2Przemieniecki J S. Mathematical Methods in Defense Analysis (Second Edition)[M]. AIAA Inc, 1994.
3Paterson J. Overview of low observable technology and its effects on combat aircraft survivability[J]. Journal of Aircraft, 1999, 36(2): 380-388.
4Khalighi M A, Bastani M H. Adaptive CFAR processor for non-homogeneous environments[J]. IEEE Transactionson Aerospace and Electronic Systems, 2000, 36(3): 889-897.
5Gandhi P, Kassam S A. Analysis of CFAR processors in non-homogeneous background [J]. IEEE Transaction on Aerospace and Electronic Systems, 1988, 24 (4) : 428- 445.
6张考.飞行器对雷达隐身性能计算与分析[M].北京:国防工业出版社,1997..
7George J Ferren, Randolph W Gallas. DILUTE: A mini-campaign simulation model to analyze strategic penetration of various force mix combinations of cruise missiles and manned penetrators [Z]. AD A 115698.
8David S Alberts, John J Garstka, Frederick P Stein. Network Centric Warfare-Developing and Leveraging Information Superiority [M]. USA: CCPR Publication Series, 2nd edition, 2000: 123-125.
9Fewell M P, Hazen Mark G. Network centric warfare: its nature and modeling [M]. Australia: DoD Defense Science and Technology Organization of Australia, 2003: 4-19.
10ALASTAIR P. Overview of the SMP2 Standard [C]// The 6th NASA/ESA Workshop on Product Data Exchange. Friedrichshafen, Germany: NASA Step Center, 2004: 145-153.