[1] Air Force Cyber Command.Air force Cyber command strategies version[M].Barksdale:AAAFBLA2008.
[2] FORSYTH M HGENERAL M.“Cyberspace operations”air force doctrine document 312[R].Air Force Washington D.C.2010.
[3] Chairman of the Joint Chiefs of Staff.National military strategy for cyberspace operations[R].Washington D.C.December2006.
[4] TYUGU E.Command and control of Cyber weapons[C]//The 4th International Conference on Cyber Conflict2012:1-11.
[5] Joint Chiefs of Staff.Joint publication 30:Joint operationsJP 30[R].United States Department of Defense Washington D.C.2011:III27.
[6] PARKS R CDUGGAN D P.Principles of Cyber warfare[C]//Proceedings of the IEEE Workshop on Information Assurance and Security United States Military AcademyWest PointNY56 June2001:122-125.
[7] FULGHUM D AWALL R.U.S.electronic surveillance monitored israeli attack on Syria[EB/OL].200711-14[20140101].http://www.aviationweek.com/aw/generic/story_generic.jsp channel=defense&id=news/ISRA112107.xml&headline=U.S.%20Electronic % 20 Surveillance % 20 Monitored % 20 Israeli % 20 Attack % 20 On % 20 Syria.
[8] LIU XZHAO M.Offense and defense technology in Cyberwar—analysis on project Suter[J].Command Information System and Technology 20112(4):1-9.
[9] YANG MSHEN Y.The overview of US AEA system[J].Electronic Information Warfare Technology2010 5(4):12-16.
[10] HEW PLEWIS E.Situation awareness for supervisory control:Two fratricide cases revisited[C]// International Command and Control Research and Technology SymposiumSanta MonicaCalifornia2010:1-20.
[11] U.S.Department of Defense.Department of defense strategy for operating in Cyberspace [R].Washington D.C.Jul.2011.
[12] JAJODIA SGHOSH A KSUBRAHMANIAN V S.Moving target defense Ⅱ: Application of game theory and adversarial modeling advances in information security[M].New York:Springer Science Business Media 2013.
[13] LORD W T.Cyberspace operations:Air force space command takes the lead[J].High Frontier20095 (3):3-5.
[14] BERAUD PCRUZ AHASELL Set al.Using Cyber maneuver to improve network resiliency[C]//Military Comm unications Comference2011:1121-1126.
[15] BERAUD PCRUZ AHASSELL Set al.Cyber defense network maneuver commander[C]//IEEE International Carnahan Conference on Security Technology (ICCST)2010:112-120.
[16] U.S.Department of Defense.JP 102 DOD dictionary of military and associated terms[R].Washington D.C. Oct.172008.
[17] HUANG N FKAO C NHUN H Wet al.Apply data mining to defenseindepth network security system[C]//The 19th International Conference on Advanced Information Networking and ApplicationsAINA 20052005:159-162.
[18] GROAT STRONT JMARCHANY R.Advancing the defense in depth model[C]//The 7th International Conference on System of Systems Engineering (SoSE)2012:285-290.
[19] SLIPPER DMCEWAN A A IFILL W.Modelling and analyzing defenseindepth in arming systems[C]//International Conference on System Science and Engineering (ICSSE) 2013:303-308.
[20] EOM J HKIM N UKIM S Het al.Cyber military strategy for Cyberspace superiority in Cyber warfare[C]//International Conference on Cyber SecurityCyber Warfare and Digital Forensic (CyberSec)Kuala Lumpur2012:295-299.
[21] Joint Chiefs of Staff.Joint publication:30 joint operationsJP 30[R].United States Department of Defense Washington D.C.20013-28.
[22] WELLS II L.Maneuver in the global commons——the Cyber dimension[EB/OL].20101001[20140101].http://www.afcea.org/signal/articles/templates/Signal_Article_Template.asp articleid=2472 & zoneid=306.
[23] HUANG R QLI W MZHANG R Jet al.Research on the defense in depth system in air defense information network[J].Computer Science201138(10A):53-55-58.
[24] SPITZNER L.Problem and challenges with honey pots [EB/OL].200401-14[20140101].http://www.security focus.Com/infocus/17572004.
[25] YAO LWANG X M.A study on the network active defense technology based on deception[J].Journal of National University of Defense Technology200830(3):65-69.
[26] WU Y H.Study on the intrusion detection and counter attack technology based on the mobile agent[D].Nanjing:Nanjing University of Posts and Telecommunications,2005.