Self-Organizing of Network Security System Based on Non-optimum Analysis
暂无分享,去创建一个
[1] D. Fishman,et al. A penetration analysis of the Michigan Terminal System , 1980, OPSR.
[2] Lotfi A. Zadeh,et al. Fuzzy Sets , 1996, Inf. Control..
[3] Zengtang Qu,et al. Method of Non-optimum Analysis on Risk Control System , 2009, J. Softw..
[4] Ellis Horowitz,et al. Abstract data types and software validation , 1978, CACM.
[5] A. S. Sodiya,et al. Threat Modeling Using Fuzzy Logic Paradigm , 2007 .
[6] Jan H. P. Eloff,et al. Transaction Based Risk Analysis - Using Cognitive Fuzzy Techniques , 2001, Conference on Information Security Management & Small Systems Security.
[7] He Ping. On theory and practice of reliable innovation system , 2009 .
[8] John McHugh,et al. An Experience Using Two Covert Channel Analysis Techniques on a Real System Design , 1986, IEEE Transactions on Software Engineering.
[9] Jan H. P. Eloff,et al. Cognitive Fuzzy Modeling for Enhanced Risk Assessment in a Health Care Institution , 2000, IEEE Intell. Syst..
[10] He Ping. The method of attribute analysis in non-optimum to optimum , 2008 .