AbstractImprecise or vague importance as well as satisfaction levels of criteria may characterize the evaluation of alternative network security systems and may be treated by the fuzzy set theory. As fuzzy numbers are adopted, the fuzzy weighted averages (FWAs) may become a suitable computation for the fuzzy criteria ratings and fuzzy weightings. In this paper, we propose to use the FWA approach that operates on the fuzzy numbers and obtains the fuzzy weighted averages during the evaluations of network security systems. The algorithm constructs a benchmark adjustment solution approach for FWA. A case study of the evaluation of network security systems is provided and demonstrates the usefulness of this study
Visual data mining techniques are used to assess which metrics are most effective at detecting diffe...
Abstract. In this paper, we conduct research on the enhancement of computer network robustness metho...
Trust can play an important role for the sharing of resources and information in open network enviro...
AbstractImprecise or vague importance as well as satisfaction levels of criteria may characterize th...
With the development of information and communications technology, communication technology has been...
Network information system security has become a global issue since it is related to the economic de...
This research attempts to develop fuzzy based threat analysis model in which; linguistic variable, f...
Nowadays, computer networks are playing a more and more important role in people’s daily lives. Mean...
Cyber-attacks are getting increasingly complex, and as a result, the functional concerns of intrusio...
The proposed methods are considered in a concrete example of Apache web server version vulnerability...
Modern security problems focus on sensibly allocating resources to decrease the magnitude of potenti...
Organizations rely on security experts to improve the security of their systems. These professionals...
In a world made of interconnected systems which manage huge amounts of confidential and shared data,...
Voltage ranking is an important part of power system security assessment. The commonly used performa...
In a world made of interconnected systems that manage huge amount of confidential and shared data, s...
Visual data mining techniques are used to assess which metrics are most effective at detecting diffe...
Abstract. In this paper, we conduct research on the enhancement of computer network robustness metho...
Trust can play an important role for the sharing of resources and information in open network enviro...
AbstractImprecise or vague importance as well as satisfaction levels of criteria may characterize th...
With the development of information and communications technology, communication technology has been...
Network information system security has become a global issue since it is related to the economic de...
This research attempts to develop fuzzy based threat analysis model in which; linguistic variable, f...
Nowadays, computer networks are playing a more and more important role in people’s daily lives. Mean...
Cyber-attacks are getting increasingly complex, and as a result, the functional concerns of intrusio...
The proposed methods are considered in a concrete example of Apache web server version vulnerability...
Modern security problems focus on sensibly allocating resources to decrease the magnitude of potenti...
Organizations rely on security experts to improve the security of their systems. These professionals...
In a world made of interconnected systems which manage huge amounts of confidential and shared data,...
Voltage ranking is an important part of power system security assessment. The commonly used performa...
In a world made of interconnected systems that manage huge amount of confidential and shared data, s...
Visual data mining techniques are used to assess which metrics are most effective at detecting diffe...
Abstract. In this paper, we conduct research on the enhancement of computer network robustness metho...
Trust can play an important role for the sharing of resources and information in open network enviro...