Advanced Search
LIU Xiaoling, XIE Xianbin, ZHANG Jialu, LIU Lingli. Extraction of Evaluation Rules of Network Security Based on Rough Set[J]. Journal of Integration Technology, 2013, 2(6): 46-50. DOI: 10.12146/j.issn.2095-3135.201312010
Citation: LIU Xiaoling, XIE Xianbin, ZHANG Jialu, LIU Lingli. Extraction of Evaluation Rules of Network Security Based on Rough Set[J]. Journal of Integration Technology, 2013, 2(6): 46-50. DOI: 10.12146/j.issn.2095-3135.201312010

Extraction of Evaluation Rules of Network Security Based on Rough Set

  • We present a network security evaluation index reduction method based on rough set theory. An algorithm with rough set theory to mine the rules of computer network security evaluation is proposed. The evaluation rules mining method presented in this paper is validated with a simplified network security evaluation data set.
  • loading

Catalog

    Turn off MathJax
    Article Contents

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return