![网络化水声对抗技术](https://wfqqreader-1252317822.image.myqcloud.com/cover/745/656745/b_656745.jpg)
上QQ阅读APP看本书,新人免费读10天
设备和账号都新为新人
插图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0001-01.jpg?sign=1739288769-90Yr1y2uc4PyJ4dMK7eQv9Qv6KWFbWcl-0-6ec2256ff34622c4d986a3aacc69e1f6)
图1-1 赛博空间的三个层次(五个元素)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0001-02.jpg?sign=1739288769-bPVXyKua40PbpJS9ReP3FLauaDiU0Urc-0-1543a68b7980bc052b2d0c0be9126199)
图2-2 典型的水声对抗态势
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0002-01.jpg?sign=1739288769-9TWn302ipM4O2uVgKndl17U3NVS6YKBk-0-ed52610ebbc7413463b3bca82492d01c)
图3-8 PLUSNet 概念图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0002-02.jpg?sign=1739288769-NFwLfOt6vbpVilKZ6bamsZm0oC7XIQIL-0-e2725f57dfd2c0785a2a10ce0fbf1756)
图4-2 WHOI 的AUV 反水雷浅海水声网络
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0003-01.jpg?sign=1739288769-WIoAx3ARVNPvoH6XDf8KYBAL0frHEVXM-0-c7cf38e8b1f501fa5375e797941f707f)
图4-3 NEPTUNE 水下试验网络
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0003-02.jpg?sign=1739288769-z8hr5Y3dlPF5aUo71zB8n2n0DzHpPU7o-0-66c2f0616155da175eb48c8925125066)
图4-6 网络中心战的示意图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0004-01.jpg?sign=1739288769-yuz0WXunpNkaCqsmNDzg6kvVHQroVfoA-0-23e13014955bf6ab418e70e372fdd5a8)
图5-1 直扩信号的谱相关密度函数等高线图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0004-02.jpg?sign=1739288769-srz6VDXwAeojlhCejVgQoc8iMvEmK54V-0-8dce8632c21a0941ef4b16efa900b1c7)
图5-3 跳频信号的平滑伪WVD 时频分布图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0005-01.jpg?sign=1739288769-ITavciEhZKqPzvzSqPgw8koG3y0UUhgU-0-535b35fa13fabf9a525bbda17235d0da)
图5-13 特征向量提取示意图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0005-02.jpg?sign=1739288769-vvWMjhF5WSmcKwGtrv6MBE3sra7C5gMh-0-a39210d0da4d87e7de8d263035a3bf0e)
图5-26 混合信号和分离信号的时频图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0005-03.jpg?sign=1739288769-khaPgKNXB2kDaNQUIRsrMCZiOMK3QiBc-0-8032178671e821dbec5f8447d266d640)
图7-1 美国海军“下一代水声对抗器材”概念图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0006-01.jpg?sign=1739288769-LBAK5VgagKqVXzKANkCOnP7Cz1Rip4l8-0-7e3af72c0d1001dbd368cedc90e14fa4)
图8-6 源节点产生的数据分组数和到达指定目的节点的分组数(正常网络)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0006-02.jpg?sign=1739288769-5PCiPfdTz2qqZITxuAYgvhYjw8mg3bdG-0-8ceab98a225d12f0514a95c8b70907b8)
图8-7 数据分组从其源端到目的端的时延(正常网络)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0006-03.jpg?sign=1739288769-pqQK4BrFKq3cPna007zDaNwq6QJEywOj-0-cabe2537ad283338b90044dd0e8bbf36)
图8-9 源节点产生的数据分组数和到达指定目的节点的分组数(泛洪攻击)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0007-01.jpg?sign=1739288769-DoecJwa57IC9kqMHHyZdGG3347rE0K5G-0-5b9c715b39acb15dcaa253eb27f5137d)
图8-10 数据分组从其源端到目的端的时延(泛洪攻击)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0007-02.jpg?sign=1739288769-Ns6oJPxr0HgFyahhH2GX9TtuZvPVumc8-0-fe3d91767cabfe4a1629884e7acb0a92)
图8-12 源节点产生的数据分组数和到达指定目的节点的分组数(蠕虫洞攻击)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0007-03.jpg?sign=1739288769-ooCtpbZuT5qlBMQ9tqxtLsR2JuPVenm5-0-db761fa953a5709e8face93c1d770705)
图8-13 数据分组从其源端到目的端的时延(蠕虫洞攻击)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0008-01.jpg?sign=1739288769-nQOXSBknpPQFrKbBEYheWSX8jAqTKFrp-0-417d5b7d8884c7d774cdfa4a61f52aaf)
图8-15 源节点产生的数据分组数和到达指定目的节点的分组数(选择性转发攻击)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0008-02.jpg?sign=1739288769-lhQlIzZPv47XLpvNPjzKCoMxMXQWaWPq-0-00df673cd3fb5518c7c4e27a6cf3adc8)
图8-16 数据分组从其源端到目的端的时延(选择性转发攻击)