Network threat assessment method based on attribute recognition theory

2009 ◽  
Vol 29 (4) ◽  
pp. 956-958
Author(s):  
Yong-xin LI
2013 ◽  
Vol 734-737 ◽  
pp. 1578-1581
Author(s):  
Yan Yong Guo ◽  
Yao Wu ◽  
Liang Song ◽  
Hui Duan

This study developed an evaluation model of freeway traffic safety facilities system. Firstly, an evaluation system of freeway traffic safety facility was proposed. Secondly, an evaluation model was proposed based on attribute recognition theory. And the evaluation result was identified according to the attribute measure value of single index and the comprehensive attribute measure value of multiple indexes as well as the confidence criterion. Thirdly, the weight of each indicator was decided by variation coefficient. Finally, A case of TAI-GAN freeway (K1+242~K3+259 segment) was conducted to verify the feasibility and effectiveness of the model.


2019 ◽  
Vol 291 ◽  
pp. 01006
Author(s):  
Pingbo Yu ◽  
Gaofeng Liu ◽  
Li Gong

Warship’s air defense target threat assessment is an uncertainty issue. This paper briefly states the basic process and types of threat assessment methods for warship air defense, using comparative research method, the mechanism and characteristics of the certainty/uncertainty assessment method for target threat assessment are compared. It also analyzes the application of fuzzy theory, neural network and genetic fuzzy tree in target threat assessment, which has certain reference value for the research of warship air defense target threat assessment.


2017 ◽  
Author(s):  
Ying Zhang ◽  
Hongwei Wang ◽  
Xiaotao Guo ◽  
Yubing Wang

Author(s):  
Fang Deng ◽  
◽  
Xinan Liu ◽  
Zhihong Peng ◽  
Jie Chen

With the development of low-level data fusion technology, threat assessment, which is a part of high-level data fusion, is recognized by an increasing numbers of people. However, the method to solve the problem of threat assessment for various kinds of targets and attacks is unknown. Hence, a threat assessment method is proposed in this paper to solve this problem. This method includes tertiary assessments: information classification, reorganization, and summary. In the tertiary assessments model, various threats with multi-class targets and attacks can be comprehensively assessed. A case study with specific algorithms and scenarios is shown to prove the validity and rationality of this method.


Sign in / Sign up

Export Citation Format

Share Document