메뉴 건너뛰기




Volumn 8, Issue 4, 2011, Pages 76-83

Information security testing model based on variable weights fuzzy comprehensive evaluation

Author keywords

Analytic hierarchy process; Fuzzy comprehensive evaluation; Testing and evaluation for classified protection; Variable weights

Indexed keywords


EID: 80052002559     PISSN: 16735447     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (6)

References (18)
  • 4
  • 6
    • 80051988813 scopus 로고    scopus 로고
    • Preface of special issue: Theory and technology of testing and evaluation for information security[J]
    • FENG Dengguo. Preface of Special Issue: Theory and Technology of Testing and Evaluation for Information securityJ. Chinese Journal ofComputers, 2009, 32(4): 1-3.
    • (2009) Chinese Journal ofComputers , vol.32 , Issue.4 , pp. 1-3
    • Feng, D.1
  • 7
    • 80052006508 scopus 로고    scopus 로고
    • Beijing: Tsinghua University Press
    • FAN Hong, FENG Dengguo, WU Yafei. Method and Application of Risk Assessment of Information SecurityM. Beijing: Tsinghua University Press, 2006.
    • (2006)
    • Fan, H.1    Feng, D.2    Wu, Y.3
  • 10
    • 65349185023 scopus 로고    scopus 로고
    • A trust model based on behaviors risk evaluation [J]
    • ZHANG Runlian, WU Xiaonian, ZHOU Shengyuan, et d. A Trust Model Based on Behaviors Risk Evaluation J. Chinese Journal of Computers, 2009, 32(4): 688-698.
    • (2009) Chinese Journal of Computers , vol.32 , Issue.4 , pp. 688-698
    • Zhang, R.1    Wu, X.2    Zhou, S.3
  • 12
    • 0242439292 scopus 로고    scopus 로고
    • Research of subjective trust management model based on the fuzzy set theory [J]
    • TANG Wen, CHEN Zhong. Research of Subjective Trust Management Model Based on the Fuzzy Set Theory [J]. Journal of Software, 2003, 14(8): 1401-1408.
    • (2003) Journal of Software , vol.14 , Issue.8 , pp. 1401-1408
    • Tang, W.1    Chen, Z.2
  • 15
    • 78649399471 scopus 로고    scopus 로고
    • Information security risk assessment based on AHP and fuzzy entirety evaluation[J]
    • XIAO Long, QI Yong, LI Qianmu. Information Security Risk Assessment Based on AHP and Fuzzy Entirety Evaluation[J]. Computer Engineering and Applications, 2009, 45 (22): 82-85.
    • (2009) Computer Engineering and Applications , vol.45 , Issue.22 , pp. 82-85
    • Xiao, L.1    Qi, Y.2    Li, Q.3
  • 16
    • 77953280651 scopus 로고    scopus 로고
    • Analytic hierarchy process based on variable weights [J]
    • LI Chunhao, SUN Yonghe, JIA YanhuL Analytic Hierarchy Process Based on Variable Weights [J]. Systems Engineering-Theory & Practice, 2010, 30(4): 723-731.
    • (2010) Systems Engineering-Theory & Practice , vol.30 , Issue.4 , pp. 723-731
    • Chunhao, L.1    Yonghe, S.2    Jia, Y.3
  • 17
    • 80051971312 scopus 로고    scopus 로고
    • Application of variable weight entirety evaluation to safety assessment of highway in mountainous areas[J]
    • YOU Kesi, LU Sun, GU Wenjun. Application of Variable Weight Entirety Evaluation to Safety Assessment of Highway in Mountainous Areas[J]. Systems Engineering, 2010, 28(5): 85-88.
    • (2010) Systems Engineering , vol.28 , Issue.5 , pp. 85-88
    • You, K.1    Lu, S.2    Gu, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.