Security evaluation of computer network based on hierarchy

被引:2
|
作者
Wen, Linbin [1 ]
机构
[1] Hunan Mass Media Vocational and Technical College, No. 5, Teli Road, Xingsha district, Changsha, Hunan,410100, China
来源
关键词
D O I
10.6633/IJNS.20190921(5).04
中图分类号
学科分类号
摘要
引用
收藏
页码:735 / 740
相关论文
共 50 条
  • [41] Security Evaluation of Hosts Based on Network Traffic
    Gao, Cuixia
    Li, Zhitang
    Chen, Lin
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 901 - 905
  • [42] Evaluation of Internet of Things computer network security and remote control technology
    Lu, Haifeng
    Wu, Haiwei
    Jing, Ru
    OPEN COMPUTER SCIENCE, 2024, 14 (01):
  • [43] Network Security Situation Assessment and Prediction Technology based on Analytic Hierarchy Process
    Shi, Xiaohong
    He, Song
    Tang, Huihui
    Liu, Chenglong
    Chen, Gong
    2022 IEEE 2nd International Conference on Electronic Technology, Communication and Information, ICETCI 2022, 2022, : 962 - 966
  • [44] A Hybrid Model for Evaluation Computer Network Security Risk in Commercial Bank
    Shen, Lixiang
    Cao, Guo
    Cao, Suzhen
    BIOTECHNOLOGY, CHEMICAL AND MATERIALS ENGINEERING, PTS 1-3, 2012, 393-395 : 531 - +
  • [45] Research on neural networks in computer network security evaluation and prediction methods
    Wei, Hanyu
    Zhao, Xu
    Shi, Baolan
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2024, 28 (03) : 497 - 516
  • [46] Computer design specialty evaluation based on analytic hierarchy process theory
    Chang, Qing
    Energy Education Science and Technology Part A: Energy Science and Research, 2014, 32 (06): : 7865 - 7872
  • [47] Attack graph based evaluation of network security
    Kotenko, Igor
    Stepashkin, Mikhail
    COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 216 - 227
  • [48] Network Security Architecture Based on Vulnerability Evaluation
    Li, June
    Wang, Tongqing
    Zhou, Dongru
    ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 1, 2008, : 104 - 109
  • [49] Neural networks applicated in computer network security evaluation and reliability analysis
    Zhao Jinping
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 105 - 108
  • [50] Computer Network Security: Then and Now
    Witzke, Edward L.
    2016 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2016, : 233 - 239