1 |
庞立新, 冯建元, 李杰, 周志成. 天基信息网络发展与应用[J]. 无线电通信技术, 2021, 47(1): 12‑18.
|
|
PANG L, FENG J Y, LI J, ZHOU Z C. Development and application of space information network[J]. Radio Communication Technology,2021, 47(1): 12‑18. (in Chinese)
|
2 |
李斌, 刘乘源, 章宇兵. 天基信息港及其多源信息融合应用[J]. 中国电子科学研究院学报, 2017, 012(3): 251‑256.
|
|
LI B, LIU C Y, ZHANG Y B. Space-based information port and its multi-information fusion application[J]. Journal of China Academy of Electronic and Information Technology, 2017, 12(3):251‑256. (in Chinese)
|
3 |
陈姝, 方滨兴, 周勇林. P2P技术的研究与应用[J]. 计算机工程与应用, 2002, 38(13): 20‑23.
|
|
CHEN S, FANG B X, ZHOU Y L. The research and application of P2P technology[J]. Computer Engineering and Applications,2002, 38(13): 20‑23. (in Chinese).
|
4 |
李华, 范鑫鑫, 秘建宁, 等. 空天地一体化网络安全防护技术分析[J]. 中国电子科学研究院学报, 2014, 9(6): 592‑597.
|
|
LI Hua, FAN Xing-xing, MI Jian-ning, et al. Development and application of space information network[J]. Journal of China Academy of Electronic and Information Technology,2014,9(6): 592‑597. (in Chinese)
|
5 |
汪春霆, 李宁, 翟立君, 等. 卫星通信与地面 5G 的融合初探(一)[J]. 卫星与网络, 2018, (9): 14‑21.
|
6 |
张昊, 戴长华, 张翀. 一种构建Kademlia网络拓扑的高效算法[J]. 计算机应用研究, 2009, 26(2): 534‑536.
|
|
ZHANG Hao, DAI Chang-hua, ZHANG Chong. An efficient algorithm for building Kademlia topology[J]. Application Research of Computers,2009, 26(2): 534‑536. (in Chinese)
|
7 |
CHOWDHURY F, FERDOUS M S. Performance analysis of R/Kademlia, Pastry and Bamboo using recursive routing in mobile networks[J]. International Journal of Computer Networks & Communications,2017, 9(5): 41‑54.
|
8 |
李凤华, 殷丽华, 吴巍, 等. 天地一体化信息网络安全保障技术研究进展及发展趋势[J]. 通信学报, 2016, 37(11): 156‑168.
|
|
LI Feng-hua, YIN Li-hua, WU Wei, et al. Research status and development trends of security assurance for space-ground integration information network[J]. Journal on Communications,2016, 37(11):156‑168. (in Chinese)
|
9 |
JOSEPH S. An extendible open source P2P simulator[J]. P2PJournal, 2007, 11(7): 1‑15.
|
10 |
XU H, et al. A survey of peer-to-peer simulators and simulation technology[J]. Journal of Convergence Information Technology, 2011, 6(5): 260‑272.
|