2019 ◽  
Vol 161 ◽  
pp. 1199-1205 ◽  
Author(s):  
Nur Azimah bt Mohd ◽  
Zarul Fitri Zaaba

2014 ◽  
Vol 686 ◽  
pp. 458-462
Author(s):  
Zi Yan Shi ◽  
Guo Lin Zhao ◽  
Qiao Lin Hu

The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the significance of the comprehensive network security risks. A network evaluation model and the algorithm are presented and adapt the hierarchical method to characterize the security risk situation. The evaluation method is used to evaluate the key nodes and the mathematics is used to analyze the whole network security situation. Compared with others, the method can automatically create a rule-based security evaluation model to evaluate the security threat from the individual security elements and the combination of security elements, and then evaluation the network situation. It is shown that this system provides a valuable model and algorithms to help to find the security rules, adjust the security measure, improve the security performance and design the appropriate security risk evaluation and management tools.


2012 ◽  
Vol 482-484 ◽  
pp. 2390-2395
Author(s):  
De Qiang Li

In the paper, we establish an evaluation system in the study of four aspects such as people, regulation, equipment and technology management, field management and engineering construction. We present an entropy weight multi-level fuzzy comprehensive evaluation model in power plant security on the basis of reliability identification. Firstly, it identifies the reliability of power plant security evaluation system. Secondly, it can meet the condition that the system is reliable. Then it obtains the indicator weight of all levels in the evaluation system by the entropy weight method. Finally, it carries out a comprehensive evaluation in power plant security by the multi-level fuzzy evaluation method.


Sign in / Sign up

Export Citation Format

Share Document