Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Advancing Network Securing Strategies with Network Algorithms for Integrated Air Defense System (IADS) Missile Batteries

Version 1 : Received: 17 March 2023 / Approved: 20 March 2023 / Online: 20 March 2023 (02:31:39 CET)

A peer-reviewed article of this Preprint also exists.

Pran, R. H. (2023). Advancing Network Securing Strategies with Network Algorithms for Integrated Air Defense System (IADS) Missile Batteries. J Electrical Electron Eng, 2(3), 217-238. Pran, R. H. (2023). Advancing Network Securing Strategies with Network Algorithms for Integrated Air Defense System (IADS) Missile Batteries. J Electrical Electron Eng, 2(3), 217-238.

Abstract

Recently, the Integrated Air Defense System (IADS) has become vital for the defense system as the military defense system is vital for national security. Placing Integrated Air Defense System batteries among locations to protect locations assets is a crucial problem because optimal solutions are needed for interceptor missiles to intercept attacker missiles for maximizing protection of assets across locations or places. In this research, the procedures of using network algorithms along with developing several network algorithms are going to be demonstrated to develop a model for sequential development of seven network securing strategies of placing Surface to Air Missile (SAM) batteries to maximize the protection of assets across locations (based on given asset values) by generating optimal solutions through computation to destroy maximum attacker missiles by using minimum interceptor missiles with given intercept probability. This network securing strategies can be implemented not only for Integrated Air Defense System (IADS) planning but also Counter Air (CA) planning as Integrated Air Defense System (IADS) is conducted with defensive counter air supported by attack operations in offensive counter air.

Keywords

Integrated Air Defense System (IADS); network algorithms; network clustering; network centralities; small worldness; network data generation; network analysis; big data computation; regression analysis

Subject

Engineering, Other

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.