1THAI M T,PARDALOS P M. Handbook of optimization in complex networks:theory and applications[M].{H}New York:Springer-Verlag,2012.
2HAKIMI S L. On the realizability of integers as the degrees of the vertices of a linear graph[J].{H}Journal of the society for Industrial and Applied Mathematics,1962,(10):496-506.
3CHUNG F,AIELLO W,LU L. A random graph model for power law graphs[J].Experimental Math,2001,(10):53-66.
4GENIO C I,GROSS T,BASSLER K E. All scale-free networks are sparse[J].{H}Physical Review Letters,2011,(107):178701.
5MERINGER M. Fast generation of regular graphs and construction of cages[J].{H}Journal of Graph Theory,1999,(30):137-146.
6汪小帆;李翔;陈关荣.网络科学导论[M]{H}北京:高等教育出版社,2012.
7LI L,ALDERSON D,DOYLE J C. Towards a theory of scale-free graphs:definitions,properties,and implications[J].Internet Math,2005,(02):431-523.
8SHI D H,CHEN G R,THONG W K. Optimal homogeneous networks with best possible synchronizability[A].2012.
2Kalloniatis A, Maeleod I. Formalization and agility in military headquarters planning[J]. The International C2 Journal, 2010, 4(1) : 11 - 19.
3Alberts D S. Agility, focus and convergence: adapting C2 to the 21 st century[J]. The International C2 Journal, 2007,1 ( 1 ) : 1 - 30.
4Huang S H, Wang H, Ding F, et al. On evolution of C2 net- work topology[C]//Proc, of the Control Research and Technology 15th International Command and S3nnposium, 2009 : 82 - 87.
5Manso B, Manso M. Know the network, knit the network: ap- plying SNA to N2C2 maturity model experiment[C]//Proc, of the 15th International Command and Control Research and Technology Symposium, 2009 :52 - 61.
6Williams A P. Implications of operationalizing a comprehensive approach: defining what interagency interoperability really means[J]. The International C2 Journal, 2010, 4(1) : 42 - 53.
7Deller S, Bell M I, Bowling S R, et al. Applying the information age combat model: quantitative analysis of network centric oper- ations[J]. The International C2 Journal, 2009, 3(1) : 8- 18.
8Wu J,Deng H Z,Tan Y J,et al. Vulnerability of complex net-works under intentional attack with incomplete informatlon[J]. .Journal of Physics A, 2007, 40(11): 2665- 2671.
9Tian X G, Zhu Y C, Di Y Y, et al. Study military command and control system as complex networksEC3//Proc, of IEEE Inter- national Conference on Intelligent Computing and Intelligent Systems, 2010: 870-874.
10Qu Z H. Enhancement of scale-free network attack tolerance[J]. China Physics B, 2010, 19(11): 85-89.