- Home
- Publications
- Publication Search
- Publication Details
Title
Fuzzy Evaluation of Network Vulnerability
Authors
Keywords
-
Journal
QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL
Volume 32, Issue 5, Pages 1715-1730
Publisher
Wiley
Online
2015-10-09
DOI
10.1002/qre.1905
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Generalized evidence theory
- (2015) Yong Deng APPLIED INTELLIGENCE
- Determining Basic Probability Assignment Based on the Improved Similarity Measures of Generalized Fuzzy Numbers
- (2015) Wen Jiang et al. International Journal of Computers Communications & Control
- An improved method to rank generalized fuzzy numbers with different left heights and right heights
- (2015) Wen Jiang et al. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS
- A Threat Assessment Model under Uncertain Environment
- (2015) Yong Deng MATHEMATICAL PROBLEMS IN ENGINEERING
- Dependence Assessment in Human Reliability Analysis Using Evidence Theory and AHP
- (2015) Xiaoyan Su et al. RISK ANALYSIS
- Application of type-2 fuzzy logic system for load frequency control using feedback error learning approaches
- (2014) Kamel Sabahi et al. APPLIED SOFT COMPUTING
- A review on type-2 fuzzy logic applications in clustering, classification and pattern recognition
- (2014) Patricia Melin et al. APPLIED SOFT COMPUTING
- Failure mode and effects analysis using D numbers and grey relational projection method
- (2014) Hu-Chen Liu et al. EXPERT SYSTEMS WITH APPLICATIONS
- Fuzzy logic system based prediction effort: A case study on the effects of tire parameters on contact area and contact pressure
- (2013) Hamid Taghavifar et al. APPLIED SOFT COMPUTING
- Supplier selection using AHP methodology extended by D numbers
- (2013) Xinyang Deng et al. EXPERT SYSTEMS WITH APPLICATIONS
- Robustness of interdependent networks with different link patterns against cascading failures
- (2013) Jianwei Wang et al. PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS
- Modeling Skewness in Vulnerability Discovery
- (2013) HyunChul Joh et al. QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL
- Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks
- (2013) Ying-Chiang Cho et al. TheScientificWorldJOURNAL
- Robustness of complex networks with the local protection strategy against cascading failures
- (2012) Jianwei Wang SAFETY SCIENCE
- Risk analysis in a linguistic environment: A fuzzy evidential reasoning-based approach
- (2011) Yong Deng et al. EXPERT SYSTEMS WITH APPLICATIONS
- Vulnerability metrics and analysis for communities in complex networks
- (2011) Claudio M. Rocco S. et al. RELIABILITY ENGINEERING & SYSTEM SAFETY
- Robustness of the western United States power grid under edge attack strategies due to cascading failures
- (2011) Jian-Wei Wang et al. SAFETY SCIENCE
- Fuzzy dynamic input–output inoperability model
- (2011) Gabriele Oliva et al. International Journal of Critical Infrastructure Protection
- Vulnerability of complex networks
- (2010) Igor Mishkovski et al. Communications in Nonlinear Science and Numerical Simulation
- Modeling contaminant intrusion in water distribution networks: A new similarity-based DST method
- (2010) Yong Deng et al. EXPERT SYSTEMS WITH APPLICATIONS
- Fuzzy conceptual clustering
- (2010) Petra Perner et al. QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL
- Complex brain networks: graph theoretical analysis of structural and functional systems
- (2009) Ed Bullmore et al. NATURE REVIEWS NEUROSCIENCE
- Cascade-based attack vulnerability on the US power grid
- (2009) Jian-Wei Wang et al. SAFETY SCIENCE
Find the ideal target journal for your manuscript
Explore over 38,000 international journals covering a vast array of academic fields.
SearchAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started