CORC

浏览/检索结果: 共10条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Protection Intensity Evaluation for a Security System Based on Entropy Theory 期刊论文
ENTROPY, 2013, 卷号: 15, 期号: 7
作者:  Lv, Haitao;  Hu, Ruimin;  Chen, Jun;  He, Zheng;  Chen, Shihong
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05
Risk Assessment of Security Systems Based on Entropy Theory and Neyman-Pearson Criterion 会议论文
作者:  Lv, Haitao;  Hu, Ruimin
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/05
Review of Risk Assessment Approaches in the Area of Security System 会议论文
作者:  Qing Cai;  JingjingDai
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/05
The security assessment method of wireless sensor network with interval grey linguistic variables 期刊论文
International Journal of Digital Content Technology and its Applications, 2011, 卷号: 5, 期号: 10
作者:  Jiang, Yuan;  Jiang, Dongming
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/05
An approach to wireless sensor network security assessment with fuzzy number intuitionistic fuzzy information 期刊论文
Advances in Information Sciences and Service Sciences, 2011, 卷号: 3, 期号: 9
作者:  Jiang, Yuan;  Jiang, Dongming
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/05
Review of risk assessment approaches in the area of security system 期刊论文
Proceedings of 2011 International Conference on Computer Science and Network Technology, ICCSNT 2011, 2011, 卷号: 4
作者:  Dai, Jingjing;  Cai, Qing
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/05
Research the information security risk assessment technique based on Bayesian network 期刊论文
ICACTE 2010 - 2010 3rd International Conference on Advanced Computer Theory and Engineering, Proceedings, 2010, 卷号: 3
作者:  Lijian, Wang;  Bin, Wang;  Yongjun, Peng
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/05
The comprehensive assessment method for community risk based on AHP and neural network 期刊论文
NSWCTC 2010 - The 2nd International Conference on Networks Security, Wireless Communications and Trusted Computing, 2010, 卷号: 2
作者:  Lv, Haitao;  Peng, Yongjun;  Guo, Xi;  Bu, Hao;  Hu, Ruimin
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05
Network security assessment based on fuzzy sets and rough sets 期刊论文
Proceedings - 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009, 2009
作者:  Rui, Li;  Yi, Yang
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/05
Network Security Assessment based on Fuzzy Sets and Rough Sets 会议论文
作者:  Li, Rui;  Yang, Yi
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05


©版权所有 ©2017 CSpace - Powered by CSpace