[1] 102年中華民國國防報告書,國防部,台北,第62頁,2013。
[2] 林晏如,“飛彈聯合防禦系統之目標資源分配機制”,碩士論文,國防大學理工學院資訊工程研究所,桃園,2012。[3] 錢柏志,“飛彈聯合防禦系統之數位戰場”,碩士論文,國防大學理工學院資訊工程研究所,桃園,2013[4] Xin Bin, Chen Jie, Zhang Juan, Dou Lihua, and Peng Zhihong, “Efficient Decision Makings for Dynamic Weapon-Target Assignment by Virtual Permutation and Tabu Search Heuristics,” IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART C: APPLICATIONS AND REVIEWS, Vol. 40, No. 6, pp. 649-662, 2010.
[5] Peng Chen, Liu Xing, Mu Xiaomin, Du Yang, and Wu Sentang, “Cooperative Dynamic Weapon-target Assignment Algorithm of Multiple Missiles Based on Networks,” 2009 Chinese Control and Decision Conference, Guilin, China, pp.126-130, 2009.
[6] Xin Bin, Chen Jie, Peng Zhihong, Dou Lihua, and Zhang Juan, “An Efficient Rule-Based Constructive Heuristic to Solve Dynamic Weapon-Target Assignment Problem,” IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART A: SYSTEMS AND HUMANS, Vol. 41, No. 3, pp. 598-606, 2011.
[7] Xin Bin, Chen Jie, “An Estimation of Distribution Algorithm with Efficient Constructive Repair/Improvement Operator for the Dynamic Weapon-Target Assignment,” Control Conference, Hefei, China, pp. 2346-2351, 2012.
[8] Lloyd, Stuart P., and Hans S. Witsenhausen. “Weapons allocation is NP-complete,” Summer Computer Simulation Conference, Reno, NV, pp. 1054–1058, 1986.
[9] Hosein, Patrick Ahamad, and Michael Athans, “Preferential defense strategies Part I: The static case,” Massachusetts Institute of Technology, Laboratory for Information and Decision Systems, Cambridge, MA, 1990.
[10] Hosein, Patrick Ahamad, and Michael Athans, “Preferential defense strategies. Part II: The dynamic case,” Massachusetts Institute of Technology, Laboratory for Information and Decision Systems, Cambridge, MA, 1990.
[11] Wacholder E., “A neural network-based optimization algorithm for the static weapon-target assignment problem,” ORSA Journal on Computing, Vol. 1, No. 4, pp. 232–246, 1989.
[12] A. Malhotra and R. K. Jain, “Genetic algorithm for optimal weapon allocation in multilayer defence scenario,” Defence Science Journal, Vol. 51, No. 3, pp. 285–293, 2001.
[13] Cullenbine, C. A., “A taboo search approach to the weapon assignment model,” Master thesis, Department of Operational Sciences, Air Force Institute of Technology, Hobson Way, WPAFB, OH, 2000.
[14] Li, H. R. and Miao, Y., “WTA with the maximum kill probability based on simulated annealing algorithms,” in Proc. Conf. Spec. Committee C2 Comput. Electron. Technol. Acad. Committee China, pp. 436–440, 2000.
[15] Lee, Z. J., Lee, C. Y., and Su, S. F., “An immunity-based ant colony optimization algorithm for solvingweapon-target assignment problem,” Applied Soft Computing, Vol. 2, No. 1, pp. 39–47, 2002.
[16] Zeng X., Zhu Y., Nan L., Hu K., Niu B., and He X., “Solving weapon-target assignment problem using discrete particle swarm optimization,” in Proc 6th World Congress Intelligent Control and Automation, Dalian, China, pp. 3562–3565, 2006.
[17] Gao, S., “Solving Weapon-Target Assignment Problems by a New Ant Colony Algorithm,” International Symposium on Computational Intelligence and Design, Wuhan, China, pp. 221-224, 2008.
[18] Cho Byunggyu, Kim Dae Young, Kim Sae Hwan, Youn Cheong, “Real-Time Distributed Simulation Environment For Air Defense System Using A Software Framework”, The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, Vol. 4, No. 2, pp. 64-79, 2007.
[19] “Modeling & Simulation Coordination Office” Available from: http://www.msco.mil/(2014.1.29)
[20] “Manager’s Guide to the High Level Architecture for Modelling and Simulation (HLA)” Available from: http://www.msco.mil/documents/_2_ITEC09%20-%20HLA%20Tutorial.pdf(2014.1.29)
[21] Anthony W. Potts, Fames W. Kelton, “The Need for Dynamic Airspace Management in Coalition Operation”, The International C2 Journal, Vol. 5, No. 3, 2011.
[22] Michael Howard, David Payton, “SYSTEM AND METHOD FOR DISTRIBUTED ENGAGEMENT”, United States Patent: US7912631B2 U.S.A., 2007.
[23] Kuhl.F., Weatherly,R., Dahmann,J. 著,付正軍,王永红譯,計算機仿真中的HLA技術,國防工業出版社,中國,第2-3頁,2003。