Security evaluation of computer network based on hierarchy

被引:2
|
作者
Wen, Linbin [1 ]
机构
[1] Hunan Mass Media Vocational and Technical College, No. 5, Teli Road, Xingsha district, Changsha, Hunan,410100, China
来源
关键词
D O I
10.6633/IJNS.20190921(5).04
中图分类号
学科分类号
摘要
引用
收藏
页码:735 / 740
相关论文
共 50 条
  • [21] Application Analysis of Computer Network Security Technology Based on Network Security Maintenance
    Ma, Xiang
    Lecture Notes in Electrical Engineering, 2022, 827 LNEE : 1253 - 1258
  • [22] Application of DEA Method in Computer Network Security Evaluation
    Yang, Yan-mei
    Zhang, Yan-ling
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY, 2016, 60 : 127 - 131
  • [23] Study on Network Security Assessment Based on Analytical Hierarchy Process
    Qian Dong-mei
    Fan Chun-shu
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 2320 - 2323
  • [24] Component Based Information Network for Computer Security
    Ortiz, Joel
    Tomelden, Johnly
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 467 - 469
  • [26] GABP Neural Network Algorithm Applied in Evaluation of Computer Network Security
    He, Xiaochun
    Feng, JunJun
    Jia, Ruchun
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (12): : 377 - 387
  • [27] The Study on Network Security Strategy based on Security Evaluation
    Bi, Yan
    COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION III, 2014, 443 : 446 - 450
  • [28] Computer network security
    Janson, P
    Rudin, H
    COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (08): : 785 - 786
  • [29] On computer network security
    Ma, Ting-ting
    Renmin Changjiang/Yangtze River, 2000, 31 (01):
  • [30] Comprehensive evaluation model for computer network security with linguistic information
    Li Y.
    Shan X.
    Wu G.
    Advances in Information Sciences and Service Sciences, 2011, 3 (09): : 126 - 131