Security evaluation of computer network based on hierarchy

被引:2
|
作者
Wen, Linbin [1 ]
机构
[1] Hunan Mass Media Vocational and Technical College, No. 5, Teli Road, Xingsha district, Changsha, Hunan,410100, China
来源
关键词
D O I
10.6633/IJNS.20190921(5).04
中图分类号
学科分类号
摘要
引用
收藏
页码:735 / 740
相关论文
共 50 条
  • [1] Evaluation Model for Computer Network Information Security Based on Analytic Hierarchy Process
    Xi Zhen-yuan
    Chen He
    Wang Xiang-zhong
    Sheng Jian-ling
    Fan Yu-tao
    2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 3, PROCEEDINGS, 2009, : 186 - 189
  • [2] Computer network security evaluation model based on neural network
    Li, Xinwei
    Chen, Hui
    Ariann, Bryan
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (01) : 71 - 78
  • [3] Intelligent evaluation of computer network security based on neural network
    Wang, Longge
    Yu, Junyang
    Qiao, Baojun
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 35 (03) : 2887 - 2891
  • [4] Research on Computer Network Security Evaluation Based on Neural Network
    Gao, Jimin
    PROCEEDINGS OF THE 2017 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTER (MACMC 2017), 2017, 150 : 665 - 670
  • [5] Research on Computer Network Security Assessment Based on Fuzzy Analytic Hierarchy Process
    Li, Chun-yuan
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY, 2016, 60 : 110 - 115
  • [6] Computer Network Security Evaluation Based on Intelligent Algorithm
    Sun Ming
    2017 SIXTH INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION TECHNOLOGIES (FGCT), 2017, : 88 - 91
  • [7] Computer network security evaluation simulation model based on neural network
    Tang, Ying
    Elhoseny, Mohamed
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (03) : 3197 - 3204
  • [8] Research of computer network security evaluation based on RBF neural network
    Zhang, Yan-ling
    Xiong, Jian-liang
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY, 2016, 60 : 122 - 126
  • [9] Assessing Computer Network Security with Fuzzy Analytic Hierarchy Process
    Fei, Jun
    Xu, Huan
    2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 5, 2010, : 204 - 208
  • [10] The Evaluation Analysis of Computer Network Information Security based on FAHP
    Wu, Qian
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (09): : 229 - 242