1. Wang, Z., Lu, Y., Li, X.: Risk assessment of military information network security based on attack and defense game. Mil. Oper. Res. Syst. Eng. 33(2), 35–40 (2019)
2. Wang, Z., Lu, Y., Li, X.: Active defense strategy selection of military information network based on incomplete information game. Acta Armamentarii 41(3), 608–617 (2020)
3. Zhu, Y., Liu, S., Cheng, B., Bi, J.: A research on information defense of military C4ISR system. Fire Control Command Control 2004(2), 3–6 (2004)
4. Kang, Y., Meng, F., Feng, Y.: A network traffic anomaly detection model for military internet of things (MIOT). Fire Control Command Control 46(2), 120–125 (2021)
5. Huangfu, S., Li, L., Wang, H., Shen, F., Wei, T.: Enabling self-attention based multi-feature anomaly detection and classification of network traffic. J. East China Normal Univ. (Nat. Sci.) 2021(06), 161–173 (2021)