Information Security Assessment Data and Control Algorithm

Article Preview

Abstract:

To avoid the cost due to security problems, the repair and defense the threat of information, this paper build information system CAACM the tree structure model, through the study of the characteristics of attribute date classification, and then reconstruct the formula defined data characteristics depend on the degree of classification properties can be achieved, propose a classification attribute data for feature selection algorithm. Simulation result demonstrates the effectiveness of the algorithm.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2925-2928

Citation:

Online since:

November 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Huang Chengzhe Information security risk assessment tools are reviewed. Heilongjiang Institute of Technology [J]. 2008. 23(2): 45-48.

Google Scholar

[2] Ren Xueli. Rough sets and Bayesian network application software risk assessment [J]. Computer Systems & Applications. 2010, 19(5): 118-120.

Google Scholar

[3] Xueyong, high Guohong, Sun Xuejia. Based on mutual information and K-means clustering information security risk assessment, [J] Henan Normal University. 2011, 39(2): 152-155.

Google Scholar

[4] Dang Depeng, Meng Zhen. Based on Support Vector Machine Information Security Risk Assessment [J], Huazhong University of Science and Technology, 2010, 38(3): 46 -49.

Google Scholar

[5] Liu Haiyan, Wang Chao, etc. Conditions of mutual information based feature selection algorithm improvements [J]. Computer Engineering . 2012, 38(14): 135-137.

Google Scholar

[6] Wnag Pei, Software defect prediction for mutual information feature selection method [J], Computer Applications. 2012, 32(6): 1738-174.

Google Scholar