![网络化水声对抗技术](https://wfqqreader-1252317822.image.myqcloud.com/cover/745/656745/b_656745.jpg)
上QQ阅读APP看本书,新人免费读10天
设备和账号都新为新人
插图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0001-01.jpg?sign=1739555516-NC9rJJJMDadnlbs8KtoTizlXfgpiWjiV-0-d5042d3ab15b19ba72ae111e2ac57562)
图1-1 赛博空间的三个层次(五个元素)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0001-02.jpg?sign=1739555516-Pl1DEwGtEIWfRKEgufsB3ggYteH5NV5C-0-5c50938850f9f9b5909a7a77fb8ad2d3)
图2-2 典型的水声对抗态势
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0002-01.jpg?sign=1739555516-6KN1lVIxXMU8Qpkg1jIxBdXRBgLC1AFc-0-4fcdd715c0a1a039169eadff3d34405a)
图3-8 PLUSNet 概念图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0002-02.jpg?sign=1739555516-4IEkX8JEJjdRIabVnMZci8E142vr5fkh-0-d2330aebc39e60ede89b52d9d2f84f49)
图4-2 WHOI 的AUV 反水雷浅海水声网络
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0003-01.jpg?sign=1739555516-AmmboRajslWhdoq40aaSyUU8QSanIKNY-0-9d4380c7b9403c4a0400de4220a29e3c)
图4-3 NEPTUNE 水下试验网络
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0003-02.jpg?sign=1739555516-ZVcEzBvpwhjy8qgFqSZhldJrwXWrceTZ-0-c4b7fe2c5ed62723e5403969f12cd69c)
图4-6 网络中心战的示意图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0004-01.jpg?sign=1739555516-WBUJMbiJeOPTynoj27IwWrAJF3UDiSNZ-0-cd9412d1be2e4083564b10a525313a4e)
图5-1 直扩信号的谱相关密度函数等高线图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0004-02.jpg?sign=1739555516-iYzxzj3ME4P6MwFchILXibOX1RDLXhva-0-2a7e98585ed0696940e622ba33ba38bf)
图5-3 跳频信号的平滑伪WVD 时频分布图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0005-01.jpg?sign=1739555516-vsjlLtrHbv4oxO8crOlGu2FU1p8SZvE9-0-88818379b31e13057195f19f46fb872e)
图5-13 特征向量提取示意图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0005-02.jpg?sign=1739555516-w14bv46vOf0MATpBVMyDEyplrdAM3H4I-0-9970a1baea4e0b8393b45fbe4c459f97)
图5-26 混合信号和分离信号的时频图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0005-03.jpg?sign=1739555516-cc9FlOinwwnqtouNY60dZIpad4uCJUqy-0-6d82e914192042f0d742fd9efc4af7f0)
图7-1 美国海军“下一代水声对抗器材”概念图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0006-01.jpg?sign=1739555516-h0ohS8i8zZ746yuARygUSC2OHeKQddiV-0-8086adc73b90232638c987e3bc0ffae5)
图8-6 源节点产生的数据分组数和到达指定目的节点的分组数(正常网络)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0006-02.jpg?sign=1739555516-jTBPpREDjF3kFr1WwmyB3nlSQypkn1tJ-0-c82afadbe5f3eebf540a0f70b1433ee4)
图8-7 数据分组从其源端到目的端的时延(正常网络)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0006-03.jpg?sign=1739555516-VS8WXTWOkTZuX32VyaCBtWPu0UhQ81WE-0-8d681c5a4a0a3435a1de97b3cfe0daff)
图8-9 源节点产生的数据分组数和到达指定目的节点的分组数(泛洪攻击)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0007-01.jpg?sign=1739555516-yQz0fKYdIkerOCQO4BTjHgeHMo3i6exg-0-eb6b4023f8581ce1ba3317e65e52f9cd)
图8-10 数据分组从其源端到目的端的时延(泛洪攻击)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0007-02.jpg?sign=1739555516-eh0as3wwR4121hc5BKOgUJZ8KQ6mjmMJ-0-0d4ecd140897e31ceb16defa412493f3)
图8-12 源节点产生的数据分组数和到达指定目的节点的分组数(蠕虫洞攻击)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0007-03.jpg?sign=1739555516-OfOau6GppbN9zvPRmNk5pt2wPCSQtHgp-0-0ee44945ead00187d6d9747113165d69)
图8-13 数据分组从其源端到目的端的时延(蠕虫洞攻击)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0008-01.jpg?sign=1739555516-wzZSRrQ5qEoqycrZYpAI0xUe0rCgScU2-0-214dc9bfe5f132d112d84c6d26b312a8)
图8-15 源节点产生的数据分组数和到达指定目的节点的分组数(选择性转发攻击)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0008-02.jpg?sign=1739555516-8FsenJDqFDYEC2BooHf6bpehSBGUQcSu-0-86e1b19b212417adc6126ad46e8bf2cc)
图8-16 数据分组从其源端到目的端的时延(选择性转发攻击)