首页 | 本学科首页   官方微博 | 高级检索  
     

基于模糊层次分析法的计算机网络安全评价
引用本文:费军,余丽华.基于模糊层次分析法的计算机网络安全评价[J].计算机应用与软件,2011(10).
作者姓名:费军  余丽华
作者单位:华中师范大学管理学院;军事经济学院基础部;
基金项目:湖北省社会科学基金项目(101021)
摘    要:根据计算机网络的特点及网络安全涉及的因素,建立计算机网络安全评价的层次结构模型,运用基于三角模糊数的模糊层次分析法实现对网络安全的综合量化评价。实例的计算结果表明模糊层次分析法适用于定性判断的量化综合,它为计算机网络安全评价提供了一种探索性方法。

关 键 词:计算机网络  网络安全  评价  模糊层次分析法  三角模糊数  

COMPUTER NETWORK SECURITY ASSESSMENT WITH FUZZY ANALYTIC HIERARCHY PROCESS
Fei Jun Yu Lihua.COMPUTER NETWORK SECURITY ASSESSMENT WITH FUZZY ANALYTIC HIERARCHY PROCESS[J].Computer Applications and Software,2011(10).
Authors:Fei Jun Yu Lihua
Affiliation:Fei Jun1 Yu Lihua2 1(School of Management,Huazhong Normal University,Wuhan 430079,Hubei,China) 2(Department of Basic Courses,Military Economic College,Wuhan 430035,China)
Abstract:The hierarchy model of computer network security assessment was constructed in light of the characteristics of computer network and the factors influencing the network security.The fuzzy analytic hierarchy process based on triangular fuzzy numbers was applied to assess the network security comprehensively and quantitatively.Computation results of example indicate that the fuzzy analytic hierarchy process is suitable for quantitative integration of qualitative judgement,and it provides an exploratory approac...
Keywords:Computer network Network security Assessment Fuzzy analytic hierarchy process Triangular fuzzy number  
本文献已被 CNKI 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号