期刊文献+

基于多目标决策灰度关联投影的网络安全评估 被引量:1

Network Security Evaluation Based on Grey Relation Projection Multi-Criteria Decision
下载PDF
导出
摘要 该文将多目标决策灰度关联投影方法应用于网络安全评估中,在构建网络安全评估结构模型的基础上,建立了灰度关联矩阵,求出了各项评估指标,实现了网络安全的综合评估和有针对性的改进网络安全。实际应用表明,该方法是十分有效的。 In this paper,applies grey relation projection multi-criteria decision method to the security evaluation of the network,constructs a network evaluation model,establishes a grey relation matrix,gets the weight of each index.realization of an integrated evaluation method of network security and the target-oriented improvement network security.A real application example showed that the method is very effective.
作者 杨金 陈清波
出处 《电脑知识与技术(过刊)》 2011年第10X期7243-7245,7248,共4页 Computer Knowledge and Technology
关键词 网络安全 安全评估 多目标决策 灰色关联投影法 network security security evaluation multi-Criteria decision grey relation projection method
  • 相关文献

参考文献2

二级参考文献13

  • 1吕锋,陈绵云.社会经济系统的灰性及其灰色趋势关联分析[J].武汉工业大学学报,1993,15(1):112-117. 被引量:9
  • 2Lowe G, Roscoe B. Using CSP to detect errors in the TMN protocol)[J]. IEEE Transactions on Software Engineering, 1997, 23(10), 659 -669.
  • 3Robert Thorhuus. Software fault injection testing [J]. Ericsson Telecom, Stockholm, Sweden, 2000,2.
  • 4John D Howard. An analysis of security incident on the internet[D]. Carnegie Mellon University, West Lafayette , USA, 1997.
  • 5Rodolphe Ortalo, Yves Deswarte, Mohamed Kaaniche. Experimenting with quantitative evaluation tools for monitoring operational security [R]. LAAS Report 96369, 1997,1.
  • 6Mare Daeier, Yves Deswarte, Mohamed Kaaniehe. Quantitative assessment of operational security: models and tools[R]. LAAS Research Report 96493, 1996, 5.
  • 7Steve Miksell, Scott Nainis W, Henry M James. Security vulnerability assessment tools for internet applications[Z]. White Paper, Information Technology Support Center, 2001,3.
  • 8John D McLean. Security model [J]. Encyclopedia of Software Engineering[M] ,Wiley & Sons. Inc , 1994.
  • 9Saaty T L . How to make a decision:the analytic hierarchy process [J]. European Journal of Operational Research, 1990, 1(48) : 9- 26.
  • 10Shafer G &Logan R. Implementing dempster's rule for hierarchical evidence[J]. Artificial Intelligence, i987,33:271-298.

共引文献197

同被引文献3

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部