Security and Formation of Network-Centric Operations
DOI10.1007/978-3-319-18275-9_6zbMath1351.68032OpenAlexW2271197550MaRDI QIDQ2790429
Publication date: 4 March 2016
Published in: Computation, Cryptography, and Network Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-18275-9_6
network centric operationsmulti-layer graph modelnetwork centric operations-graphsnetwork centric warfare strategic formationoperational utility functionvertex pursuit game
Network design and communication in computer systems (68M10) Games involving graphs (91A43) Applications of game theory (91A80) Graph theory (including graph drawing) in computer science (68R10) Positional games (pursuit and evasion, etc.) (91A24)
Uses Software
Cites Work
- A game of cops and robbers
- An annotated bibliography on guaranteed graph searching
- A game of cops and robbers played on products of graphs
- The evolution of social and economic networks.
- A strategic model of social and economic networks
- The Average Distance in a Random Graph with Given Expected Degrees
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Security and Formation of Network-Centric Operations