• Electronics Optics & Control
  • Vol. 25, Issue 9, 1 (2018)
[in Chinese]1、2, [in Chinese]3, and [in Chinese]2
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • 3[in Chinese]
  • show less
    DOI: 10.3969/j.issn.1671-637x.2018.09.001 Cite this Article
    [in Chinese], [in Chinese], [in Chinese]. Study on Elements of Cyber Tactical Maneuver[J]. Electronics Optics & Control, 2018, 25(9): 1 Copy Citation Text show less
    References

    [1] Joint Publication 3-0.Joint operati-ons, JP 3-0[R].Joint Chiefs of Staff, United States Department of Defense, Washington D.C., 2011.

    [2] Joint Publication 3-12.Cyberspace operations[R].Joint Chiefs of Staff, United States Department of Defense, Washington D.C., 2013.

    [3] BERAUD P, CRUZ A, HASSELL S, et al.Using cyber maneuver to improve network resiliency[C]//Military Communications Conference(MILCOM), 2011:1121-1126.

    [4] BERAUD P, CRUZ A, HASSELL S, et al.Cyber defense network maneuver commander[C]//International Carnahan Conference on Security Technology, 2010:112-120.

    [5] U.S.Air Force.Air force basic doctrine, organization, and command.Air Force Doctrinal Document (AFDD) 1[R/OL].(2011-10-14)[2018-05-01].http://www.e-publishing.af.mil.

    [6] CROWELL R M.Some principles of cyber warfare (NWC 2160)[D].Newport:U.S.Naval War College, 2015.

    [7] MCGRAW M W R.USMC, beyond mission command:maneuver warfare for cyber command and control[D]. Newport:U.S.Naval War College, 2015.

    [8] APPLEGATE S D.The principle of maneuver in cyber operations[C]//The 4th International Conference on Cyber Conflict, 2012:1-13.

    [10] LORD W T.Air force cyber command strategic vision [R].Air Force Cyberspace Command, Barks- dale AFB LA, 2008.

    [11] ZACHAR F.Strategic maneuver:defined for the future army[D].Fort Leavenworth, KS:Command and Ge-neral Staff College, 2000.

    [12] HUBER C, MCDANIEL P, BROWN S E, et al.Cyber fighter associate:a decision support system for cyber agility[C]//Annual Conference on Information Science and Systems (CISS), 2016:198-203.

    [13] WELLS L.Maneuver in the global commons-the cyber dimension[J/OL].(2010-12-01)[2018-05-01].https://www.afcea.org/content/maneuver-global-commons—cyber-dimension.

    [14] JAJODIA S, GHOSH A K, SWARUP V, et al.Moving target defense:creating asymmetric uncertainty for cyber threats (advances in information security 54)[M].New York:Springer, 2011.

    [15] JAJODIA S, GHOSH A K, SUBRA- HMANIAN V S, et al.Moving target defense II:application of game theory and adversarial modeling [M].New York:Springer, 2013.

    [16] RAMUHALLI P, HALAPPANAVAR M, COBLE J, et al.Towards a theory of autonomous reconstitution of compromised cyber-systems[C]//IEEE International Conference on Techno-logies for Homeland Security(HST), 2013:577-583.

    [17] TORRIERI D.Cyber maneuvers and maneuver keys[C]//IEEE Military Communications Conference, 2014:262-268.

    [18] SHAN Z Y, NEAMTIU I, QIAN Z Y, et al.Proactive restart as cyber maneuver for Android[C]//IEEE Military Communications Confe-rence, 2015:9-24.

    [19] LU Z, MARVEL L M, WANG C.To be proactive or not:a framework to model cyber maneuvers for critical path protection in MANETs[C]//Proceedings of the Second ACM Workshop on Moving Target Defense, 2015:85-93.

    [20] MOODY W C, HU H X, APON A.Defensive maneuver cyber platform modeling with stochastic Petri nets[C]//IEEE International Conference on Collaborative Computing:Networking, Applications and Work Sharing, 2014:531-538.

    [21] AKYAZI U.Possible Scenarios and maneuvers for cyber operational area[C]//The 13th European Conference on Cyber Warfare and Security (ECCWS), 2014:1-7.

    [22] MPOFU N, CHIKATI R.Strategy matrix for containing cyber attacks:a generic approach[C]//The 10th International Conference on Cyber Warfare and Security(ICCWS), Krouger National Park, South Africa, 2015:207-215.

    [26] MARZAT J.A missile guidance law tolerant to un-estimated evasive maneuvers[J].Aircraft Engineering and Aerospace Technology, 2017, 89(2):314-319.

    CLP Journals

    [1] YU Liang, LIU Yongchun, LIN Da. A Probabilistic Search Decision-Making Framework Based on Bayesian Method[J]. Electronics Optics & Control, 2020, 27(9): 50

    [in Chinese], [in Chinese], [in Chinese]. Study on Elements of Cyber Tactical Maneuver[J]. Electronics Optics & Control, 2018, 25(9): 1
    Download Citation