[1] 杨艳萍, 叶锡庆, 张明安, 等. 战场网络战基本模型研究[J]. 系统仿真学报, 2011, 23(5): 1015-1020, 1038. YANG Yan-ping, YE Xi-qing, ZHANG Ming-an, et al. Research on basic models for battlefield network war[J]. Journal of System Simulation, 2011, 23(5): 1015-1020, 1038. (in Chinese) [2] McCune J, Haworth D. Securing America against cyber war[J]. International Journal of Cyber Warfare and Terrorism, 2012, 2(1): 39-49. [3] 岳昆, 王晓玲, 周傲英. Web 服务核心支撑技术: 研究综述[J]. 软件学报, 2004, 15(3): 428-442. YUE Kun, WANG Xiao-ling, ZHOU Ao-ying. Underlying techniques for web services: a survey[J].Journal of Software, 2004, 15(3): 428-442.(in Chinese) [4] 聂凯,汪厚祥,井小沛,等. 面向服务的海战场指挥信息系统体系结 构框架[J]. 现代防御技术, 2013,41(3):88-93,110. NIE Kai, WANG Hou-xiang, JING Xiao-pei, et al. Architecture framework of service oriented C4ISR system on the naval fields[J]. Modern Defence Technology, 2013, 41(3): 88-93, 110. (in Chinese) [5] 余洋. 基于 Web Service 的车辆导航系统管理机制研究[J]. 计算机测量与控制, 2010,18 (4): 944-946. YU Yang. Technology of web service based vehicle navigation system[J].Computer Measurement & Control, 2010,18 (4): 944-946. (in Chinese) [6] Loukas G, Oke G. Protection against denial of service attacks: a survey[J]. The Computer Journal, 2010, 53(7): 1020-1037. [7] Bi X, Zheng Q. Study on network safety strategy against DDoS attack[C]∥IEEE International Conference on Advanced Management Science. Chengdu, China: IEEE, 2010: 623-627. [8] 林云, 司锡才, 周若琳. 改进灰色关联算法在辐射源识别中的应用 [J]. 通信学报, 2010, 31(8): 166-171. LIN Yun, SI Xi-cai, ZHOU Ruo-lin. Application of improved grey correlation algorithm on radiation source recognition[J]. Journal on Communications, 2010, 31(8): 166-171.(in Chinese) [9] 胡方, 黄建国, 褚福照. 基于粗糙集的武器系统灰色关联评估模型[J]. 兵工学报, 2008, 29(2): 253-256. HU Fang , HUANG Jian-guo , CHU Fu-zhao. Grey relation evaluation model of weapon system based on rough set[J]. Acta Armamentarii, 2008, 29(2): 253-256.(in Chinese) [10] 柯宏发,陈永光,夏斌. 电子战装备作战效能灰色评估模型和算法[J]. 系统仿真学报, 2005, 17(3): 760-762. KE Hong-fa , CHEN Yong-guang, XIA Bin. Grey evaluation model and algorithm of combat effectiveness[J]. Journal of System Simulation,2005, 17(3): 760-762.(in Chinese) [11] 王会梅,江亮,鲜明, 等. 计算机网络攻击效果灰色评估模型和算法[J]. 通信学报,2009, 30(11A):17-22. WANG Hui-mei, JIANG Liang, XIAN Ming,et al. Grey evaluation model and algorithm of network attack effectiveness[J]. Journal on Communications, 2009, 30(11A):17-22.(in Chinese) [12] 吴明锋,张永胜,李圆圆,等.Web服务攻击技术研究[J].计算机技术与发展, 2012, 22(1): 213-216. WU Ming-feng, ZHANG Yong-sheng,LI Yuan-yuan, et al. Research of web services attack technology[J]. Computer Technology and Development, 2012, 22(1): 213-216.(in Chinese) [13] Ma S, He J, Shuai X. Application of fuzzy comprehensive evaluation method in trust quantification[J]. International Journal of Computational Intelligence Systems, 2011, 4(5): 768-776. [14] 陈希祥, 邱静, 刘冠军. 基于层次分析法与模糊综合评判的测试设备选择方法研究[J]. 兵工学报, 2010,31 (1): 68-73. CHEN Xi-xiang, QIU Jing, LIU Guan-jun. Research on the method of test-equipment selection based on analytic hierarchy process and fuzzy comprehensive assessment[J]. Acta Armamentarii, 2010,31 (1): 68-73. (in Chinese) [15] Nortel Networks. QoS performance requirements for UMTS[R/OL].[2014-05-24]. http:∥www.3gpp.org/ftp/tsg sa/WG1 Serv/TSGS1(3GPP). [16] 苏鹏.典型攻击的攻击效果评估技术研究[D].郑州:解放军信息工程大学,2008. SU Peng. Research on attack impact assessment of representative attacks[D].Zhengzhou: The PLA Information Engineering University, 2008.(in Chinese) [17] 刘开第,庞彦军,栗文国. 多指标决策中隶属度转换算法及其应用[J]. 自动化学报,2009,35(3):315-319. LIU Kai-di, PANG Yan-jun,LI Wen-guo. Membership transforming algorithm in multi-index decision and its application[J]. Acta Automatica Sinica, 2009,35(3):315-319. (in Chinese) [18] 张堃, 周德云. 熵权与群组AHP相结合的 TOPSIS 法多目标威胁评估[J]. 系统仿真学报, 2008, 20(7): 1661-1664. ZHANG Kun, ZHOU De-yun. Application of TOPSIS based on entropy and GD-AHP in evaluating sequences of air target threat[J]. Journal of System Simulation, 2008, 20(7): 1661-1664.(in Chinese) [19] Liu S F, Xie N M. New grey evaluation method based onreformative triangular winterization weight function[J]. Journal of Systems Engineering, 2011, 26(2): 244-250. |