{"title":"基于模糊隶属度的校园网安全评价研究","authors":"Yan Shi","doi":"10.1109/ICSESS.2012.6269475","DOIUrl":null,"url":null,"abstract":"Evaluation of campus network security is a complicated systematic project. The paper analyzes the reasons of the questions, obtains the solving method, and at last builds the M(1,2,3) model without the interference of redundant data, which is different from )M(g+) and is a nonlinear model. The paper will apply the new algorithm in the fuzzy evaluation on campus network security.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The study on campus network security evaluation based on fuzzy membership\",\"authors\":\"Yan Shi\",\"doi\":\"10.1109/ICSESS.2012.6269475\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Evaluation of campus network security is a complicated systematic project. The paper analyzes the reasons of the questions, obtains the solving method, and at last builds the M(1,2,3) model without the interference of redundant data, which is different from )M(g+) and is a nonlinear model. The paper will apply the new algorithm in the fuzzy evaluation on campus network security.\",\"PeriodicalId\":205738,\"journal\":{\"name\":\"2012 IEEE International Conference on Computer Science and Automation Engineering\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-06-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 IEEE International Conference on Computer Science and Automation Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSESS.2012.6269475\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE International Conference on Computer Science and Automation Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSESS.2012.6269475","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The study on campus network security evaluation based on fuzzy membership
Evaluation of campus network security is a complicated systematic project. The paper analyzes the reasons of the questions, obtains the solving method, and at last builds the M(1,2,3) model without the interference of redundant data, which is different from )M(g+) and is a nonlinear model. The paper will apply the new algorithm in the fuzzy evaluation on campus network security.