[1] Maybury M T. Air force cyber vision 2025[Z/OL]. [2015-05-05]. http://cybernyalliance.ogr/wpcontent/uploads/2012/08/CyberVision2025MarkMarburyBrief18-Jul12.pdf.
[2] Wang G Q, Gu Q F, Wang M, et al. Research on the architecture technology for new generation integrated avionics aystem[J]. Acta Aeronautica et Astronautica Sinica, 2014, 35(6): 1473-1486 (in Chinese). 王国庆, 谷青范, 王淼, 等. 新一代综合化航空电子系统构架技术研究[J]. 航空学报, 2014, 35(6): 1473-1486.
[3] Ji C Q, Li Y, Qiu W M, et al. Big data processing in cloud computing environments[C]//2012 International Symposium on Pervasive Systems, Algorithms and Networks, 2012: 17-23.
[4] Mehdi B, Mukesh S. The role of cloud computing architecture in big data[C]//Information Granularity, Big Data, and Computational Intelligence Studies in Big Data, 2015: 275-295.
[5] Todd G H. Armed attack in cyberspace: Deterring asymmetric warfare with an asymmetric definition[J]. Air Force Law Review, 2009, 64: 64-65.
[6] Air Force Cyber Command (provisional). Air force cyber command strategic vision[EB/OL]. (2008-04-03)[2015-03-14]. http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA479060.
[7] Welsh Ⅲ, Gen M A. Global vigilance, global reach, global power for America: The world's greatest air force-powered by airmen, fueled by innovation[J]. Air & Space Power Journal, 2014: 1-8.
[8] Liu J X, Chen S D, Wang F. The tactical maneuver in cyber space[J]. Electronics Optics & Control, 2014, 21(9): 1-6 (in Chinese). 刘金星, 陈哨东, 王芳. 赛博空间的战术机动[J]. 电光与控制, 2014, 21(9): 1-6.
[9] Ventola E. Systemic functional theory and cyberspace[J]. Equinox Publishing, 2014(2): 370-377.
[10] Weber R H V. Realizing a new global cyberspace framework[M]. Berlin: Springer, 2015: 99-160.
[11] United States Air Force. Cyberspace science and technology vision 2012-2025, cyber vision 2025[EB/OL].[2015-03-14]. http://www.defenseinnovationmarketplace.milresources/cybervision2025.pdf.
[12] Wójcik D. The butterfly defect: how globalization creates systemic risks and what to do about it[J]. Journal of Economic Geography, 2015, 15(1): 250-252.
[13] Xie H, Tan Y, Xu Y. Research on simulation of the emergency information dissemination based on netlogo[C]//Proceedings of 2013 4th International Asia Conference on Industrial Engineering and Management Innovation (IEMI2013). Berilin: Springer, 2014: 847-857.
[14] Wang G Q, Gu Q F, Wang M, et al. Research on integrated technology and model in avionics system[C]//2014 IEEE/AIAA 33rd Digital Avionics Systems Conference. Piscataway, NJ: IEEE Press, 2014: 1-52.
[15] Wang G Q, Gu Q F. Research on distributed integrated modular avionics system architecture design and implementation[C]//2013 IEEE/AIAA 32nd Digital Avionics Systems Conference. Piscataway, NJ: IEEE Press, 2013: 7D6-1-10.
[16] Zikopoulos P, Eaton C. Understanding big data: Analytics for enterprise class hadoop and streaming data[M]. McGraw-Hill Osborne Media, e-book: IBM Corporation, 2012.
[17] Paul P K, Kumar K, Chatterjee D. Cloud computing and information infrastructure: emerging possibilities-a SWOT analysis[J]. SRELS Journal of Information Management, 2014, 51(2): 129-134.
[18] Chang V. The business intelligence as a service in the cloud[J]. Future Generation Computer Systems, 2014, 37: 512-534.
[19] Gouglidis A, Mavridis I, Hu V C. Security policy verification for multi-domains in cloud systems[J]. International Journal of Information Security, 2014, 13(2): 97-111.
[20] Berl A, Gelenbe E, Di Girolamo M, et al. Energy-efficient cloud computing[J]. The Computer Journal, 2010, 53(7): 1045-1051. |