Download now Free registration required
Network security has close relationships with the physical environment of information carriers, information transmission, information storage, information management and so on, and these relations have much ambiguity. Therefore, it is reasonable and scientific to apply fuzzy comprehensive evaluation method for network security fuzzy evaluation. The core of network security fuzzy evaluation is membership degree transformation calculation. But the transformation methods should be discussed, because redundant data in index membership degree is also used to compute object membership degree, which is not useful for object classification.
- Format: PDF
- Size: 412.12 KB