Abstract | ||
---|---|---|
It is a multiple criteria problem to evaluate the security of information networks. However, one key issue which is not fully considered in extant studies is how to obtain the values of these multiple evaluation criteria, and in most evaluation models some redundant criteria values are calculated. Motivated by this, in the work we first use the pairwise comparison method to attain the values of each evaluation aspect of the security of information networks, and then develop a novel similarity-based M(1, 2, 3) approach to rate the security of alternative networks. Application study shows that the proposed approach could rate the overall security of alternative information networks and recognize the most vulnerable aspects of each information network, which provides good supports for making policies to enhance the security of alternative information networks. |
Year | DOI | Venue |
---|---|---|
2014 | 10.1109/SCIS-ISIS.2014.7044737 | SCIS&ISIS |
Keywords | Field | DocType |
security of data,alternative information networks,multiple evaluation criteria,redundant criteria values,security enhancement,similarity-based m(1,2,3) approach | Data mining,Pairwise comparison,Information networks,Multiple criteria,Computer science,Extant taxon,Artificial intelligence,Machine learning,Computer security model | Conference |
ISSN | Citations | PageRank |
2377-6870 | 0 | 0.34 |
References | Authors | |
5 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Junhu Ruan | 1 | 31 | 4.45 |
Yan Shi | 2 | 285 | 27.64 |
Samatsu, T. | 3 | 0 | 0.34 |