1CLARK D D,WROCLAWSKI J,SOLLINS K R,et al.Tussle in Cyberspace:Defining Tomorrow's Internet[J].IEEE/ACM Transactions on Networking,2005,13(3):462-475.doi:10.1109/TNET.2005.850224.
2NALEWAJSKI R F.Elements of Information Theory[J].Perspectives in Electronic Structure Theory,2011,294(3-4):371-395.
3SCHWALM K T,SCHWALM K T.National Strategy to Secure Cyberspace[J].Technical Report,AFRL-IF-RS-TR-2006-266,2006,1-27.
4STEANE A M.How to Build a 300 bit,1 Gop Quantum Computer[J].Quantum Information&Computation,2004,7(3):171-183.
5SINGH B,DHAWAN S,ARORA A,et al.A View of Cloud Computing[J].Communications of the ACM,2013,53(4):50-58.
7ZHANG Y Q,WANG X Y.A Symmetric Image Encryption Algorithm Based on Mixed Linear-Nonlinear Coupled map Lattice[J].Information Sciences,2014,273:329-351.
8MANATHA G S,SHARMA S C.Network Layer Attacks and Defense Mechanisms in MANETS-A Survey[J].International Journal of Computer Applications,2010,27(1):529-535.
9ANDROULIDAKIS I.Mobile Phone Forensics[M].Mobile Phone Security and Forensics.US:Springer,2012:75-99.