[1] |
J. M . Box-Steffensmeier,“A Dynamic Analysis of the Role of War Chests in Campaign Strategy,” American Journal of Political Science, Vol. 40, No. 2, pp. 352-371, 1996
|
[2] |
G. Hughes , “Militias in Internal Warfare: From the Colonial Era to the Contemporary Middle East,” Small Wars & Insurgencies, Vol. 27, No. 2, pp. 196-225, 2004
doi: 10.1080/09592318.2015.1129171
|
[3] |
B. Kousalya and T. Vasanthi ,“Protection of k-out-of-n Systems Under Intentional Attacks Using Imperfect False Elements,” International Journal of Performability Engineering,Vol. 9, No. 5, pp. 529-537, 2013
|
[4] |
J. Zhang , “Research on the Financial Resources Mobilization of the Modern War,” Journal of Academy of Equipment, Vol. 20, No. 3, pp. 30-34, 2013
|
[5] |
S. Wang, B. Ye, Y. Tan , “Research of National-Defense Mobilization Resources Management Information System,” Computer Knowledge & Technology, Vol. 8, No. 18, pp. 4314-4316, 2012
|
[6] |
S. Iver and T. Killingback , “Evolutionary Dynamics of a Smoothed War of Attrition Game,” Journal of Theoretical Biology,Vol. 396, pp. 25-41, 2016
doi: 10.1016/j.jtbi.2016.02.014
pmid: 26903203
|
[7] |
G. Levitin and K. Hausken , “Preventive Strike vs. False Targets and Protection inDefenseStrategy,” Reliability Engineering & System Safety, Vol. 96, No. 8, pp. 912-924, 2011
doi: 10.1016/j.ress.2011.03.008
|
[8] |
L. Liua, J. Yua, G. Zhi , “A Kind of Stochastic Duel Model for Guerrilla War ☆,” European Journal of Operational Research, Vol. 171, No. 2, pp. 430-438, 2006
doi: 10.1016/j.ejor.2004.09.032
|
[9] |
R. Peng, Q. Zhai, G. Levitin , “Defending a Single Object Against an Attacker Trying to Detect a Subset of False Targets,” Reliability Engineering & System Safety, Vol. 149, pp. 137-147, 2016
doi: 10.1016/j.ress.2016.01.002
|
[10] |
D. Wu, H. Xiao, R. Peng , “Object Defense with Preventive Strike and False Targets,” Reliability Engineering & System Safety, Vol. 169,pp. 76-80, 2018
|
[11] |
J. Herington, A. Lane, N. Corrigan, J. A. Golightly , “Campaign Analysis: Representation of Historical Events In a Military Campaign Simulation Model,” in Proceedings of the Winter Simulation Conference,San Diego, CA, USA, 2002
doi: 10.1109/WSC.2002.1172971
|
[12] |
B. Taylor and A. Lane ,“Development of a Novel Family of Military Campaign Simulation Models,” Journal of the Operational Research Society,Vol. 55, No. 4, pp. 333-339, 2004
doi: 10.1057/palgrave.jors.2601714
|
[13] |
H. Jiang , “Exploring the Effects of Group Interaction in Large Display Systems,” International Journal of Performability Engineering, Vol. 14, No. 1, pp. 159-167, 2018
|
[14] |
C. Wang, L. Xing, R. Peng, Z. Pan , “Competing Failure Analysis in Phased-Mission Systems with Multiple Functional Dependence Groups,” Reliability Engineering & System Safety,Vol. 164, pp. 24-33, 2017
doi: 10.1016/j.ress.2017.02.006
|
[15] |
W. Yan and L. Li ,“An Analytical Method for Dynamic Evolution of Attack Process based on Markov Game,” International Journal of Performability Engineering,Vol. 13, No. 5, pp. 763-774, 2017
|