[1]
Sun Mingyi, Yang Liping. Tactical Data Links in Information Based Warfare [M]. Beijing: Post University Press, (2005).
Google Scholar
[2]
Wang Xiuhua, Wei Xin, Wang Haiyan. Network centric warfare analysis of US Army[J]. Lecture Notes in Electrical Engineering, 2012, vol. 36, pp: 573-578.
DOI: 10.1007/978-3-642-26001-8_74
Google Scholar
[3]
LIU Xing, CHEN Chen, ZHOU Jin-lun, LUO Peng-cheng. An Essential-Task-Based Methodology for Development and Analysis of Information Exchange Requirements in Tactical Data Link [J]. Journal of Convergence Information Technology (JCIT), 2012, vol. 7, pp: 284-291.
DOI: 10.4156/jcit.vol7.issue6.34
Google Scholar
[4]
YAN Zhao-lin, HE Zhao-xiong, LUO Xu-hui, LI Hai-yan. Towards Fixed Allocation Timeslot Number Prediction Method for TDMA Tactical Data Link based on Operation Requirements. International Journal of Advancements in Computing Technology [J]. 2011, vol. 3, pp: 57-64.
DOI: 10.4156/ijact.vol3.issue6.8
Google Scholar
[5]
Folks, R. L. Network Centric Warfare in the Age of Cyberspace Operations[J] . Army War Coll., Carlisle Barracks, PA. 2011, vol. 5, pp: 34.
DOI: 10.21236/ada555809
Google Scholar
[6]
Baskarada, S. Towards a Semiotic Information Position Framework for Network Centric Warfare [J]. Defence Science and Technology Organisation, Victoria (Australia). 2011, vol. 6, pp: 36.
DOI: 10.2139/ssrn.2142975
Google Scholar
[7]
Rhee, Seung Hyong, Kim, Hwa-Sung; Sohn, Seung-Won. The effect of decentralized resource allocation in network-centric warfare[C]. International Conference on Information Networking, 2012, pp: 478-481.
DOI: 10.1109/icoin.2012.6164447
Google Scholar
[8]
Casalicchio E, Galli E, Tucci S , Agent-based modelling of interde-pendent critical infrastructures[J]. International Journal of System of Systems Engineering, 2010, vol. 2, pp : 60-75.
DOI: 10.1504/ijsse.2010.035381
Google Scholar
[9]
Wang, H., Zhu, L., Mao, S., Xu, B. Research on Information Sharing Method for Future C2 in Network Centric Environment. Nanjing Research Inst. of Electronics Engineering (China). 2011, vol. 6, pp: 33.
Google Scholar
[10]
Saarelainen, Tapio, Timonen, Jussi . Tactical management in near real-time systems[C]. 2011 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, CogSIMA 2011, pp: 240-247.
DOI: 10.1109/cogsima.2011.5753452
Google Scholar
[11]
Li Fuqiang, Xu Yue. Comprehensive Application Research on Multiple Overseas Data Links [J] Modern Electronic Technology. 2010, vol. 327, pp: 96-100.
Google Scholar
[12]
Wu Zhuhua. Analyzing on Cloud Computing Core Technology [M]. Beijing: People's Post Press , (2011).
Google Scholar
[13]
Ge Junwei, Zhang Bo, Fang Yiqiu. Study on resource monitoring model in cloud computing environment[J]. Computer Engineering, 2011, vol. 37, pp : 31-34.
Google Scholar
[14]
Xie Haohui, Gao Ji. Research and implementation of PaaS platform based on norm-governed and policy-driven autonomic mode[J]. Application Research of Computers, 2011, vol. 28( 5) , pp: 1839-1842.
Google Scholar
[15]
MELL P, GRANCE T. The NIST Definition of Cloud Computing[R]. National Institute of Standards and Technology, (2011).
Google Scholar
[16]
M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, M. Zaharia. Above the Clouds: A Berkeley View of Cloud computing, University of California at Berkley, USA, (2009).
DOI: 10.1145/1721654.1721672
Google Scholar
[17]
FOSTER I, ZHAO Y, RAICU I, et al. Cloud computing and grid computing 360-degree compared Proceedings of Grid Computing Environment s Worksho, November 12216, 2008, Austin, TX, USA: 1210.
DOI: 10.1109/gce.2008.4738445
Google Scholar
[18]
VAQUERO L M, RODERO2MERINO L, CACERES J, et al . A break in the clouds: towards a cloud definition. ACM SIGCOMM Computer Communication Review, 2009, vol. 39 (1), pp : 50-55.
DOI: 10.1145/1496091.1496100
Google Scholar
[19]
RITTINGHOUSE J W, RANSOME J F. Cloud computing: implementation, management, and security. Boca Raton, FL, USA: CRC Press, (2010).
Google Scholar
[20]
Wu Jiyi; Shen Qianli; Zhang Jianlin; Shen Zhonghua; Ping Lingdi. Cloud Computing: From Cloud Security to Credible Cloud [J] Computer Research and Development, 2011, vol. S1, pp: 53-61.
Google Scholar
[21]
Mazda Salmanian1, Li Pan2, Jiangxin Hu2, and Ming Li. On the Efficiency of Establishing and Maintaining Security Associations in Tactical MANETs in Group Formation [C]. The 2011 Military Communications Conference . 2011, pp: 1176-1182.
DOI: 10.1109/milcom.2011.6127459
Google Scholar
[22]
Chen Kang, Zheng Weimin. Cloud Computing: System Example and Research Status [J]. Software Journal, 2009, vol. 20 (5), pp: 1337−1348.
Google Scholar