An improved multilevel fuzzy comprehensive evaluation algorithm for security performance
暂无分享,去创建一个
[1] Sumit Ghosh,et al. A survey of recent advances in fuzzy logic in telecommunications networks and new challenges , 1998, IEEE Trans. Fuzzy Syst..
[2] Wang Hua. Multilevel fuzzy comprehensive evaluation method of network security , 2004 .
[3] Akhil Sahai,et al. A secure platform for peer-to-peer computing in the Internet , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[4] Wen Dou,et al. Trust based incentive in P2P network , 2004, IEEE International Conference on E-Commerce Technology for Dynamic E-Business.
[5] Miao Qiny. Characteristic Information Fusion Method on Network Security Strategic Indication/Warning System , 2002 .
[6] Michael K. Reiter,et al. Toward acceptable metrics of authentication , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[7] Lu Jian. Properties of Measure-based Fuzzy Logic , 2001 .
[8] WuMeng,et al. Fuzzy Mapping NetWork Using Hierarchical Genetically Learning Rules , 1994 .
[9] Shyi-Ming Chen,et al. Document retrieval using fuzzy-valued concept networks , 2001, IEEE Trans. Syst. Man Cybern. Part B.
[10] Robert Tappan Morris,et al. Security Considerations for Peer-to-Peer Distributed Hash Tables , 2002, IPTPS.