![网络化水声对抗技术](https://wfqqreader-1252317822.image.myqcloud.com/cover/745/656745/b_656745.jpg)
上QQ阅读APP看本书,新人免费读10天
设备和账号都新为新人
插图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0001-01.jpg?sign=1738886885-yQnb7wgQZxCSo6SUL4Uq1XZtMfaDcvJt-0-39362b2aab78c2a699742558744f995d)
图1-1 赛博空间的三个层次(五个元素)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0001-02.jpg?sign=1738886885-wIQA70Wiqz2MwXNdKdE4pMqTRe5R23iL-0-81ba7319ad51ef70b2199fab85b8cd13)
图2-2 典型的水声对抗态势
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0002-01.jpg?sign=1738886885-gxswu40EmzG4jqeIZfXfiVvysnyWCI55-0-fe53103f5882fb1fdbd1a619e500c421)
图3-8 PLUSNet 概念图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0002-02.jpg?sign=1738886885-OaPomORO4KOM0FgcuCCimbeGfkvLJdWX-0-301f8f35ca143d23bb19f93917f7aea4)
图4-2 WHOI 的AUV 反水雷浅海水声网络
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0003-01.jpg?sign=1738886885-hWM9fy5FQiYocWrRSWG5Yx2JfsOx2h5s-0-bdf5c54b878b515bf3f06a157f84ae87)
图4-3 NEPTUNE 水下试验网络
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0003-02.jpg?sign=1738886885-9sUdDKMqnSWOyBjOgaG3xKWclF06rfpe-0-19255d522f70960fa9394ad10604881a)
图4-6 网络中心战的示意图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0004-01.jpg?sign=1738886885-YxJLtlqXen41LkKV3ZSt6JkKxhIzqxWK-0-db7800557bc4ac3f226927c07f497dfa)
图5-1 直扩信号的谱相关密度函数等高线图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0004-02.jpg?sign=1738886885-DWPShY0rjz7GThEURQfvNEyIO9D8Jzc6-0-5c66cce62850fc0f9bef7ef08b658c5c)
图5-3 跳频信号的平滑伪WVD 时频分布图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0005-01.jpg?sign=1738886885-MGt1Q8SFDaHm4DnrrEbAlM3TLWb0NXf1-0-610121c69d23513062e9bf5b819bf436)
图5-13 特征向量提取示意图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0005-02.jpg?sign=1738886885-FdOgVyLObrsLOYxovzsYZ26hCjzVxeO8-0-3b12da1b9ee6b83f31602248f47d0559)
图5-26 混合信号和分离信号的时频图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0005-03.jpg?sign=1738886885-KbLzaiIjAMOxuT9Cpf5wLl890Y56TfP7-0-b30a2aef1da5eb1651d74ca796636d10)
图7-1 美国海军“下一代水声对抗器材”概念图
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0006-01.jpg?sign=1738886885-a4TNOwkJGK8ed2u32iJhyRLySULR7JoA-0-6c76ca89dd2e94ae615fff9684b2833f)
图8-6 源节点产生的数据分组数和到达指定目的节点的分组数(正常网络)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0006-02.jpg?sign=1738886885-hfrXm7BYnpTtcyHzNtHK1qN2WhOkWsjE-0-00740595a29f39bdbdd08aed1bcce09c)
图8-7 数据分组从其源端到目的端的时延(正常网络)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0006-03.jpg?sign=1738886885-zW3nmuEr2n55CEVStCxWjzHhRjdWyId9-0-999b41e68b6bee2430462382043cef79)
图8-9 源节点产生的数据分组数和到达指定目的节点的分组数(泛洪攻击)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0007-01.jpg?sign=1738886885-xMnQ3OkX27nnjwfYKOuRrb0sV9lI55Q2-0-a0e4695a4ec717e0c1db967d63c35dc9)
图8-10 数据分组从其源端到目的端的时延(泛洪攻击)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0007-02.jpg?sign=1738886885-9ROyCf0Y0NFU4r0fEerOCmsHf7GhrIJ2-0-1a08de04b140ae60cc82c069149bf744)
图8-12 源节点产生的数据分组数和到达指定目的节点的分组数(蠕虫洞攻击)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0007-03.jpg?sign=1738886885-z8ZJuxWyaItplnnLjIkkAQQ9c6bnpclt-0-39eec44f950c98ff1b10da398f904848)
图8-13 数据分组从其源端到目的端的时延(蠕虫洞攻击)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0008-01.jpg?sign=1738886885-djSAhENn5K7U2Wp95X3z7t8qZVFYkLLI-0-6d8385b1871d24587ba8327fa4354385)
图8-15 源节点产生的数据分组数和到达指定目的节点的分组数(选择性转发攻击)
![](https://epubservercos.yuewen.com/C47F80/3590318503127301/epubprivate/OEBPS/Images/Figure-0008-02.jpg?sign=1738886885-CfYIwGSdiu1F8JqncrEBYwtfiSyrEeub-0-7c44b06d64e0583a62657ab49b4b27ad)
图8-16 数据分组从其源端到目的端的时延(选择性转发攻击)