1 |
Bjorklund, Raymond C., The Dollars and Sense of Command and Control, National Defense University Press, Washington D. C.(1995).
|
2 |
Dekker, A., "Revisiting "SCUDHunt" and the Human Dimension of NCW : Some Thoughts, Human Factor Issues in NCW", TTCP Symposium(2006).
|
3 |
Guiasu and Siliu, Information Theory with Applications, McGraw-Hill(1997).
|
4 |
Han, H. et al., "A Study on the Concept of Information Warfare", Korea Institute for Defense Analyses(1999), 41.
|
5 |
Jung, W. S. and Lee, J. Y., "An Assessment of Combat Effectiveness of C4I System Established for Joint Fire Operation", Journal of Defence Science and Technology, Vol.1, No.2(2008), 42.
|
6 |
Kim, Y. K., "A Basic Study on the Analysis of Combat Contribution Effectiveness of Networking Weapon System", Korea Institute for Defense Analyses(2000), 46-47.
|
7 |
Lee, J. Y. et al., "A Basic Concept Study on the Assessment Method of Information Combat Power Systems Analysis of Combat Contribution Effectiveness of Networking Weapon System", Korea Research Institute for Military Affairs(2001), 51-52.
|
8 |
Lee, Y. B. et al., "A Proposal of New MOE to Assess the Combat Power Synergistic Effect of Warfare Information System", IE Interfaces, Vol.22, No.3(2009), 205-213.
과학기술학회마을
|
9 |
Loughran, J., Stahl, M., and Perla, P., "Key Drivers for C2 Performance : Data Mining SCUDHunt Experiment Data", ThoughtLink Inc(2001).
|
10 |
Moon, J. L., "The Application of Classical Mechanical Concepts to the Combat Theory and its Limitations", Won Kwang Military Review( 2005).
|
11 |
Park, S. K. and Lee, J. Y., "A Study on The Assessment of Power Improvement Effectiveness of Corps Level C4I System Applied to Integrated Fire Operation", Journal of the Military Operations Research Society of Korea, Vol.29, No.1(2003), 26.
|
12 |
Paul, W. Phister, Jr, Igor G.Plonisch, "Information and Knowledge Centric Warfare : The Next Steps in the Evolution of Warfare", CCRTS(2004).
|
13 |
Schutzer, D. M., Selected Analytical Concepts in Command and Control, C2 Theory and Measures of Effectiveness, Gordon and Breach Science Publisher(1982).
|
14 |
A. K. Cebrowski, "The Implementation of Network-Centric Warfare", Department of Defense Office of Freedom of Information and Security Review, 05-S-0235, http://www.oft.osd.mil(2005).
|
15 |
Chong-Man Kim, Injai Kim, "A Study of Influencing Factors Upon Using C4I Systems : The Perspective of Mediating Variables in a Structured Model", APJIS, Vol.19, No.2 (2009), 73-94.
|
16 |
Darilek, Richard et al., Measures of Effectiveness for the Information-Age Army, RAND(2001), 14.
|
17 |
Alberts, David S., John, Garstka J., and Hayes, Richard E., "Understanding Information Age Warfare", CCRP(2001), 142-143.
|
18 |
Ablerts, David S., Garstka, John J., and Stein, Frederick P., "Network Centric Warfare : Developing and Leveraging Inforamtion Superiority", CCRP, 2nd Edition(2002), 94.
|