Research on Information Security Risk Assessment Method Based on Fuzzy Rule Set

被引:0
|
作者
Cai, Wentian [1 ]
Yao, Huijun [2 ]
机构
[1] School of Cyber Science and Engineering, Southeast University, Nanjing,210096, China
[2] Jiangsu Broadcasting Cable Information Network Corp. Ltd., Nanjing,210096, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Security Risk Assessment Method Using Fuzzy Logic
    Ismagilov, Ilyas I.
    Molotov, Linar A.
    Gilmullin, Timur M.
    Anikin, Igor, V
    Katasev, Alexey S.
    HELIX, 2018, 8 (06): : 4674 - 4682
  • [32] A NEW LIGHTWEIGHT METHOD FOR SECURITY RISK ASSESSMENT BASED ON FUZZY COGNITIVE MAPS
    Szwed, Piotr
    Skrzynski, Pawel
    INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND COMPUTER SCIENCE, 2014, 24 (01) : 213 - 225
  • [33] A New Security Risk Assessment Method of Website Based on Generalized Fuzzy Numbers
    Jiang, Wen
    Fan, Xin
    Duanmu, Dejie
    Deng, Yong
    JOURNAL OF COMPUTERS, 2013, 8 (01) : 136 - 145
  • [34] Assessment of risk of information security by means of the theory of fuzzy sets
    Murathin, R.
    Satybaldina, D. Z.
    BULLETIN OF THE KARAGANDA UNIVERSITY-MATHEMATICS, 2015, 79 (03): : 66 - 74
  • [35] Apply Fuzzy Decision Tree to Information Security Risk Assessment
    Lee, Zne-Jung
    Chang, Li-Yun
    INTERNATIONAL JOURNAL OF FUZZY SYSTEMS, 2014, 16 (02) : 265 - 269
  • [36] Application of Fuzzy Logic in the Process of Information Security Risk Assessment
    Kokles, Mojmir
    Filanova, Jana
    Korcek, Frantisek
    INNOVATION MANAGEMENT AND EDUCATION EXCELLENCE VISION 2020: FROM REGIONAL DEVELOPMENT SUSTAINABILITY TO GLOBAL ECONOMIC GROWTH, VOLS I - VI, 2016, : 1078 - 1088
  • [37] Information systems security risk assessment on improved fuzzy AHP
    Wu, Xiaoping
    Fu, Yu
    Wang, Jiasheng
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 365 - 369
  • [38] An Information System Security Risk Assessment Model Based on Fuzzy Analytic Hierarchy Process
    Liu Dong-liang
    Yang Shi-song
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 874 - 877
  • [39] A Software Defined Network information security risk assessment based on Pythagorean fuzzy sets
    Deb, Raktim
    Roy, Sudipta
    EXPERT SYSTEMS WITH APPLICATIONS, 2021, 183
  • [40] Risk Assessment of Information System Security Based on Fuzzy Multiple Criteria Group AHP
    Sun, Shengchun
    Pu, Huaiyu
    Tian, Shuxin
    ADVANCES IN FUTURE COMPUTER AND CONTROL SYSTEMS, VOL 1, 2012, 159 : 385 - +