Application of fuzzy comprehensive analysis to information security evaluation

5Citations
Citations of this article
N/AReaders
Mendeley users who have this article in their library.
Get full text

Abstract

In order to improve the accuracy and validity of information system security evaluation and reduce the effects of diversities of experts' subjectivity on evaluation results, a clustering method based on the fuzzy comprehensive analysis was proposed. With this method, scores given by experts are pre-processed and transformed to relative weight ratios based on the weights of evaluation indexes, and after the transformation, difference scores with a large discrete degree are removed. Examples show that this clustering method makes the concentration range of valuation interval and the convergence of assessed scores be respectively increased by 30% and 15% to enhance the effect of the important evaluation indexes on evaluation results.

Cite

CITATION STYLE

APA

Fu, M. (2010). Application of fuzzy comprehensive analysis to information security evaluation. Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 45(3), 440–444. https://doi.org/10.3969/j.issn.0258-2724.2010.03.021

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free