command and control (C2) networks are difficult to satisfy comprehensively. Therefore, this study designed a hierarchy-entropy-based method for reconfiguring C2 networks. By combining hierarchical and operational link entropy, the probability of inter-node edge reconfiguration based on hierarchy entropy is proposed. Additionally, methods for calculating the node level-up, cross-level, and swap degrees, and a portfolio reconfiguration strategy are proposed. Finally, to validate the proposed method, a case study was simulated, and the repair probability, adjustable parameters, and reconfiguration effects of the different reconfiguration methods and modes were determined. The comparison results demonstrate that the proposed algorithm improves the reconfiguration effect and reduces the reconfiguration cost. Command and control Network reconfiguration Hierarchy-entropy Complex network Chen, Bo (orcid)0000-0002-9689-1252 aut Jiang, Panling aut Xiang, Zhengtao aut Chen, Yufeng aut Wang, Yunming aut Enthalten in The journal of supercomputing Springer US, 1987 78(2022), 13 vom: 15. Apr., Seite 15229-15249 (DE-627)13046466X (DE-600)740510-8 (DE-576)018667775 0920-8542 nnns volume:78 year:2022 number:13 day:15 month:04 pages:15229-15249 https://doi.org/10.1007/s11227-022-04445-z lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-TEC SSG-OLC-MAT AR 78 2022 13 15 04 15229-15249 |
allfieldsSound |
10.1007/s11227-022-04445-z doi (DE-627)OLC2079305239 (DE-He213)s11227-022-04445-z-p DE-627 ger DE-627 rakwb eng 004 620 VZ Gao, Xiue verfasserin aut Hierarchy-entropy based method for command and control networks reconfiguration 2022 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022 Abstract Network reconfiguration is an important means of improving network invulnerability. However, most existing network reconfiguration methods fail to consider node importance, edge importance, and hierarchical characteristics, and the local and global information of command and control (C2) networks are difficult to satisfy comprehensively. Therefore, this study designed a hierarchy-entropy-based method for reconfiguring C2 networks. By combining hierarchical and operational link entropy, the probability of inter-node edge reconfiguration based on hierarchy entropy is proposed. Additionally, methods for calculating the node level-up, cross-level, and swap degrees, and a portfolio reconfiguration strategy are proposed. Finally, to validate the proposed method, a case study was simulated, and the repair probability, adjustable parameters, and reconfiguration effects of the different reconfiguration methods and modes were determined. The comparison results demonstrate that the proposed algorithm improves the reconfiguration effect and reduces the reconfiguration cost. Command and control Network reconfiguration Hierarchy-entropy Complex network Chen, Bo (orcid)0000-0002-9689-1252 aut Jiang, Panling aut Xiang, Zhengtao aut Chen, Yufeng aut Wang, Yunming aut Enthalten in The journal of supercomputing Springer US, 1987 78(2022), 13 vom: 15. Apr., Seite 15229-15249 (DE-627)13046466X (DE-600)740510-8 (DE-576)018667775 0920-8542 nnns volume:78 year:2022 number:13 day:15 month:04 pages:15229-15249 https://doi.org/10.1007/s11227-022-04445-z lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-TEC SSG-OLC-MAT AR 78 2022 13 15 04 15229-15249 |
language |
English |
source |
Enthalten in The journal of supercomputing 78(2022), 13 vom: 15. Apr., Seite 15229-15249 volume:78 year:2022 number:13 day:15 month:04 pages:15229-15249 |
sourceStr |
Enthalten in The journal of supercomputing 78(2022), 13 vom: 15. Apr., Seite 15229-15249 volume:78 year:2022 number:13 day:15 month:04 pages:15229-15249 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Command and control Network reconfiguration Hierarchy-entropy Complex network |
dewey-raw |
004 |
isfreeaccess_bool |
false |
container_title |
The journal of supercomputing |
authorswithroles_txt_mv |
Gao, Xiue @@aut@@ Chen, Bo @@aut@@ Jiang, Panling @@aut@@ Xiang, Zhengtao @@aut@@ Chen, Yufeng @@aut@@ Wang, Yunming @@aut@@ |
publishDateDaySort_date |
2022-04-15T00:00:00Z |
hierarchy_top_id |
13046466X |
dewey-sort |
14 |
id |
OLC2079305239 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2079305239</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230506052158.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">221220s2022 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s11227-022-04445-z</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2079305239</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s11227-022-04445-z-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="a">620</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gao, Xiue</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hierarchy-entropy based method for command and control networks reconfiguration</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2022</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Network reconfiguration is an important means of improving network invulnerability. However, most existing network reconfiguration methods fail to consider node importance, edge importance, and hierarchical characteristics, and the local and global information of command and control (C2) networks are difficult to satisfy comprehensively. Therefore, this study designed a hierarchy-entropy-based method for reconfiguring C2 networks. By combining hierarchical and operational link entropy, the probability of inter-node edge reconfiguration based on hierarchy entropy is proposed. Additionally, methods for calculating the node level-up, cross-level, and swap degrees, and a portfolio reconfiguration strategy are proposed. Finally, to validate the proposed method, a case study was simulated, and the repair probability, adjustable parameters, and reconfiguration effects of the different reconfiguration methods and modes were determined. The comparison results demonstrate that the proposed algorithm improves the reconfiguration effect and reduces the reconfiguration cost.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Command and control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Network reconfiguration</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hierarchy-entropy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Complex network</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chen, Bo</subfield><subfield code="0">(orcid)0000-0002-9689-1252</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jiang, Panling</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Xiang, Zhengtao</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chen, Yufeng</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Yunming</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">The journal of supercomputing</subfield><subfield code="d">Springer US, 1987</subfield><subfield code="g">78(2022), 13 vom: 15. Apr., Seite 15229-15249</subfield><subfield code="w">(DE-627)13046466X</subfield><subfield code="w">(DE-600)740510-8</subfield><subfield code="w">(DE-576)018667775</subfield><subfield code="x">0920-8542</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:78</subfield><subfield code="g">year:2022</subfield><subfield code="g">number:13</subfield><subfield code="g">day:15</subfield><subfield code="g">month:04</subfield><subfield code="g">pages:15229-15249</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s11227-022-04445-z</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-TEC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">78</subfield><subfield code="j">2022</subfield><subfield code="e">13</subfield><subfield code="b">15</subfield><subfield code="c">04</subfield><subfield code="h">15229-15249</subfield></datafield></record></collection>
|
author |
Gao, Xiue |
spellingShingle |
Gao, Xiue ddc 004 misc Command and control misc Network reconfiguration misc Hierarchy-entropy misc Complex network Hierarchy-entropy based method for command and control networks reconfiguration |
authorStr |
Gao, Xiue |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)13046466X |
format |
Article |
dewey-ones |
004 - Data processing & computer science 620 - Engineering & allied operations |
delete_txt_mv |
keep |
author_role |
aut aut aut aut aut aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
0920-8542 |
topic_title |
004 620 VZ Hierarchy-entropy based method for command and control networks reconfiguration Command and control Network reconfiguration Hierarchy-entropy Complex network |
topic |
ddc 004 misc Command and control misc Network reconfiguration misc Hierarchy-entropy misc Complex network |
topic_unstemmed |
ddc 004 misc Command and control misc Network reconfiguration misc Hierarchy-entropy misc Complex network |
topic_browse |
ddc 004 misc Command and control misc Network reconfiguration misc Hierarchy-entropy misc Complex network |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
hierarchy_parent_title |
The journal of supercomputing |
hierarchy_parent_id |
13046466X |
dewey-tens |
000 - Computer science, knowledge & systems 620 - Engineering |
hierarchy_top_title |
The journal of supercomputing |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)13046466X (DE-600)740510-8 (DE-576)018667775 |
title |
Hierarchy-entropy based method for command and control networks reconfiguration |
ctrlnum |
(DE-627)OLC2079305239 (DE-He213)s11227-022-04445-z-p |
title_full |
Hierarchy-entropy based method for command and control networks reconfiguration |
author_sort |
Gao, Xiue |
journal |
The journal of supercomputing |
journalStr |
The journal of supercomputing |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works 600 - Technology |
recordtype |
marc |
publishDateSort |
2022 |
contenttype_str_mv |
txt |
container_start_page |
15229 |
author_browse |
Gao, Xiue Chen, Bo Jiang, Panling Xiang, Zhengtao Chen, Yufeng Wang, Yunming |
container_volume |
78 |
class |
004 620 VZ |
format_se |
Aufsätze |
author-letter |
Gao, Xiue |
doi_str_mv |
10.1007/s11227-022-04445-z |
normlink |
(ORCID)0000-0002-9689-1252 |
normlink_prefix_str_mv |
(orcid)0000-0002-9689-1252 |
dewey-full |
004 620 |
title_sort |
hierarchy-entropy based method for command and control networks reconfiguration |
title_auth |
Hierarchy-entropy based method for command and control networks reconfiguration |
abstract |
Abstract Network reconfiguration is an important means of improving network invulnerability. However, most existing network reconfiguration methods fail to consider node importance, edge importance, and hierarchical characteristics, and the local and global information of command and control (C2) networks are difficult to satisfy comprehensively. Therefore, this study designed a hierarchy-entropy-based method for reconfiguring C2 networks. By combining hierarchical and operational link entropy, the probability of inter-node edge reconfiguration based on hierarchy entropy is proposed. Additionally, methods for calculating the node level-up, cross-level, and swap degrees, and a portfolio reconfiguration strategy are proposed. Finally, to validate the proposed method, a case study was simulated, and the repair probability, adjustable parameters, and reconfiguration effects of the different reconfiguration methods and modes were determined. The comparison results demonstrate that the proposed algorithm improves the reconfiguration effect and reduces the reconfiguration cost. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022 |
abstractGer |
Abstract Network reconfiguration is an important means of improving network invulnerability. However, most existing network reconfiguration methods fail to consider node importance, edge importance, and hierarchical characteristics, and the local and global information of command and control (C2) networks are difficult to satisfy comprehensively. Therefore, this study designed a hierarchy-entropy-based method for reconfiguring C2 networks. By combining hierarchical and operational link entropy, the probability of inter-node edge reconfiguration based on hierarchy entropy is proposed. Additionally, methods for calculating the node level-up, cross-level, and swap degrees, and a portfolio reconfiguration strategy are proposed. Finally, to validate the proposed method, a case study was simulated, and the repair probability, adjustable parameters, and reconfiguration effects of the different reconfiguration methods and modes were determined. The comparison results demonstrate that the proposed algorithm improves the reconfiguration effect and reduces the reconfiguration cost. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022 |
abstract_unstemmed |
Abstract Network reconfiguration is an important means of improving network invulnerability. However, most existing network reconfiguration methods fail to consider node importance, edge importance, and hierarchical characteristics, and the local and global information of command and control (C2) networks are difficult to satisfy comprehensively. Therefore, this study designed a hierarchy-entropy-based method for reconfiguring C2 networks. By combining hierarchical and operational link entropy, the probability of inter-node edge reconfiguration based on hierarchy entropy is proposed. Additionally, methods for calculating the node level-up, cross-level, and swap degrees, and a portfolio reconfiguration strategy are proposed. Finally, to validate the proposed method, a case study was simulated, and the repair probability, adjustable parameters, and reconfiguration effects of the different reconfiguration methods and modes were determined. The comparison results demonstrate that the proposed algorithm improves the reconfiguration effect and reduces the reconfiguration cost. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022 |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-TEC SSG-OLC-MAT |
container_issue |
13 |
title_short |
Hierarchy-entropy based method for command and control networks reconfiguration |
url |
https://doi.org/10.1007/s11227-022-04445-z |
remote_bool |
false |
author2 |
Chen, Bo Jiang, Panling Xiang, Zhengtao Chen, Yufeng Wang, Yunming |
author2Str |
Chen, Bo Jiang, Panling Xiang, Zhengtao Chen, Yufeng Wang, Yunming |
ppnlink |
13046466X |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1007/s11227-022-04445-z |
up_date |
2024-07-04T00:23:31.318Z |
_version_ |
1803605886966431744 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2079305239</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230506052158.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">221220s2022 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s11227-022-04445-z</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2079305239</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s11227-022-04445-z-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="a">620</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gao, Xiue</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hierarchy-entropy based method for command and control networks reconfiguration</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2022</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Network reconfiguration is an important means of improving network invulnerability. However, most existing network reconfiguration methods fail to consider node importance, edge importance, and hierarchical characteristics, and the local and global information of command and control (C2) networks are difficult to satisfy comprehensively. Therefore, this study designed a hierarchy-entropy-based method for reconfiguring C2 networks. By combining hierarchical and operational link entropy, the probability of inter-node edge reconfiguration based on hierarchy entropy is proposed. Additionally, methods for calculating the node level-up, cross-level, and swap degrees, and a portfolio reconfiguration strategy are proposed. Finally, to validate the proposed method, a case study was simulated, and the repair probability, adjustable parameters, and reconfiguration effects of the different reconfiguration methods and modes were determined. The comparison results demonstrate that the proposed algorithm improves the reconfiguration effect and reduces the reconfiguration cost.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Command and control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Network reconfiguration</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hierarchy-entropy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Complex network</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chen, Bo</subfield><subfield code="0">(orcid)0000-0002-9689-1252</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jiang, Panling</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Xiang, Zhengtao</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chen, Yufeng</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Yunming</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">The journal of supercomputing</subfield><subfield code="d">Springer US, 1987</subfield><subfield code="g">78(2022), 13 vom: 15. Apr., Seite 15229-15249</subfield><subfield code="w">(DE-627)13046466X</subfield><subfield code="w">(DE-600)740510-8</subfield><subfield code="w">(DE-576)018667775</subfield><subfield code="x">0920-8542</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:78</subfield><subfield code="g">year:2022</subfield><subfield code="g">number:13</subfield><subfield code="g">day:15</subfield><subfield code="g">month:04</subfield><subfield code="g">pages:15229-15249</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s11227-022-04445-z</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-TEC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">78</subfield><subfield code="j">2022</subfield><subfield code="e">13</subfield><subfield code="b">15</subfield><subfield code="c">04</subfield><subfield code="h">15229-15249</subfield></datafield></record></collection>
|
score |
7.3991613 |