Security evaluation of computer network based on hierarchy

被引:2
|
作者
Wen, Linbin [1 ]
机构
[1] Hunan Mass Media Vocational and Technical College, No. 5, Teli Road, Xingsha district, Changsha, Hunan,410100, China
来源
关键词
D O I
10.6633/IJNS.20190921(5).04
中图分类号
学科分类号
摘要
引用
收藏
页码:735 / 740
相关论文
共 50 条
  • [31] A Danger Theory Inspired Security Evaluation Paradigm for Computer Network
    Sun, Feixian
    MATERIALS SCIENCE AND ENGINEERING, PTS 1-2, 2011, 179-180 : 1333 - 1337
  • [32] Application of the Projection Pursuit Technique in the Evaluation of Computer Network Security
    Zhang, Yunlong
    Hua, Yong
    Zhang, Huimin
    Jing, Rongzhi
    ELECTRONIC INFORMATION AND ELECTRICAL ENGINEERING, 2012, 19 : 385 - 387
  • [33] An Evaluating Hierarchy for Distribution Network based on Fuzzy Evaluation
    Feng, Pan
    Ming, Zong
    Min, Zhou
    T& D ASIA: 2009 TRANSMISSION & DISTRIBUTION CONFERENCE & EXPOSITION: ASIA AND PACIFIC, 2009, : 346 - 349
  • [34] Research on computer network security based on pattern recognition
    Zhou, LY
    Liu, FY
    2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 1278 - 1283
  • [35] Research on the Security of Electronic Commerce Based on Computer Network
    Jiang Xuehui
    2013 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND ENGINEERING APPLICATIONS, 2013, : 541 - 545
  • [36] Computer network security technology based on artificial intelligence
    Hua, Tao
    Li, Laixiang
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (05) : 6021 - 6028
  • [37] Research on the computer network security evaluation based on the DHFHCG operator with dual hesitant fuzzy information
    Zhang, Yu
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2015, 28 (01) : 199 - 204
  • [38] Research on Computer Network Security Technology Based on the BP Neural Network
    He, Xiaochun
    Kan, Ping
    2015 SSR International Conference on Social Sciences and Information (SSR-SSI 2015), Pt 2, 2015, 11 : 581 - 584
  • [39] Computer Network Security Threats and Treatment Measures Based on Host Security Protection
    Jiang, Jianfeng
    Journal of Physics: Conference Series, 2021, 1992 (03)
  • [40] An approach to network security evaluation of computer network information system with triangular fuzzy information
    Guo, Jin-cheng
    Fan, Dan
    Che, Hao-yuan
    Duan, Yun-na
    Wang, Hong-Su
    Zhang, Da-Wei
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2015, 28 (05) : 2029 - 2035