The Application of Fuzzy-ANP in Evaluation Index System of Computer Security

Article Preview

Abstract:

In recent decades most work organizations have come to rely on information technology for internal operations such as record-keeping, external transactions such as financial transfers, and mediated communications. An evaluation is needed in order to determine the priority of risk for patching-up vulnerabilities.This paper applies fuzzy-ANP methodology to evaluate the factors of computer security.

You might also be interested in these eBooks

Info:

Periodical:

Key Engineering Materials (Volumes 439-440)

Pages:

754-759

Citation:

Online since:

June 2010

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2010 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Yeu-Pong Lai, Po-Lun Hsia. Using the vulnerability information of computer systems to improve the network security. computer communications. Vol. 30 (2007)p.2032-(2047).

DOI: 10.1016/j.comcom.2007.03.007

Google Scholar

[2] Igino Corona, Giorgio Giacinto. ect. Information fusion for computer security: State of the art and open issues. Information Fusion. Vol. 10(2009) pp.274-284.

DOI: 10.1016/j.inffus.2009.03.001

Google Scholar

[3] Kerry-Lynn Thomson, Rossouw von Solms. Information security obedience: a definition. computer & security. Vol. 24(2005), pp.69-75.

DOI: 10.1016/j.cose.2004.10.005

Google Scholar

[4] Ji-yu Wei, Chun-hui Wang. A novel approach-Fuzzy ANP for distribution center location. 2009International Conference on Machine Learning and Cybernetics. Vol. 1(2009) p.538.

DOI: 10.1109/icmlc.2009.5212492

Google Scholar

[5] Chang, D.Y., Application of the extent analysis method on fuzzy AHP, European Journal of Operational Research, Vol. 95(1996) pp.649-655.

DOI: 10.1016/0377-2217(95)00300-2

Google Scholar

[6] ZHU Qiang, YAN Zi- gang, Supplier Selection Decision- making Method Based on AHP and TOPSIS Algorithm, Communications Standardization, no. 02/03(2008) pp.197-201.

Google Scholar

[7] Wang pu, Zuo xiufeng. Basted on ANP for supplier selection, " Science Technology and Industry, Vol. 5 (2005), pp.55-56.

Google Scholar

[8] Wang han, Huang ming, The Research on Supplier Selection in Supply Chain Management, Journal of Dalian Railway Institute, vol. 22, (2001) pp.41-44.

Google Scholar