The analysis of classified protection compliance detection based on Dempster-Shafer theory
暂无分享,去创建一个
Guoai Xu | Yixian Yang | Jia Liu | Yang Gao
[1] Feng Gao,et al. Risk evaluation using evidence reasoning theory , 2005, 2005 International Conference on Machine Learning and Cybernetics.
[2] Jonathan Weisberg,et al. Dempster-Shafer Theory , 2010 .
[3] M. J. Wierman. Measuring conflict in evidence theory , 2001, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569).
[4] Philippe Smets,et al. The Combination of Evidence in the Transferable Belief Model , 1990, IEEE Trans. Pattern Anal. Mach. Intell..
[5] Zhu Jing. Security risk assessment model of network based on D-S evidence theory , 2008 .
[6] Malcolm J. Beynon,et al. The Dempster-Shafer Theory , 2009, Encyclopedia of Artificial Intelligence.
[7] Thomas Guyet,et al. Expert Opinion Extraction from a Biomedical Database , 2017 .
[8] Glenn Shafer,et al. A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.
[9] Kari Sentz,et al. Combination of Evidence in Dempster-Shafer Theory , 2002 .