Fuzzy Evaluation of Network Vulnerability.
Rong ZhangXia RanChao WangYong DengPublished in: Qual. Reliab. Eng. Int. (2016)
Keyphrases
- fuzzy logic
- network model
- ahp method
- fuzzy sets
- evaluation method
- complex networks
- evaluation model
- network architecture
- fuzzy comprehensive evaluation
- network structure
- fuzzy rules
- soft computing
- peer to peer
- wireless sensor networks
- network configuration
- fuzzy cognitive maps
- network resources
- fuzzy set theory
- buffer overflow
- evaluation metrics
- network design
- fuzzy numbers
- evaluation criteria
- data mining
- network traffic
- membership functions
- intrusion detection
- social networks