Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们 横山亮次奖 百年刊庆
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  横山亮次奖  |  百年刊庆
清华大学学报(自然科学版)  2017, Vol. 57 Issue (8): 892-896    DOI: 10.16511/j.cnki.qhdxxb.2017.22.056
  计算机科学与技术 本期目录 | 过刊浏览 | 高级检索 |
利用三角模糊数的语言变量项集减项算法
陈宇, 王娜, 王晋东
解放军信息工程大学 密码工程学院, 郑州 450002
An n-fold reduction of linguistic variables based on the triangular fuzzy numbers
CHEN Yu, WANG Na, WANG Jindong
Institute of Cipher Engineering, Information Engineering University, Zhengzhou 450002, China
全文: PDF(1049 KB)  
输出: BibTeX | EndNote (RIS)      
摘要 现有基于模糊语言变量的信息系统风险评估方法的运行,一般需要在相关领域专家协助下产生由标准参数梯形模糊数描述的语言变量项集,此类方法的实践有效性往往取决于其在专家无法参与的情况下处理不同类型模糊数以及变化的语言变量项集的能力。该文提出了一种利用三角模糊数的n阶语言变量项集减项算法,并采用4类典型的语言变量三角模糊数对该方法的正确性进行验证。结果表明:在无需相关领域专家介入的情况下,该方法能够实现n阶语言变量项集等价变换过程的自动化,为现有的信息安全风险评估系统的改进提供了方法。
服务
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章
陈宇
王娜
王晋东
关键词 计算机网络风险评估语言变量项集变换语言变量模糊数三角模糊数    
Abstract:Existing information system risk assessment methods based on fuzzy language variables generally requires that the language variable itemsets generated by the standard parameter trapezoidal fuzzy numbers which are generated by experts in the field. The effectiveness of this approach then often depends on its ability to deal with different types of fuzzy numbers and changing linguistic variable itemsets when the expert cannot participate. This study presents a method for an n-fold reduction of the linguistic variables based on the triangular fuzzy numbers that is validated using four types of fuzzy numbers for language variables. The results show that the method automates the equivalent transformation of n-fold language variable items without expert intervention to improve information security risk assessment systems.
Key wordscomputer network    risk assessment    linguistic variables    transformation of itemsets    fuzzy numbers of linguistic variables    triangular fuzzy numbers
收稿日期: 2016-12-19      出版日期: 2017-08-15
ZTFLH:  TP393.08  
引用本文:   
陈宇, 王娜, 王晋东. 利用三角模糊数的语言变量项集减项算法[J]. 清华大学学报(自然科学版), 2017, 57(8): 892-896.
CHEN Yu, WANG Na, WANG Jindong. An n-fold reduction of linguistic variables based on the triangular fuzzy numbers. Journal of Tsinghua University(Science and Technology), 2017, 57(8): 892-896.
链接本文:  
http://jst.tsinghuajournals.com/CN/10.16511/j.cnki.qhdxxb.2017.22.056  或          http://jst.tsinghuajournals.com/CN/Y2017/V57/I8/892
  表1 m=5的各类三角模糊数示例
  图1 T(3) DR 的均匀分布信息安全语言变量三角模糊数值
  图2 T(2) DR 的均匀分布信息安全语言变量三角模糊数值
  图3 T(3) DR 的非均匀分布型信息安全语言变量三角模糊数值
  图4 T(3) DR 的递增分布型信息安全语言变量三角模糊数值
  图5 T(3) DR 的递减分布信息安全语言变量三角模糊数值
[1] 徐征捷. 基于模糊FMECA方法的列控中心安全风险评估研究[D]. 兰州:兰州交通大学, 2014:37-39.XU Zhengjie. Research on Safety Risk Assessment of Train Control Center Based on Fuzzy-FMECA Method[D]. Lanzhou:Lanzhou Jiaotong University, 2014:37-39. (in Chinese)
[2] 黄慧萍, 肖世德, 孟祥印, 等. 基于攻击树的工业控制系统信息安全风险评估[J]. 计算机应用研究, 2015, 32(10):3022-3025.HUANG Huiping, XIAO Shide, MENG Xiangyin, et al. Industrial control systems information security risk assessment based on attack tree[J]. Application Research of Computers, 2015, 32(10):3022-3025. (in Chinese)
[3] Korchenko O, Kazmirchuk S, Akhmetov B, et al. Increment order of linguistic variables method in information security risk assessment[C]//IEEE International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T). Kharkiv, 2015:259-262.
[4] 沈利香, 曹国. 基于灰色加性语言变量和灰色关联分析的网络安全风险评估方法[J]. 计算机应用与软件, 2013(9):110-113.SHEN Lixiang, CAO Guo. A network security risk evaluation method based on grey additive linguistic variable and grey relation analysis[J]. Computer Applications and Software, 2013(9):110-113. (in Chinese)
[5] Pandita R, Xiao X, Yang W, et al. WHYPER:Towards automating risk assessment of mobile applications[C]//The 22nd USENIX Security Symposium (USENIX Security 13). Washington DC, 2013:527-542.
[6] Emrouznejad A, Marra M. Ordered weighted averaging operators 1988-2014:A citation-based literature survey[J]. International Journal of Intelligent Systems, 2014, 29(11):994-1014.
[7] Doukas H, Tsiousi A, Marinakis V, et al. Linguistic multi-criteria decision making for energy and environmental corporate policy[J]. Information Sciences, 2014, 258(3):328-338.
[8] Taylan O, Bafail A O, Abdulaal R M S, et al. Construction projects selection and risk assessment by fuzzy AHP and fuzzy TOPSIS methodologies[J]. Applied Soft Computing, 2014, 17:105-116.
[9] Karsak E E, Dursun M. An integrated supplier selection methodology incorporating QFD and DEA with imprecise data[J]. Expert Systems with Applications, 2014, 41(16):6995-7004.
[10] Geng X, Gong X, Chu X. Component oriented remanufacturing decision-making for complex product using DEA and interval 2-tuple linguistic TOPSIS[J]. International Journal of Computational Intelligence Systems, 2016, 9(5):984-1000.
[11] Mohammad K S, Ahmad M. A new view to uncertainty in ELECTRE Ⅲ method by introducing interval numbers[J]. Decision Science Letters, 2012, 1(1):33-38.
[12] Jamshidi A, Yazdani-Chamzini A, Yakhchali S H, et al. Developing a new fuzzy inference system for pipeline risk assessment[J]. Journal of Loss Prevention in the Process Industries, 2013, 26(1):197-208.
[13] 韩二东, 郭鹏, 赵静, 等. 二元语义处理不同偏好评价信息的群决策方法[J]. 计算机工程与应用, 2015, 51(4):35-40.HAN Erdong, GUO Peng, ZHAO Jing. Group decision making method based on two-tuple linguistic with different forms of preference evaluation information[J]. Computer Engineering and Applications, 2015, 51(4):35-40. (in Chinese)
[14] 谭磊. 基于模糊逻辑的信息安全风险评估系统设计与实现[D]. 成都:电子科技大学, 2014:13-16.TAN Lei. The Design and Implementation of Information Security Risk Assessment System Based on Fuzzy Logic[D]. Chengdu:University of Electronic Science and Technology of China, 2014:13-16. (in Chinese)
[15] 韩二东, 郭鹏, 赵静. 区间灰色不确定语言多属性群决策方法[J]. 计算机科学与探索, 2016, 10(1):93-102.HAN Erdong, GUO Peng, ZHAO Jing. Method for multi-attribute group decision making based on interval grey uncertain linguistic information[J]. Journal of Frontiers of Computer Science and Technology, 2016, 10(1):93-102. (in Chinese)
[16] TANG Yongli, WANG Lihua, YANG Lishen, et al. Information security risk assessment method based on cloud model[C]//IET Irish Signals & Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communities Technologies. Limerick, 2014:258-262.
[17] Korchenko A G, Kazmirchuk S V, Gololobov A Y, et al. Method n-fold increase in the number of terms of linguistic variables for the analysis and evaluation of the risk[J]. Information Security, 2014, 16(4):284-291. (in Russian)
[18] Korchenko A G, Kazmirchuk S V, Gololobov A Y. A method of converting parameters of standards for systems analysis and assessment of information security risks[J]. Information Security, 2013, 15(4):359-366. (in Russian)
[19] 范英, 李辰, 晋民杰, 等. 三角模糊数和层次分析法在风险评价中的应用研究[J]. 中国安全科学学报, 2014, 24(7):70-74.FAN Ying, LI Chen, JIN Minjie, et al. Research on application of triangular fuzzy number and AHP in risk evalution[J]. China Safety Science Journal, 2014, 24(7):70-74. (in Chinese)
[20] 吴军, 董星, 方强, 等. 基于三角模糊数层次分析法的武器系统效能评估研究[J]. 中国机械工程, 2013, 24(11):1442-1446.WU Jun, DONG Xing, FANG Qiang, et al. A novel effectiveness assessment method of weapon system based on triangular fuzzy number analytic hierarchy process[J]. Chinese Journal of Mechanical Engineering, 2013, 24(11):1442-1446. (in Chinese)
[1] 疏学明, 颜峻, 胡俊, 吴津津, 邓博誉. 基于Bayes网络的建筑火灾风险评估模型[J]. 清华大学学报(自然科学版), 2020, 60(4): 321-327.
[2] 耿海军, 刘洁琦, 尹霞. 基于段路由的单节点故障路由保护算法[J]. 清华大学学报(自然科学版), 2018, 58(8): 710-714.
[3] 刘武, 王永科, 孙东红, 任萍, 刘柯. 开源智能终端认证漏洞挖掘及登录认证改进[J]. 清华大学学报(自然科学版), 2017, 57(9): 897-902.
[4] 李舟军, 吴春明, 王啸. 基于沙盒的Android应用风险行为分析与评估[J]. 清华大学学报(自然科学版), 2016, 56(5): 453-460.
[5] 马刚, 杜宇鸽, 杨熙, 张博, 史忠植. 复杂系统风险评估专家系统[J]. 清华大学学报(自然科学版), 2016, 56(1): 66-76,82.
[6] 苏伯尼, 黄弘, 张楠. 基于情景模拟的城市内涝动态风险评估方法[J]. 清华大学学报(自然科学版), 2015, 55(6): 684-690.
[7] 赵金龙, 唐卿, 黄弘, 苏伯尼, 李云涛, 付明. 基于数值模拟的大型外浮顶储罐区定量风险评估[J]. 清华大学学报(自然科学版), 2015, 55(10): 1143-1149.
[8] 开毅,卢建元,刘斌. 基于分组处理能力共享的低功耗路由器体系结构[J]. 清华大学学报(自然科学版), 2014, 54(4): 485-489.
[9] 马刚, 杜宇鸽, 荣江, 甘家瑞, 史忠植, 安波. 基于威胁传播的复杂信息系统安全风险评估[J]. 清华大学学报(自然科学版), 2014, 54(1): 35-43.
[10] 王得金, 江常青, 彭勇. 工业控制系统上基于安全域的攻击图生成[J]. 清华大学学报(自然科学版), 2014, 54(1): 44-52.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
版权所有 © 《清华大学学报(自然科学版)》编辑部
本系统由北京玛格泰克科技发展有限公司设计开发 技术支持:support@magtech.com.cn