文章引用说明 更多>> (返回到该文章)

Qi, Y.L. and An, H.L. (2010) The evaluation model of network se-curity based on fuzzy rough sets. In: Qi, Y.L. and An, H.L., Eds., Advances in Wireless Networks and Information Sys-tems, Springer, Berlin, 517-525.

被以下文章引用:

  • 标题: 网络安全评估技术综述Survey on Technology of Network Security Assessment

    作者: 赵孟, 谭玉波

    关键字: 互联网, 信息技术, 网络安全, 网络安全评估Internet, Information Technology, Network Security, Network Security Assessment

    期刊名称: 《Computer Science and Application》, Vol.5 No.1, 2015-02-16

    摘要: 互联网和信息技术的快速发展,使网络深深的融入到人们的生活中。然而,丰富的互联网服务应用也带来了更多的网络安全问题,网络安全评估技术是当前处理网络安全问题的一种策略。在阐述网络安全评估技术的基本概念、研究意义的基础上,给出了网络安全评估的体系结构,主要从基于数学模型的方法、基于知识推理的方法和基于模式识别的方法三方面分析其研究现状,讨论现有的技术的优势和不足,并探讨了未来的发展方向。With the rapid development of Internet and information technology, the network has been deeply integrated into our lives. However, the rich services and applications of the Internet bring more security problems. Technology of network security assessment is a strategy to deal with the prob-lems of network security at present. The basic concepts and research significance are shed light on. This paper described the architecture of network security assessment, and analyzed the research status mainly focusing on the method based on mathematical model, the method based on know-ledge reasoning and the method based on pattern recognition. Then the advantages and disad-vantages were pointed out respectively. Finally, some future research directions were given at the end.

在线客服:
对外合作:
联系方式:400-6379-560
投诉建议:feedback@hanspub.org
客服号

人工客服,优惠资讯,稿件咨询
公众号

科技前沿与学术知识分享