Using fuzzy logic for vulnerability assessment in telecommunication network
暂无分享,去创建一个
[1] Michio Sugeno,et al. Fuzzy identification of systems and its applications to modeling and control , 1985, IEEE Transactions on Systems, Man, and Cybernetics.
[2] Harold Booth,et al. CVSS Implementation Guidance , 2014 .
[3] E. H. Mamdani,et al. Application of Fuzzy Logic to Approximate Reasoning Using Linguistic Synthesis , 1976, IEEE Transactions on Computers.
[4] Igor V. Anikin,et al. Information security risk assessment and management method in computer networks , 2015, 2015 International Siberian Conference on Control and Communications (SIBCON).
[5] I. Anikin. Knowledge Representation Model and Decision Support System for Enhanced Oil Recovery Methods , 2022 .
[6] Igor Anikin,et al. Information security risk management in computer networks based on fuzzy logic and cost/benefit ratio estimation , 2015, SIN.
[7] lgor Anikin,et al. New Type of Takagi-Sugeno Fuzzy Inference System as Universal Approximator , 2014 .
[8] Lotfi A. Zadeh,et al. The Concepts of a Linguistic Variable and its Application to Approximate Reasoning , 1975 .
[9] John B. Shoven,et al. I , Edinburgh Medical and Surgical Journal.
[10] Michael G Williams,et al. A Risk Assessment on Raspberry PI using NIST Standards , 2018 .
[11] Robert LIN,et al. NOTE ON FUZZY SETS , 2014 .
[12] Yva Doually,et al. Information Technology , 1997, IFIP Advances in Information and Communication Technology.