[1] MESEROLE J S, MOORE J W. What is System Wide Information Management (SWIM)[J]. Aerospace and Electronic Systems Magazine, 2007, 22(5):13-19.
[2] 李琴,黄海清,陈强.空管新技术-SWIM[J].数字通信世界,2010(5):50-53.(LI Q, HUANG H Q, CHEN Q. Air traffic control technology-SWIM[J]. Digital Communication World, 2010(5):50-53.)
[3] MOALLEMI M, CASTRO-PENA C A, TOWHIDNEJAD M, et al. Information security in the aircraft access to system wide information management infrastructure[C]//ICNS 2016:Proceedings of the 2016 Integrated Communications Navigation and Surveillance. Piscataway, NJ:IEEE, 2016:1A3-1-1A3-7.
[4] WU Z J, CUI Z H, WANG C Y, et al. Access control scheme with attribute revocation for SWIM[J]. China Universities of Posts and Telecommunications, 2017, 24(6):49-54.
[5] 吴志军,赵婷,雷缙.基于改进的Diameter/EAP-MD5的SWIM认证方法[J].通信学报,2014,35(8):1-7.(WU Z J, ZHAO T, LEI J. SWIM authentication method based on improved Diameter/EAP-MD5[J]. Journal on Communications, 2014, 35(8):1-7.)
[6] SMITH T. Quality of service requirements for System Wide Information Management (SWIM)[C]//Proceedings of the 24th Digital Avionics Systems Conference. Piscataway, NJ:IEEE, 2005:1.A.2-1.1-8.
[7] STEPHENS B. System-Wide Information Management (SWIM) demonstration security architecture[C]//Proceedings of the 2nd Digital Avionics Systems Conference. Piscataway, NJ:IEEE, 2006:1-12.
[8] 罗喜伶,王珺珺.民航广域信息管理技术[M].北京:电子工业出版社,2017:55-56.(LUO X L, WANG J J. Civil Aviation Wide Area Information Management Technology[M]. Beijing:Publishing House of Electronics Industry, 2017:55-56.)
[9] FUH C-D, TARTAKOVSKY A G. Asymptotic Bayesian theory of quickest change detection for hidden Markov models[J]. IEEE Transactions on Information Theory, 2019, 65(1):511-529.
[10] TANG K S, ZHU S F, XU Y Q, et al. Modeling drivers' dynamic decision-making behavior during the phase transition period:an analytical approach based on hidden Markov model theory[J]. IEEE Transactions on Intelligent Transportation Systems, 2016, 17(1):206-214.
[11] 谢逸,余顺争.基于Web用户浏览行为的统计异常检测[J].软件学报,2007,18(4):967-977.(XIE Y, YU S Z. Statistical anomaly detection based on Web user browsing behavior[J]. Journal of Software, 2007, 18(4):967-977.)
[12] QI M, LU S T. Overview of system wide information management and security analysis[C]//ISADS 2017:Proceeding of the 13th International Symposium on Autonomous Decentralized System. Piscataway, NJ:IEEE, 2017:191-194.
[13] 赵汨龙,罗喜伶,王忠波.基于SOA的民航广域信息管理架构的研究与设计[J].计算机技术与发展,2016,26(2):95-100.(ZHAO M L, LUO X L, WANG Z B. Research and design of civil aviation wide area information management architecture based on SOA[J]. Computer Technology and Development, 2016, 26(2):95-100.)
[14] TSAI W T, PAUL R, WANG Y M, et al. Extending WSDL to facilitate Web services testing[C]//Proceedings of the 7th IEEE International Symposium on High Assurance Systems Engineering. Piscataway, NJ:IEEE, 2002:171-172.
[15] 尚波涛,祝跃飞,陈嘉勇.一种应用层分布式拒绝服务攻击快速检测方法[J].信息工程大学学报,2012,13(5):601-609.(SHANG B T, ZHU Y F, CHEN J Y. Method for quickly detecting application layer distributed denial of service attack[J]. Journal of Information Engineering University, 2012, 13(5):601-609.) |