Abstract
After giving definitions and background information of key terms, we report and analyze the multi-layer graph model of network centric operations (NCOs), and we mention its advantages. Moreover, we investigate security problem of NCOs by applying methods of vertex pursuit games. Finally, in Sect. 6 we take up with the problem of network centric warfare strategic formation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Douglas B. West, Introduction to Graph Theory. Upper Saddle River, NJ: Prentice Hall, 2001.
References
Aigner, M., Fromme, M.: A game of cops and robbers. Discrete Appl. Math. 8, 1–12 (1984)
Alberts, D.S., Garstka, J.J., Stein, F.P.: Network Centric Warfare: Developing and Leveraging Information Superiority, 2nd edn. (Revised). CCRP Publication Series, Washington (2002)
Alspach, B.: Sweeping and searching in graphs: a brief survey. Matematiche 59, 5–37 (2006)
Blume, L., Easley, D., Kleinberg, J., Kleinberg, R., Tardos, E.: Network formation in the presence of contagious risk. In: Proceedings of the 12th ACM Conference on Electronic Commerce, pp. 1–10 (2011)
Bonato, A.: A Course on the Web Graph. American Mathematical Society Graduate Studies Series in Mathematics. American Mathematical Society, Providence (2008)
Bonato, A., Hahn, G., Wang, C.: The cop density of a graph. Contrib. Discret. Math. 2, 133–144 (2007)
Bonato, A., PraΓat, P., Wang, C.: Pursuit-evasion in models of complex networks. Internet Math. 4(4), 299–436 (2007)
Bonato, A., PraΓlat, P., Wang, C.: Vertex pursuit games in stochastic network models. In: Proceedings of the 4th Workshop on Combinatorial and Algorithmic Aspects of Networking (2007)
Borgatti, S.P., Everett M.G., Freeman, L.C.: UCINET user’s manual. Analytic Technologies, Harvard (2006)
Chung, F.R.K., Lu, L.: Complex Graphs and Networks. American Mathematical Society, Providence (2004)
Chung, F.R.K., Lu, L.: The average distance in a random graph with given expected degrees. Internet Math. 1, 91–114 (2006)
Jackson, M.O.: Social and Economic Networks. Princeton University Press, Princeton (2008)
Jackson, M.O., Watts, A.: The evolution of social and economic networks. J. Econ. Theory 106, 265–295 (2002)
Jackson, M.O., Wolinsky, A.: A strategic model of social and economic networks. J. Econ. Theory 71(0108), 44–74 (1996)
Fomin, F.V., Thilikos, D.: An annotated bibliography on guaranteed graph searching. Theor. Comput. Sci. 399, 236–245 (2008)
Gao, J., Buldyrev, S.V., Stanley, H.E., Havlin, S.: Networks formed from interdependent networks. Nat. Phys. 8, 40–48 (2012)
Goyal S., Vigier A.: Robust networks. Working Paper (2011)
Hahn, G.: Cops, robbers and graphs. Tatra Mt. Math. Publ. 36, 163–176 (2007)
Hanneman R.A., Riddle, M.: Introduction to Social Network Methods. University of California, Riverside. http://faculty.ucr.edu/~hanneman/ (2005). Accessed 9 July 2006
Kearns, M., Judd, S., Vorobeychik, Y.: Behavioral experiments on a network formation game. In: Proceedings of the 13th ACM Conference on Electronic Commerce, pp. 690–704 (2012)
Network Centric Operations Conceptual Framework. Version 1.0, November 2003, http://www.dtic.mil/dtic/tr/fulltext/u2/a457620.pdf
Neufeld, S., Nowakowski, R.: A game of cops and robbers played on products of graphs. Discret. Math. 186, 253–268 (1998)
Nowakowski, R., Winkler, P.: Vertex to vertex pursuit in a graph. Discret. Math. 43, 230–239 (1983)
Quilliot, A.: Jeux et pointes fixes sur les graphes. Ph.D. Dissertation, Universit\(\iota\) de Paris VI (1978)
Schneider, C.M., Araujo, N.A.M., Havlin, S., Herrmann, H.J.: Toward designing robust coupled networks, arXiv:1106.3234 [condmat. stat-mech] (2011)
Shahrivar, E.M., Sundaram, S.: Strategic multi-layer network formation. In: 52nd IEEE Conference on Decision and Control, Florence, pp. 582–587, 10–13 December 2013
West, D.B.: Introduction to Graph Theory. Prentice Hall, Upper Saddle River (2001)
Wilson, C.: Network centric warfare: background and oversight issues for Congress. Congressional Research Service, The Library of Congress. http://www.fas.org/sgp/crs/natsec/RL32411.pdf (2007)
Wong-Jiru, A.: Major, USAF, graph theoretical analysis of network centric operations using multi-layer models. Thesis, Air Force Institute of Technology, Department of the Air Force, Air University, Wright-Patterson Air Force Base, Ohio (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Daras, N.J. (2015). Security and Formation of Network-Centric Operations. In: Daras, N., Rassias, M. (eds) Computation, Cryptography, and Network Security. Springer, Cham. https://doi.org/10.1007/978-3-319-18275-9_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-18275-9_6
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-18274-2
Online ISBN: 978-3-319-18275-9
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)