| [1] 杨艳萍, 叶锡庆, 张明安, 等. 战场网络战基本模型研究[J]. 系统仿真学报, 2011, 23(5): 1015-1020, 1038. YANG Yan-ping, YE Xi-qing, ZHANG Ming-an, et al. Research on basic models for battlefield network war[J]. Journal of System Simulation, 2011, 23(5): 1015-1020, 1038. (in Chinese)
 [2] McCune  J, Haworth D. Securing America against cyber war[J]. International Journal of Cyber Warfare and Terrorism, 2012, 2(1):  39-49.
 [3] 岳昆, 王晓玲, 周傲英. Web 服务核心支撑技术: 研究综述[J]. 软件学报,  2004, 15(3): 428-442.
 YUE Kun, WANG Xiao-ling, ZHOU Ao-ying. Underlying techniques for web services: a survey[J].Journal of Software, 2004, 15(3): 428-442.(in Chinese)
 [4] 聂凯,汪厚祥,井小沛,等. 面向服务的海战场指挥信息系统体系结 构框架[J]. 现代防御技术, 2013,41(3):88-93,110.
 NIE Kai, WANG Hou-xiang, JING Xiao-pei, et al. Architecture framework of service oriented C4ISR system on the naval fields[J]. Modern Defence Technology, 2013, 41(3): 88-93, 110. (in Chinese)
 [5] 余洋. 基于 Web Service 的车辆导航系统管理机制研究[J]. 计算机测量与控制, 2010,18 (4): 944-946.
 YU Yang. Technology of web service based vehicle navigation system[J].Computer Measurement & Control, 2010,18 (4): 944-946. (in Chinese)
 [6] Loukas G, Oke G. Protection against denial of service attacks: a survey[J]. The Computer Journal, 2010, 53(7): 1020-1037.
 [7] Bi X, Zheng Q. Study on network safety strategy against DDoS attack[C]∥IEEE International Conference on Advanced Management Science. Chengdu, China:  IEEE, 2010: 623-627.
 [8] 林云, 司锡才, 周若琳. 改进灰色关联算法在辐射源识别中的应用 [J]. 通信学报, 2010, 31(8): 166-171.
 LIN Yun, SI Xi-cai, ZHOU Ruo-lin.  Application of improved grey correlation algorithm on radiation source recognition[J]. Journal on Communications, 2010, 31(8): 166-171.(in Chinese)
 [9] 胡方, 黄建国, 褚福照. 基于粗糙集的武器系统灰色关联评估模型[J].  兵工学报, 2008, 29(2): 253-256.
 HU Fang , HUANG Jian-guo , CHU Fu-zhao. Grey relation evaluation model of weapon system based on rough set[J]. Acta Armamentarii, 2008, 29(2): 253-256.(in Chinese)
 [10] 柯宏发,陈永光,夏斌. 电子战装备作战效能灰色评估模型和算法[J]. 系统仿真学报,  2005, 17(3): 760-762.
 KE Hong-fa , CHEN Yong-guang, XIA Bin. Grey evaluation model and algorithm of combat effectiveness[J]. Journal of System Simulation,2005, 17(3): 760-762.(in Chinese)
 [11] 王会梅,江亮,鲜明, 等. 计算机网络攻击效果灰色评估模型和算法[J]. 通信学报,2009, 30(11A):17-22.
 WANG Hui-mei, JIANG Liang, XIAN Ming,et al. Grey evaluation model and algorithm of network attack effectiveness[J]. Journal on Communications, 2009, 30(11A):17-22.(in Chinese)
 [12] 吴明锋,张永胜,李圆圆,等.Web服务攻击技术研究[J].计算机技术与发展, 2012, 22(1): 213-216.
 WU Ming-feng, ZHANG Yong-sheng,LI Yuan-yuan, et al. Research of web services attack technology[J]. Computer Technology and Development, 2012, 22(1): 213-216.(in Chinese)
 [13] Ma S, He J, Shuai X. Application of fuzzy comprehensive evaluation method in trust quantification[J]. International Journal of Computational Intelligence Systems, 2011, 4(5): 768-776.
 [14] 陈希祥, 邱静, 刘冠军. 基于层次分析法与模糊综合评判的测试设备选择方法研究[J]. 兵工学报, 2010,31 (1): 68-73.
 CHEN Xi-xiang, QIU Jing, LIU Guan-jun. Research on the method of test-equipment selection based on analytic hierarchy process and fuzzy comprehensive assessment[J]. Acta Armamentarii, 2010,31 (1): 68-73. (in Chinese)
 [15] Nortel Networks. QoS performance requirements for UMTS[R/OL].[2014-05-24]. http:∥www.3gpp.org/ftp/tsg sa/WG1 Serv/TSGS1(3GPP).
 [16] 苏鹏.典型攻击的攻击效果评估技术研究[D].郑州:解放军信息工程大学,2008.
 SU Peng. Research on attack impact assessment of representative attacks[D].Zhengzhou: The PLA Information Engineering University, 2008.(in Chinese)
 [17] 刘开第,庞彦军,栗文国. 多指标决策中隶属度转换算法及其应用[J]. 自动化学报,2009,35(3):315-319.
 LIU Kai-di, PANG Yan-jun,LI Wen-guo. Membership transforming algorithm in multi-index decision and its application[J]. Acta Automatica Sinica, 2009,35(3):315-319. (in Chinese)
 [18] 张堃, 周德云. 熵权与群组AHP相结合的 TOPSIS 法多目标威胁评估[J]. 系统仿真学报, 2008, 20(7): 1661-1664.
 ZHANG Kun, ZHOU De-yun. Application of TOPSIS based on entropy and GD-AHP in evaluating sequences of air target threat[J]. Journal of System Simulation, 2008, 20(7): 1661-1664.(in Chinese)
 [19] Liu S F, Xie N M. New grey evaluation method based onreformative triangular winterization weight function[J]. Journal of Systems Engineering, 2011, 26(2): 244-250.
 |