[1] Joint Publication 3-0.Joint operati-ons, JP 3-0[R].Joint Chiefs of Staff, United States Department of Defense, Washington D.C., 2011.
[2] Joint Publication 3-12.Cyberspace operations[R].Joint Chiefs of Staff, United States Department of Defense, Washington D.C., 2013.
[3] BERAUD P, CRUZ A, HASSELL S, et al.Using cyber maneuver to improve network resiliency[C]//Military Communications Conference(MILCOM), 2011:1121-1126.
[4] BERAUD P, CRUZ A, HASSELL S, et al.Cyber defense network maneuver commander[C]//International Carnahan Conference on Security Technology, 2010:112-120.
[5] U.S.Air Force.Air force basic doctrine, organization, and command.Air Force Doctrinal Document (AFDD) 1[R/OL].(2011-10-14)[2018-05-01].http://www.e-publishing.af.mil.
[6] CROWELL R M.Some principles of cyber warfare (NWC 2160)[D].Newport:U.S.Naval War College, 2015.
[7] MCGRAW M W R.USMC, beyond mission command:maneuver warfare for cyber command and control[D]. Newport:U.S.Naval War College, 2015.
[8] APPLEGATE S D.The principle of maneuver in cyber operations[C]//The 4th International Conference on Cyber Conflict, 2012:1-13.
[10] LORD W T.Air force cyber command strategic vision [R].Air Force Cyberspace Command, Barks- dale AFB LA, 2008.
[11] ZACHAR F.Strategic maneuver:defined for the future army[D].Fort Leavenworth, KS:Command and Ge-neral Staff College, 2000.
[12] HUBER C, MCDANIEL P, BROWN S E, et al.Cyber fighter associate:a decision support system for cyber agility[C]//Annual Conference on Information Science and Systems (CISS), 2016:198-203.
[13] WELLS L.Maneuver in the global commons-the cyber dimension[J/OL].(2010-12-01)[2018-05-01].https://www.afcea.org/content/maneuver-global-commons—cyber-dimension.
[14] JAJODIA S, GHOSH A K, SWARUP V, et al.Moving target defense:creating asymmetric uncertainty for cyber threats (advances in information security 54)[M].New York:Springer, 2011.
[15] JAJODIA S, GHOSH A K, SUBRA- HMANIAN V S, et al.Moving target defense II:application of game theory and adversarial modeling [M].New York:Springer, 2013.
[16] RAMUHALLI P, HALAPPANAVAR M, COBLE J, et al.Towards a theory of autonomous reconstitution of compromised cyber-systems[C]//IEEE International Conference on Techno-logies for Homeland Security(HST), 2013:577-583.
[17] TORRIERI D.Cyber maneuvers and maneuver keys[C]//IEEE Military Communications Conference, 2014:262-268.
[18] SHAN Z Y, NEAMTIU I, QIAN Z Y, et al.Proactive restart as cyber maneuver for Android[C]//IEEE Military Communications Confe-rence, 2015:9-24.
[19] LU Z, MARVEL L M, WANG C.To be proactive or not:a framework to model cyber maneuvers for critical path protection in MANETs[C]//Proceedings of the Second ACM Workshop on Moving Target Defense, 2015:85-93.
[20] MOODY W C, HU H X, APON A.Defensive maneuver cyber platform modeling with stochastic Petri nets[C]//IEEE International Conference on Collaborative Computing:Networking, Applications and Work Sharing, 2014:531-538.
[21] AKYAZI U.Possible Scenarios and maneuvers for cyber operational area[C]//The 13th European Conference on Cyber Warfare and Security (ECCWS), 2014:1-7.
[22] MPOFU N, CHIKATI R.Strategy matrix for containing cyber attacks:a generic approach[C]//The 10th International Conference on Cyber Warfare and Security(ICCWS), Krouger National Park, South Africa, 2015:207-215.
[26] MARZAT J.A missile guidance law tolerant to un-estimated evasive maneuvers[J].Aircraft Engineering and Aerospace Technology, 2017, 89(2):314-319.