Extraction of Evaluation Rules of Network Security Based on Rough Set
CSTR:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    We present a network security evaluation index reduction method based on rough set theory. An algorithm with rough set theory to mine the rules of computer network security evaluation is proposed. The evaluation rules mining method presented in this paper is validated with a simplified network security evaluation data set.

    Reference
    Related
    Cited by
Get Citation

LIU Xiaoling, XIE Xianbin, ZHANG Jialu, et al. Extraction of Evaluation Rules of Network Security Based on Rough Set[J]. Journal of Integration Technology,2013,2(6):46-50

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:
  • Revised:
  • Adopted:
  • Online: December 04,2013
  • Published:
Article QR Code