[1] مهدی نژاد نوری، محمد و علی جبار رشیدی، مجید فخری ومهدی علی نژاد، (زمستان1396)، " بررسی نقش فرماندهی وکنترل هوشمند در دفاع دانش بنیان فصلنامه مطالعات دفاعی استراتژیک، سال پانزدهم، شماره 70، صص 4 – 91.
[5] خداداد هلیلی، جلیل مظلوم، بهرنگ هادیان " بررسی کاربردهای نظامی فناوری کلان داده و نقش آن در مدیریت صحنه نبرد" فصل نامه علوم و فنون نظامی، سال یازدهم، شمارۀ 33، پاییز 1394، صص 47- 62.
[6] حافظ محمدی، محمد رضا موحدی صفت، " جایگاه فناوری کلان دادهها درارتقاء سامانه فرماندهی و کنترل سایبری در جمهوری اسلامی ایرا ن"، دوازدهمین کنفرانس ملی فرماندهی و کنترل ایران، بهمن ماه1399.
[2] Philippe Gros, Senior Research Fellow, Foundation for Strategic Research, October 2, (2019). “The “tactical cloud”, a key element of the future combat air system”, www. frstrategie. org/home /Notes de la FRS/ (Apr. 16, 2020(.
[3] DEREK GROSSMAN, CHRISTIAN CURRIDEN,” Chinese Views of Big Data Analytics” Published by the RAND Corporation, Santa Monica, Calif, www. rand. org/t/RRA176-1, Copyright 2020 RAND Corporation.
[4] Alena Epifanova"is program officer at the Robert Bosch Center forCentral and Eastern Europe, Russia, and Central Asia",”Deciphering Russia’s “Sovereign Internet Law”,2020, Auswärtige Politik e. V, ISSN 1611-7034.
[7] Fazal-e-Amin, Abdullah S. Alghamdi, Iftikhar Ahmad, Tazar Hussain"Big Data for C4I Systems: Goals, Applications,Challenges and Tools",”Deciphering Russia’s “, Fifth international conference on Innovative Computing Technology (INTECH 2015).
[8] Doug Laney. , (2001). "3D Data Management: Volume, Velocity and Variety", Application Delivery Strategies (Meta Group)p2.
[9] Jiarui Zhang,a, Gang Wang and Siyuan Wang"Command and Control System Construction in Big Data Era",”Journal of Physics: Conf. Series 1168 (2019) 032022-doi: 10. 1088/1742-6596/1168/3/032022.
[10] Seungjin Baek and Young-Gab Kim"C4I System Security Architecture: A Perspective on Big Data.
Lifecycle in a Military Environment", Sustainability2021, 13, 13827. http: //doi. org/10. 3390/su132413827.
[11] De Mauro, A. ; Greco, M. ; Grimaldi, M. A formal definition of Big Data based on its essential features. Libr. Rev. 2016, 65, 122–135.
[12] Chang, W. L. Grady, N. NIST big data interoperability framework: Volume 2 Big Data Taxonomy. NIST Spec. Publ. 2017, 1500, 10.
[13] Patgiri, R. A Taxonomy on Big Data: Survey. ARXIV 2018, arXiv: 1808. 08474.
[14] Koo, J. ; Kang, G. ; Kim, Y. -G. Security and Privacy in Big Data Life Cycle: A Survey and Open Challenges. Sustainability 2020, 12,10571.
[15] Kune, R. ; Konugurthi, P. K. ; Agarwal, A. ; Chillarige, R. R. ; Buyya, R. The anatomy of big data computing. Softw. Pract. Exp. 2016,46, 79–105. [CrossRef]
[16] Shvachko, K. ; Kuang, H. ; Radia, S. ; Chansler, R. The Hadoop Distributed File System. In Proceedings of the IEEE 26th Symposium.
[17] Dean, J. ; Ghemawat, S. MapReduce: Simplified data processing on large cluster. Commun. ACM 2008, 51, 107–113. [CrossRef]
[18] Husamaldin, L. ; Saeed, N. Big Data Analytics Correlation Taxonomy. Information 2010, 11, 17. [CrossRef]
[19] Koo, J. ; Kang, G. ; Kim, Y. -G. Security and Privacy in Big Data Life Cycle: A Survey and Open Challenges. Sustainability 2020, 12,10571. [CrossRef]
[20] Damiani, E. ; Ardagna, C. A. ; Zavatarelli, F. ; Rekleitis, E. ; Marinos, L. Big Data Threat Landscape and Good Practice Guide; European Union Agency for Network and Information Security (ENISA): Athens, Greece, 2016.
[21] Big Data Working Group. Expanded Top Ten Big Data Security and Privacy Challenges. Cloud Security Alliance. 2013. Availableonline: https: //downloads. cloudsecurityalliance. org/ initiatives/bdwg/Expanded_Top_Ten_Big_Data_Security_and_Privacy_Challenges. PDF(accessed on 25 August 2021).
[22] Greene, T. ; Shmueli, G. ; Ray, S. ; Fell, J. Adjusting to the GDPR: The Impact on Data Scientists and Behavioral Researchers. BigData 2019, 7, 140–162. [CrossRef]
[23]Khan, R. A; Alka, K. An Improved Security Threat Model for Big Data Life Cycle. Asian J. Comput. Sci. Technol. 2018, 7, 33–39. [CrossRef]
[24] Rajan, S. (Ed.) Top 10 Big Data Security and Privacy Challenges; Cloud Security Alliance: Seattle, WA, USA, 2012;
[25] Yang, K; Lee, D; Kim, K; Yoon, H. Analysis of Security Threat and Security Requirements of the Bigdata System. J. Secur. Eng. 2016, 13, 501–514. [CrossRef]
[26] Abouelmehdi, K; Beni-Hssane, A; Khaloufi, H; Saadi, M. Big data security and privacy in healthcare: A Review. Procedia Comput. Sci. 2017, 113, 73–80. [CrossRef]
[27] Hossain, E. ; Khan, I. ; Un-Noor, F. ; Sikander, S. S. ; Sunny, S. H. Application of Big Data and Machine in Smart Grid, and Associated Security Concerns: A Review. IEEE Access 2019, 7, 13960–13988. [CrossRef]
[28]Mavroeidakos, T; Chaldeakis, V. Threat landscape of next generation IoT-enabled smart grids. In IFIP International Conference onArtificial Intelligence Applications and Innovations; Springer: Cham, Switzerland, 2020.
[29] Puthal, D; Ranjan, R; Chen, J. Big Data Stream Security Classification for IoT Applications. In Encyclopedia of Big Data Technologies; Springer: Cham, Switzerland, 2018. [CrossRef]
[30] Koo, J; Kim, Y. –G: Lee, S. H. Design of Security Architecture for the Cloud-Based Korea Military Command and Control System. J. Korean Inst. Commun. Inf. Sci. 2020, 45, 400–408. [CrossRef]
[31]Koo, J. ; Oh, S. -R. ; Lee, S. H. ; Kim, Y. -G. Security Architecture for Cloud-Based Command and Control System in IoT Environment. Appl. Sci. 2020, 10, 1035. [CrossRef]
[31] FedRAMP Security Controls Baseline. Available online: https: //www. fedramp. gov/documents/ (accessed on 11August 2021).
[32] FedRAMP Security Controls Baseline. Available online: https: //www. fedramp. gov/documents/ (accessed on 11August 2021).
[33] Cloud Computing Security Requirements Guide. Available online: https: //public. cyber. mil/dccs/dccsdocuments/ (accessed on11 August 2021).
[34]SecurityCertificationGuideforCloudService. Availableonline: https: //www. kisa. or. kr/public/laws/laws3_View. jsp?cPage=1&mode=view&p_No=259&b_No=259&d_No=91&ST=&SV= (accessed on 11 August 2021).
[35]SecurityRequirementsforServerVirtualizationSystem. Availableonline: http: //www. tta. or. kr/data/ttas_view. jsp?rn=1&pk_num=TTAK. KO-10. 0708 (accessed on 11 August 2021).
[36] Security Guidelines of National and Public Institution for Cloud Computing; National Intelligence Service: Seoul, Korea, 2016; pp. 101–103.
[37] Cloudera Inc. Cloudera Security Overview. August 2020. Available online: https: //docs. cloudera. com/cdp private-cloud-base/7. 1. 3/security-overview/cm-security-overview. pdf (accessed on 15 August 2021).
[38] Perwej, Y. The Hadoop Security in Big Data A Technological Viewpoint and Analysis. Int. J. Sci. Res. Comput. Sci. Eng. IJSRCSE2019, 7, 1–14.
[39] Shrihari, M. R. ; Manjunath, T. N. ; Archana, R. A. ; Hegadi, R. S. Research Challenges in Big Data Security with Hadoop Platform. In International Conference on Recent Trends in Image Processing and Pattern Recognition;Springer: Singapore, 2019; Volume 1037. [CrossRef]
[40] Martis, M. ; Pai, N. V. ; Pragathi, R. S. ; Rakshatha, S. ; Dixit, S. Comprehensive Survey on Hadoop Security. Emerg. Res. Comput. Inf. Commun. Appl. 2019, 227–236. [CrossRef].
[41] Peterson, G. Security Architecture Blueprint; Arctec Group, LLC.: Graz, Austria, 2007.
[42] Koo, J. ; Kim, Y. -G. ; Lee, S. H. Design of Security Architecture for the Cloud-Based Korea Military Command and Control System. J. Korean Inst. Commun. Inf. Sci. 2020, 45, 400–408. [CrossRef]
[43]. Koo, J. ; Oh, S. -R. ; Lee, S. H. ; Kim, Y. -G. Security Architecture for Cloud-Based Command and Control System in IoT Environment. Appl. Sci. 2020, 10, 1035. [CrossRef]
[44]. Shrihari, M. R. ; Manjunath, T. N. ; Archana, R. A. ; Hegadi, R. S. Research Challenges in Big Data Security with Hadoop Platform.
[45]. Perwej, Y. The Hadoop Security in Big Data A Technological Viewpoint and Analysis. Int. J. Sci. Res. Comput. Sci. Eng. IJSRCSE2019, 7, 1–14.
[46]. In International Conference on Recent Trends in Image Processing and Pattern Recognition; Springer: Singapore, 2019; Volume 1037. [CrossRef]
[47]. Martis, M. ; Pai, N. V. ; Pragathi, R. S. ; Rakshatha, S. ; Dixit, S. Comprehensive Survey on Hadoop Security. Emerg. Res. Comput. Inf. Commun. Appl. 2019, 227–236. [CrossRef]