4DoD. Report to Congress: Network Centric Warfare [R]. Washington D. C. : Department of Defense United States of America, 2001.
5ZHU X J. Anomaly detection through statistics based machine learning for computer networks[D]. Tucson: The University of Arizona, 2006.
6JING X P, WANG H X, HAN R F. Improved Genetic Algo- rithm in Intrusion Detection Model Based on Artificial Immune Theory[C]//The 1st IEEE International Symposium on Com- puter Network and Multimedia Technology, Wu Han, China: IEEE Press, 2009 : 659-962.
7HAN R F, WANG H X, Xiao Q. Service oriented decentral- ized access control for military systems in Net-Centric Environ- ment[C]//The 2nd International Symposium on Electronic Commerce and Security, 2009,5 : 209-214.
8HAN R F, WANG H X, XIAO Q. A united access control model for systems in collaborative commerce[J]. Journal of Networks, 2009 (6): 279-289.
9SKENDZIC, et al. Enhancing power system automation through the use of real-time Ethernet [ C ]//Power Systems Conference 2006 :Advanced Metering, Protection, Control, Communication and Distributed Resources. USA : NewYork ,2006:480 - 495.
10WINKEL, et al. Real-time ethernet in IEC 61784 - 2 and IEC 61158 series [ C ]//2006 IEEE International Conference on Industrial Informatics, INDIN "06, USA: Antonio, 2007 : 246 - 250.