相似文献/References:
[1]汪贵生 夏阳[].基于Rough集理论的主机安全评估模型研究[J].计算机技术与发展,2008,(12):156.
WANG Gui-sheng,XIA Yang.Host Computer Security Evaluation Model Research Based on Rough Set Theory[J].,2008,(12):156.
[2]张俭鸽 李颖颖.基于多元线性回归预测模型的sensor态势研究[J].计算机技术与发展,2011,(09):229.
ZHANG Jian-ge,LI Ying-ying.Research of Sensor Situation Based on Multiple Linear Regression Forecast Model[J].,2011,(12):229.
[3]刘意先,慕德俊.基于CIA 属性的网络安全评估方法研究[J].计算机技术与发展,2018,28(04):141.[doi:network security;security assessment;vulnerabilit]
LIU Yi-xian,MU De-jun.Research on Network Security Assessment Method Based on CIA[J].,2018,28(12):141.[doi:network security;security assessment;vulnerabilit]