![网络化水声对抗技术](https://wfqqreader-1252317822.image.myqcloud.com/cover/745/656745/b_656745.jpg)
上QQ阅读APP看本书,新人免费读10天
设备和账号都新为新人
插图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0001-01.jpg?sign=1739332195-dKLi4QswWVFJRfA3SmjVMZxxBulQU7VC-0-6d0f83eef5e718f525cb7f1d0fed638b)
图1-1 赛博空间的三个层次(五个元素)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0001-02.jpg?sign=1739332195-vDhwGnI52ywMF5ANp8IQJ0p4uJG4Oks5-0-9bb6df91b0848e751f150c93fe04f630)
图2-2 典型的水声对抗态势
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0002-01.jpg?sign=1739332195-jfzazSu8YoFRbWbgyZBBwMp0X5sxVbU6-0-ac0c02716e964c4035ead2c7142c0ae6)
图3-8 PLUSNet 概念图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0002-02.jpg?sign=1739332195-QIdaZtrY5jIodmfUyM5bfjcAHXCERZWx-0-c98747ea3a407d03916e683f35754b04)
图4-2 WHOI 的AUV 反水雷浅海水声网络
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0003-01.jpg?sign=1739332195-Nau2m8AbvpBP2dQOhI4zBYx3YEt0KQzB-0-853fb68f80cbd350b89e796e4bbdb9ca)
图4-3 NEPTUNE 水下试验网络
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0003-02.jpg?sign=1739332195-qZ2hTWAIancPxj4m939Bifzqo0njhAZ1-0-7e366b6681e87d844ec83cf62479e5f1)
图4-6 网络中心战的示意图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0004-01.jpg?sign=1739332195-AgNbzJElD0mmZaFFwQN4mRjf524FxXUt-0-e5a2a69c9711373b865d6b59f2f2f77e)
图5-1 直扩信号的谱相关密度函数等高线图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0004-02.jpg?sign=1739332195-ayKk6PChAv9c1ng5yInDUxURBasxSwvC-0-5a892bad81d0488d6b2ecc160019853f)
图5-3 跳频信号的平滑伪WVD 时频分布图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0005-01.jpg?sign=1739332195-E839B36Hs9NrWIiSs9iu8Z7MmJB1dLro-0-28695f509c803a3fd26718090b01fdf3)
图5-13 特征向量提取示意图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0005-02.jpg?sign=1739332195-AFogLk4zTXCKJZMyfiEJoElvqF7fK5Op-0-da0caab54e1387d596adb66c88c24f93)
图5-26 混合信号和分离信号的时频图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0005-03.jpg?sign=1739332195-egIrmMW5Mnr57WZlfCvC4X6fMmsHvsMm-0-deff16d5badf977878fbe3383cc68f2e)
图7-1 美国海军“下一代水声对抗器材”概念图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0006-01.jpg?sign=1739332195-rCaVZhPAiDbLv0U3rnGTFrAUHScALLN4-0-83d0624dea81c7823dd40d331759e82a)
图8-6 源节点产生的数据分组数和到达指定目的节点的分组数(正常网络)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0006-02.jpg?sign=1739332195-IL4buBwh7E4MBipyPwHlmB58ZAVkiaG2-0-b7044cf94e826d13fd2179fcd740cac1)
图8-7 数据分组从其源端到目的端的时延(正常网络)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0006-03.jpg?sign=1739332195-PCH7sThLA4yx20LECz5HuBN1yGIxpQG0-0-c407d39155f1885570981e0ab30f48a4)
图8-9 源节点产生的数据分组数和到达指定目的节点的分组数(泛洪攻击)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0007-01.jpg?sign=1739332195-LBCiuCyccCrH7NRSTEmfSrXdEdWgyndY-0-78340e5649dfff9e185af79d83c918d9)
图8-10 数据分组从其源端到目的端的时延(泛洪攻击)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0007-02.jpg?sign=1739332195-KCm7vBIlDgWEFfADE602UwwJwbexFQ1T-0-14d1013fca1ea4f0df0dc0d861c07e03)
图8-12 源节点产生的数据分组数和到达指定目的节点的分组数(蠕虫洞攻击)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0007-03.jpg?sign=1739332195-73tME3wPmI1OWqsYkISMkRMmmF5adYwi-0-279fb3450b1b2be8039389a955945e2b)
图8-13 数据分组从其源端到目的端的时延(蠕虫洞攻击)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0008-01.jpg?sign=1739332195-RZJrf6RvRSRQ1wfRlUeUAVUSaQzkjls6-0-56d7493ecea4ac5700a856a4a1c3ecc6)
图8-15 源节点产生的数据分组数和到达指定目的节点的分组数(选择性转发攻击)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0008-02.jpg?sign=1739332195-d1gdfj5yre3yRTmPStNhSQm3wMERnx67-0-75e5fc409ec5a9a221feedbe6db6c69c)
图8-16 数据分组从其源端到目的端的时延(选择性转发攻击)