{"title":"The study on campus network security evaluation based on fuzzy membership","authors":"Yan Shi","doi":"10.1109/ICSESS.2012.6269475","DOIUrl":null,"url":null,"abstract":"Evaluation of campus network security is a complicated systematic project. The paper analyzes the reasons of the questions, obtains the solving method, and at last builds the M(1,2,3) model without the interference of redundant data, which is different from )M(g+) and is a nonlinear model. The paper will apply the new algorithm in the fuzzy evaluation on campus network security.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE International Conference on Computer Science and Automation Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSESS.2012.6269475","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Evaluation of campus network security is a complicated systematic project. The paper analyzes the reasons of the questions, obtains the solving method, and at last builds the M(1,2,3) model without the interference of redundant data, which is different from )M(g+) and is a nonlinear model. The paper will apply the new algorithm in the fuzzy evaluation on campus network security.