Uranium tailing dams security risk assessment based on fuzzy comprehensive evaluation method

Author(s):  
Zan Guo ◽  
Yong Liu ◽  
Fang-ke Lv
Author(s):  
You Ying Chen ◽  
Bing Xu ◽  
Jun Long

Network security issues have become increasingly prominent, and information security risk assessment is an important part of network security protection. Security risk assessment based on methods such as attack trees, attack graphs, neural networks, and fuzzy logic has problems such as difficulty in data collection during the assessment process, excessive reliance on expert experience, failure to consider the actual network environment, or ineffective joint application. The qualitative and quantitative information security fuzzy comprehensive evaluation method uses the theory of fuzzy mathematics to better solve the above problems, so that the evaluation method is scientific, comprehensive and operable. To improve the accuracy of information security risk assessment in wireless sensor networks, we propose a fuzzy comprehensive evaluation method based on Bayesian attack graphs. This considers the impact of environmental factors of the assessed system on security risk and the spread of the effects on the Bayesian network. Therefore, this model can reflect possible situations due to network attacks in the wireless sensor network system. The results show that this quantitative evaluation method is applicable to assessing risk in wireless sensor network systems, and the results are more objective and accurate.


2011 ◽  
Vol 130-134 ◽  
pp. 3708-3711
Author(s):  
Chuan Sheng Xie ◽  
Sheng Ping Hua ◽  
Da Peng Dong ◽  
Xiao Xi Jia

A fuzzy comprehensive evaluation method for nuclear power plants is introduced in this article. First, a risk index system is established of which these indicators will be explained accordingly latter. Then, an evaluation set is constructed, and the weight of each index and corresponding membership is determined according to suggestions of experts and membership function to make evaluation level by level ,until a final comprehensive evaluation is obtained. This method is not very objective but simple and available.


Sign in / Sign up

Export Citation Format

Share Document