4.6 Article

A Novel Network Security Risk Assessment Approach by Combining Subjective and Objective Weights under Uncertainty

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

D-AHP method with different credibility of information

Xinyang Deng et al.

SOFT COMPUTING (2019)

Article Computer Science, Artificial Intelligence

An Evidential Axiomatic Design Approach for Decision Making Using the Evaluation of Belief Structure Satisfaction to Uncertain Target Values

Xinyang Deng et al.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2018)

Article Computer Science, Artificial Intelligence

Intuitionistic Fuzzy Power Aggregation Operator Based on Entropy and Its Application in Decision Making

Wen Jiang et al.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2018)

Article Automation & Control Systems

Intuitionistic fuzzy evidential power aggregation operator and its application in multiple criteria decision-making

Wen Jiang et al.

INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE (2018)

Article Nuclear Science & Technology

Dependence assessment in human reliability analysis based on evidence credibility decay model and IOWA operator

Xianglin Zheng et al.

ANNALS OF NUCLEAR ENERGY (2018)

Article Computer Science, Information Systems

Dependent Evidence Combination Based on Shearman Coefficient and Pearson Coefficient

Honghui Xu et al.

IEEE ACCESS (2018)

Article Computer Science, Artificial Intelligence

Uncertainty measure in evidence theory with its applications

Xiaodan Wang et al.

APPLIED INTELLIGENCE (2018)

Article Computer Science, Artificial Intelligence

An improved distance-based total uncertainty measure in belief function theory

Xinyang Deng et al.

APPLIED INTELLIGENCE (2017)

Article Computer Science, Artificial Intelligence

A modified combination rule in generalized evidence theory

Wen Jiang et al.

APPLIED INTELLIGENCE (2017)

Article Automation & Control Systems

An Uncertainty Measure for Interval-valued Evidences

W. Jiang et al.

INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL (2017)

Article Engineering, Multidisciplinary

A Method to Identify the Incomplete Framework of Discernment in Evidence Theory

Wen Jiang et al.

MATHEMATICAL PROBLEMS IN ENGINEERING (2017)

Article Computer Science, Information Systems

A LogitBoost-Based Algorithm for Detecting Known and Unknown Web Attacks

Muhammad Hilmi Kamarudin et al.

IEEE ACCESS (2017)

Article Computer Science, Information Systems

A CONCEPTUAL MODEL TO SUPPORT SECURITY ANALYSIS IN THE INTERNET OF THINGS

Orestis Mavropoulos et al.

COMPUTER SCIENCE AND INFORMATION SYSTEMS (2017)

Article Computer Science, Artificial Intelligence

Failure mode and effects analysis based on a novel fuzzy evidential method

Wen Jiang et al.

APPLIED SOFT COMPUTING (2017)

Article Mathematics, Interdisciplinary Applications

Deng entropy

Yong Deng

CHAOS SOLITONS & FRACTALS (2016)

Article Engineering, Industrial

Cyber-physical systems in manufacturing

L. Monostori et al.

CIRP ANNALS-MANUFACTURING TECHNOLOGY (2016)

Article Computer Science, Information Systems

From old to new: Assessing cybersecurity risks for an evolving smart grid

Lucie Langer et al.

COMPUTERS & SECURITY (2016)

Article Computer Science, Information Systems

A Survey of Security in Software Defined Networks

Sandra Scott-Hayward et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)

Article Computer Science, Artificial Intelligence

A new distance-based total uncertainty measure in the theory of belief functions

Yi Yang et al.

KNOWLEDGE-BASED SYSTEMS (2016)

Review Computer Science, Information Systems

Computer operating system logging and security issues: a survey

Lei Zeng et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Article Automation & Control Systems

Evidence Combination From an Evolutionary Game Theory Perspective

Xinyang Deng et al.

IEEE TRANSACTIONS ON CYBERNETICS (2016)

Article Computer Science, Artificial Intelligence

Generalized evidence theory

Yong Deng

APPLIED INTELLIGENCE (2015)

Article Computer Science, Artificial Intelligence

An improved conflicting evidence combination approach based on a new supporting probability distance

Cholsok Yu et al.

EXPERT SYSTEMS WITH APPLICATIONS (2015)

Article Computer Science, Information Systems

A Survey of Intrusion Detection Systems in Wireless Sensor Networks

Ismail Butun et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Computer Science, Information Systems

Game Theory for Network Security

Xiannuan Liang et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)

Article Engineering, Electrical & Electronic

Cyber-Physical System Security for the Electric Power Grid

Siddharth Sridhar et al.

PROCEEDINGS OF THE IEEE (2012)

Review Computer Science, Information Systems

A survey of cyber crimes

Yanping Zhang et al.

SECURITY AND COMMUNICATION NETWORKS (2012)

Article Computer Science, Artificial Intelligence

An information systems security risk assessment model under uncertain environment

Nan Feng et al.

APPLIED SOFT COMPUTING (2011)

Article Mathematics, Applied

A model for evaluating computer network security systems with 2-tuple linguistic information

Shilin Zhang

COMPUTERS & MATHEMATICS WITH APPLICATIONS (2011)

Article Computer Science, Hardware & Architecture

Improving the Cyber Security of SCADA Communication Networks

Sandip C. Patel et al.

COMMUNICATIONS OF THE ACM (2009)

Article Computer Science, Cybernetics

Measuring ambiguity in the evidence theory

Anne-Laure Jousselme et al.

IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS (2006)

Article Computer Science, Artificial Intelligence

Combining belief functions based on distance of evidence

Y Deng et al.

DECISION SUPPORT SYSTEMS (2004)

Article Computer Science, Artificial Intelligence

Combining belief functions when evidence conflicts

CK Murphy

DECISION SUPPORT SYSTEMS (2000)