![网络化水声对抗技术](https://wfqqreader-1252317822.image.myqcloud.com/cover/745/656745/b_656745.jpg)
上QQ阅读APP看本书,新人免费读10天
设备和账号都新为新人
插图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0001-01.jpg?sign=1739617222-J6ov0Ytf1oT3PWcrd9ecW4PRSlJRd1G6-0-23a20e091d2aca2367cb373fadeb05ec)
图1-1 赛博空间的三个层次(五个元素)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0001-02.jpg?sign=1739617222-L8azOPzfM6QdLhX8pRzA9MUWjQ0daP3C-0-363daf3a1c031b449b1fc9ff30474799)
图2-2 典型的水声对抗态势
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0002-01.jpg?sign=1739617222-HauyHtO4syNlzPq7W0fSc9pbqQjYhjQG-0-1cbfbf60b21daea2dee73a3a995b8ba5)
图3-8 PLUSNet 概念图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0002-02.jpg?sign=1739617222-ZIs8mbG4jvFqahUBDh6cRUcgaoC1RM8C-0-970412a5a843ef1a3650379d49767a37)
图4-2 WHOI 的AUV 反水雷浅海水声网络
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0003-01.jpg?sign=1739617222-0is4ufP4WsOqvZPe0BWifnwHLf0JGgZq-0-5df7e5ae3c3007f164c1fe86bb3fecf9)
图4-3 NEPTUNE 水下试验网络
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0003-02.jpg?sign=1739617222-A6yzrd8FkcPWTXiHfUFO81tCksfIHe0r-0-a1016b2de8705cf026589da8653a2606)
图4-6 网络中心战的示意图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0004-01.jpg?sign=1739617222-ZfRjwK9ezHo6H4IXZhOEySTv5W1gi4ZZ-0-ab85d1a697f7c7a51ce1a6e18edc1089)
图5-1 直扩信号的谱相关密度函数等高线图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0004-02.jpg?sign=1739617222-ApN629DTFNVENCKg5H2dxplzDZ32GkDd-0-5ac6315b2f09b4e7fe72cb0fd78a95ce)
图5-3 跳频信号的平滑伪WVD 时频分布图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0005-01.jpg?sign=1739617222-WGFqdZ8Ha1D48nf8Gbb3j4KIhU6WCMwd-0-f62eb1f42980641386b70d8cbc07ab42)
图5-13 特征向量提取示意图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0005-02.jpg?sign=1739617222-EuIue2bsOWnONOfnXiCdf6QxJ8WZ1K09-0-2218f26becdb5ce33260507834696cda)
图5-26 混合信号和分离信号的时频图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0005-03.jpg?sign=1739617222-y1btbAR93p2gskAZ7tWQ7oXUdfprpXpX-0-fc0cb85e5a94a6a1d43422bf895e645c)
图7-1 美国海军“下一代水声对抗器材”概念图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0006-01.jpg?sign=1739617222-rOYUK09EPxFXdRGI80zBDLgmRxoFxGlH-0-b829da676f71d3269ab1864f9e3114a4)
图8-6 源节点产生的数据分组数和到达指定目的节点的分组数(正常网络)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0006-02.jpg?sign=1739617222-mpxUO1NoTAHz568dMwi6Am5AjM8XoVot-0-a45507e5a8077be6f9167b74ae21fd98)
图8-7 数据分组从其源端到目的端的时延(正常网络)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0006-03.jpg?sign=1739617222-rqIb6sm8G1DIhlP9ePoEgrfLeqZ1ENB3-0-8c0e31cf8d001c43ad4633c6201ab5bd)
图8-9 源节点产生的数据分组数和到达指定目的节点的分组数(泛洪攻击)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0007-01.jpg?sign=1739617222-Kj8QFhEWtX0lnDyasB9wyobn0HBD1CX1-0-c45b36f79070a0f2a0fde206c1511181)
图8-10 数据分组从其源端到目的端的时延(泛洪攻击)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0007-02.jpg?sign=1739617222-YzXLh1TbAAPVi25gcERDpMYdbC6laZFg-0-8f4fae29010444cf3cab94a7b3e571a5)
图8-12 源节点产生的数据分组数和到达指定目的节点的分组数(蠕虫洞攻击)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0007-03.jpg?sign=1739617222-dRFafQO5xwMcuzUw4AryW9Xf1IuqKik0-0-cbbc40bee315d6af0da706989fdb5e76)
图8-13 数据分组从其源端到目的端的时延(蠕虫洞攻击)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0008-01.jpg?sign=1739617222-t7dtrjLMFrRkgmH1gneImrnLzeP7IKWK-0-1d70379af66d78fbcf71d8d880ef2a86)
图8-15 源节点产生的数据分组数和到达指定目的节点的分组数(选择性转发攻击)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0008-02.jpg?sign=1739617222-fLKPXeg4xNkNXVuiR8wH62D0869iPwbm-0-2cba12e63010d70459a2ede4d1ca93bb)
图8-16 数据分组从其源端到目的端的时延(选择性转发攻击)