摘要:Today, I will bring you Calculation of network hierarchical affiliation (2) of the ‘A multi-objective decision method for the netw
分享兴趣,传播快乐,增长见闻,留下美好。
亲爱的您,
这里是LearningYard学苑!
今天小编为大家带来文章
“平学(64):精读复刻论文《多源信息下网络安全状况等级评估的多目标决策方法》网络等级隶属度的计算(2)”
欢迎您的用心访问!
Share interest, spread happiness, increase
knowledge, leave a beautiful.
Dear you,
this is LearningYard Academy.
Today, the editor brings you an article
"Ping Xue (64):Intensive Reading Replica Essay ‘A multi-objective decision method for the network security situation grade assessment under multi-source information’ Calculation of network hierarchical affiliation(2)”
Welcome to your visit!
一、内容摘要(Summary of content)
今天小编将从思维导图、精读内容、知识补充三个板块为大家带来精读复刻论文《A multi-objective decision method for the network security situation grade assessment under multi-source information” Research Objective and Keywords Definition》的网络等级隶属度的计算(2)。
Today, I will bring you Calculation of network hierarchical affiliation (2) of the ‘A multi-objective decision method for the network security situation grade assessment under multi-source information’ from the three sections of Thinking Maps, Intensive Reading Content, and Knowledge Supplement.
二、思维导图(Mind mapping)
三、精读内容(Intensive reading content)
1. 下限定量属性集隶属度的计算(Calculation of the lowerer bound quantitative attribute set affiliation degree)
The authors give the idea of calculating the lower bound quantitative attribute affiliation as shown below:
2. 具体的计算函数(Specific computational functions)
The following diagram is a compendium of computational ideas:
3. 实现代码(Implementation Code)
The specific implementation code is shown below:
四、知识补充(Knowledge supplementation)
评价网络安全的指标有哪些?
What are the metrics for evaluating cybersecurity?
1. 漏洞管理:系统是否存在已知或未知的安全漏洞,以及这些漏洞是否得到及时修复。
1. Vulnerability management: Whether there are known or unknown security vulnerabilities in the system and whether these vulnerabilities are fixed in a timely manner.
2. 访问控制:是否实施了有效的身份认证、授权和权限管理机制,以确保只有授权用户能够访问敏感信息。
2. Access control: whether effective authentication, authorization and rights management mechanisms have been implemented to ensure that only authorized users have access to sensitive information.
3. 数据保护:数据加密、备份和恢复策略是否到位,以保护数据的机密性、完整性和可用性。
3. Data protection: whether data encryption, backup and recovery strategies are in place to protect the confidentiality, integrity and availability of data.
4. 安全审计:是否有定期的安全审计和日志记录机制,以便于追踪和分析安全事件。
4. Security audits: the existence of regular security audits and logging mechanisms to facilitate the tracking and analysis of security incidents.
5. 应急响应:是否建立了有效的安全事件响应流程,包括检测、遏制、根除和恢复措施。
5. Emergency response: whether an effective security incident response process is in place, including detection, containment, eradication and recovery measures.
今天的分享就到这里了。
如果您对文章有独特的想法,
欢迎给我们留言,
让我们相约明天。
祝您今天过得开心快乐!
That's all for today's sharing.
If you have a unique idea about the article
please leave us a message
Let us meet tomorrow.
I wish you a happy day today!
参考资料:Google翻译,百度,通义千问
参考文献:Yu Gaofeng. A multi-objective decision method for the network security situation grade assessment under multi-source information [J]. Information Fusion, 2024, 102(1): 1-14.
本文由LearningYard学苑整理发出,如有侵权请在后台留言!
文字 | Ping
排版 | Ping
审核 | yyz
来源:LearningYard学苑