[1] |
Xi Rongrong,Yun Xiaochun,Jin Shuyuan, et al.Research survey of network security situation awareness[J].Journal of Computer Applications, 2012,36(10):176178.(in Chinese)
|
[2] |
Xu Dezhi, Li Xiaohui.Recommendation algorithm of item ratings prediction based on cloud model[J].Computer Engineering, 2010,36(17):4850.(in Chinese)
|
[3] |
Zhang Hongbin,Pei Qingqi,Ma Jianfeng.An algorithm for sensing insider threat based on cloud model[J].Chinese Journal of Computers, 2009,32(6):784791.(in Chinese)
|
[4] |
Chen Xiuzhen, cZheng Qinghua, Guan Xiaohong, et al. Quantitative hierarchical threat evaluation model for network security[J].Journal of Software, 2006,17(4):885890.(in Chinese)
|
[5] |
Li Lingjuan, Kong Fanlong. A Hierarchical network security situation evaluation method based on grey theory[J]. Computer Technology and Development, 2010,20(8):163166.(in Chinese).
|
[6] |
Li Deyi,Du yi.Uncertianly artifical intelligence[M].Beijing: National Defence Industry Press,2005.(in Chinese)
|
[7] |
Li Deyi,Liu Changyu,Gan Wenyan.A new cognitive model: Cloud model[J]. International Journal of Intelligent Systems, 2009, 24(4), 357375.
|
[8] |
Lü Huijun, Wang Ye, Li Deyi, et al. The application of backward cloud in qualitative evaluation[J].Chinese Journal of Computers,2003,26(8):10091014.(in Chinese)
|
[9] |
Zhang Guoying, Liu Yushu. Cloud classifier based on attribute similarity[J]. Journal of Beijing Institute of Technology, 2006,25(6):499503.(in Chinese)
|
[10] |
Chen Liang, Pan Huiyong. Cloudmodel based decisionmaking for network risk assessment[J].Journal of Computer Applications, 2012,32(2):472475.(in Chinese)
|
[11] |
Yang Liu, Lü Yinghua.An evaluation model for network risk based on cloud theory[J].Computer Simulation, 2010,10(10):9598.(in Chinese)
|
[12] |
Wan Biao.The realization of evaluation for network intrusion based on cloud theory[J].Computer Engineering & Science,2010,32(12):2729.(in Chinese)
|
[13] |
Wu D, Mendel J M. A comparative study of ranking methods, similarity measures and uncertainty measures for interval type2 fuzzy sets[J].Information Sciences, 2009,179(8):11691192.
|
[14] |
Mendel J M, John R I B.Type2 fuzzy sets made simple [J].IEEE Transactions on Fuzzy Systems, 2002,10(2):117127.
|
[15] |
Mendel J M. On a 50% savings in the computation of a symmetrical interval type2 fuzzy set[J]. Information Sciences,2005,172(3):417430.
|
|
附中文参考文献:
|
[1] |
席荣荣,云晓春,金舒原,等. 网络安全态势感知研究综述 [J].计算机应用,2012,36(10):176178.
|
[2] |
徐德智,李小慧.基于云模型的项目评分预测推测算法[J].计算机工程,2010,36(17):4850.
|
[3] |
张红斌,裴庆祺,马建峰. 内部威胁云模型感知算法[J].计算机学报,2009,32(6):784791.
|
[4] |
陈秀真,郑庆华,管晓宏.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885890.
|
[5] |
李玲娟,孔凡龙.基于灰色理论的层次化网络安全态势评估方法[J].计算机技术与发展,2010,20(8):163166.
|
[6] |
李德毅,杜鹢.不确定性人工智能[M].北京:国防工业出版社,2005.
|
[8] |
吕辉军,王晔,李德毅.逆向云在定性评价中的应用[J].计算机学报,2003,26(8):10091014.
|
[9] |
张国英,刘玉树.基于属性相似度云模型分类器[J].北京理工大学学报,2006,25(6):499503.
|
[10] |
陈亮,潘惠勇.网络安全风险评估的云决策[J].计算机应用,2012,32(2):472475.
|
[11] |
杨柳,吕英华.基于云模型的网络风险评估技术研究[J].计算机仿真,2010,10(10):9598.
|
[12] |
万彪.网络入侵危险性评估的云理论实现[J].计算机工程与科学,2010,32(12):2729.
|