3Tao Peng,Christopher Leckie,Kotagiri Ramamo-Itanarao.Detecting Distributed Denial of Service Attacks Using Source iP Address Monitoring.draft.November 2002.
4桑士川.装备建设战略管理[M].北京:解放军出版社,2008.
5刘桂芳等.高技术条件下的C4ISR[M].北京:国防大学出版社,2002.
6孙宏山.浅析信息对抗中以劣胜优的几种方法.指挥学报,1997,.
7陆邦华.浅谈电子对抗中的“以劣胜优”.军事,1998,.
8Rudolf Ahlswede,Ning Cai,Shuo-Yen Robert Li, et al.Network information flow [J].IEEE Trans.Inform. Theory,2000,46(4): 1204-1216.
10Sanders P,Egner S,Tolhuizen L.Polynomial time algorithms for network information flow [C] .In:Proc.15th ACM Symposium on Parallel Algorithms and Architectures,2003.