1Tyugu E. Artificial intelligence in cyber defense[ C ]//Proc of the 3rd International Conference on Cyber Conflict. 2011 : 1-11.
2Poell R A, Szklrz P C. R3-getting the right information to the right people, right in time[ C]//Proc of Concepts and Implementations for Innovative Military Communications and Information Technologies. Warsaw : Military Universitv of Technology Publisher. 2010:23-31.
5Lin H S. Offensive cyber operations and the use of force[ J]. Journal of National Security Law & Policy,2010,4( 1 ) :63.
6李健,温柏华.美军网络力量[M].沈阳:辽宁大学出版社,2013.
7SSBass T, Gruber D. A glimpse into the future of ID [ EB/OL]. (2001- 02- 01 ). http ://www. thecepblog, com/papers/pdf/useNixglimpse.pdf.
8BarikA F, Hadjar K, E1 Kadhi N. Artificial neural network for mo- bile IDS solution [ C ]//Proc of Security and Management Conference. 2009:271-277.
9Stopel D, Boger Z, Moskovitch R, et al. Application of artificial nan- ral networks techniques to computer worm detection [ C ]//Proc of In- ternational Joint Conference on Neural Networks. 2006:2362-2369.
10Vaitsekhovich G L. Neural network techniques for intrusion detection [ C ]//Proc of International Conference on Neural Networks and Arti- ficial Intelligence. 2006:65-69.