Journal on Communications ›› 2014, Vol. 35 ›› Issue (8): 107-115.doi: 10.3969/j.issn.1000-436x.2014.08.014
• Academic paper • Previous Articles Next Articles
Yan-hua LIU1,2,Guo-long CHEN1,2,Rui-fen WU1,2
Online:
2014-08-25
Published:
2017-06-29
Supported by:
Yan-hua LIU,Guo-long CHEN,Rui-fen WU. Survivability evaluation of network information system based on the cloud model and analytic hierarchy process[J]. Journal on Communications, 2014, 35(8): 107-115.
"
指标 | B1 | B2 | B3 | A | CR |
C1 | 0.141 1 | 0.000 0 | 0.000 0 | 0.060 5 | |
C2 | 0.454 7 | 0.000 0 | 0.000 0 | 0.194 9 | |
C3 | 0.263 1 | 0.000 0 | 0.000 0 | 0.112 7 | |
C4 | 0.141 1 | 0.000 0 | 0.000 0 | 0.060 5 | |
C5 | 0.000 0 | 0.297 3 | 0.000 0 | 0.042 5 | |
C6 | 0.000 0 | 0.539 0 | 0.000 0 | 0.077 0 | 0.005 9 |
C7 | 0.000 0 | 0.163 8 | 0.000 0 | 0.023 4 | |
C8 | 0.000 0 | 0.000 0 | 0.239 1 | 0.102 5 | |
C9 | 0.000 0 | 0.000 0 | 0.239 1 | 0.102 5 | |
C10 | 0.000 0 | 0.000 0 | 0.432 8 | 0.185 5 | |
C11 | 0.000 0 | 0.000 0 | 0.089 0 | 0.038 1 |
[1] | AL-KUWAITI M , KYRIAKOPOULOS G , HUS-SEIN S . A compara-tive analysis of network depend-ability, fault-tolerance, reliability, se-curity, and survivability[J]. IEEE Communications Surveys & Tutori-als, 2009,11(2): 106-124. |
[2] | MA Z S , KRINGS W . Dynamic hybrid fault modeling and extended evolutionary game theory for reliability,survivability and fault toler-ance analyses[J]. IEEE Transactions on Reliability, 2011,60(1): 180-196. |
[3] | 张乐君, 周渊, 国林 等. 基于自主配置的系统生存性增强算法研究[J]. 通信学报, 2007,28(12):102-107. ZHANG L J , ZHOU Y , GUO L , et al. Research of survivability en-hancement algorithm based on autonomous configuration[J]. Journal on Communications, 2007,28(12):102-107. |
[4] | 李黎, 管晓宏, 赵千川 等. 网络生存适应性的多目标评估[J]. 西安交通大学学报, 2010,44(10):1-7. LI L , GUAN X H , ZHAO Q C , et al. Multi-objective evaluation of network survival fitness[J]. Journal of Xi'an Jiaotong University, 2010,44(10):1-7. |
[5] | 袁丹, 张玉清 . 网络可生存性定义研究[J]. 计算机研究与发展, 2006,43(1):525-529. YUAN D , ZHANG Y Q . Research on definition of network surviv-ability[J]. Journal of Computer Research and Development, 2006,43(1):525-529. |
[6] | ROBERT J , ELLISO N , RICHARD C , et al. Survivable network sys-tem analysis: a case study[J]. IEEE Software, 1999,16(4): 70-77. |
[7] | 刘密霞, 张玉清, 洪毅 . 基于模糊推理的网络可生存性的建模与分析[J]. 通信学报, 2009,30(1):31-37. LIU M X , ZHANG Y Q , HONG Y . Modeling and analysis of network survivability based on fuzzyinference[J]. Journal on Communica-tions, 2009,30(1):31-37. |
[8] | 伍文, 孟相如, 马志强 等. 模块化动态博弈的网络可生存性态势跟踪方法[J]. 西安交通大学学报, 2012,46(12):18-23. WU W , MENG X R , MA Z Q , et al. Tracking network survivability situation based on modularized dynamic game[J]. JJournal of Xi'an Jiaotong University, 2012,46(12):18-23. |
[9] | 伍文, 孟相如, 刘芸江 等. 基于连续时间 Markov 的网络可生存性建模与量化[J]. 吉林大学学报, 2013,43(5):1395-1400. WU W , MENG X R , LIU Y J , et al. Modeling and quantification ofnetwork survivability based on continuous time Markov[J]. Journal of Jilin University, 2013,43(5):1395-1400. |
[10] | 伍文, 孟相如, 马志强 等. 基于组合赋权的网络可生存性模糊综合评估[J]. 系统工程与电子技术, 2013,35(4):786-790. WU W , MENG X R , MA Z Q , et al. Fuzzy comprehensive evaluation of network survivability based on combinational weight[J]. Systems Engineering and Electronics, 2013,35(4):786-790. |
[11] | 林雪纲, 许榕生, 熊华 等. 一种信息系统生存性的量化分析框架[J]. 电子与信息学报, 2006,28(9):1721-1726. LIN X G , XU R S , XIONG H , et al. A framework of quantitative analysis for information system survivability[J]. Journal of Electronics& Information Technology, 2006,28(9):1721-1726. |
[12] | 陈宝兴, 许榕生 . 信息系统生存性分析模型研究[J]. 通信学报, 2006,27(2):153-159. LIN X G , XU R S . Research on analysis model of information systems survivability[J]. Journal on Communications, 2006,27(2):153-159. |
[13] | WANG C , MING L , ZHAO J , et al. A general framework for network survivability testing and evaluation[J]. Journal of Networks, 2011,6(6): 831-841. |
[14] | WANG C L , FANG L , DAI Y Q . Network survivability evaluation model based on immune evolution and multiple criteria decision mak-ing[A]. 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover[C]. Sanya, China, 2012, 178-184. |
[15] | JOSE Y , ARIEL O . Tunable QoS-aware network survivability[A]. INFOCOM[C]. Turin, Italy, 2013. 944-952. |
[16] | PARK J S , CHANDRAMOHAN P , et al. Component survivability at runtime for mission-critical distributed systems[J]. The Journal of Su-percomputing, 2013,66(3): 1390-1417. |
[17] | 熊琦, 彭勇, 戴忠华 . 基于排队网的入侵响应系统可生存性[J]. 清华大学学报, 2012,52(10):1507-1512. XIONG Q , PENG Y , DAI Z H . Survivability analysis of intrusion re-sponse system based on queuing nets[J]. Journal of Tsinghua Univer-sity, 2012,52(10):1507-1512. |
[18] | YANG JY , ZHANG Y L , et al. Quantitative survivability evaluation of three virtual machine-based server architectures[J]. Journal of Net-work and Computer Applications, 2013(36): 781-790. |
[19] | SAATY T . The Analytic Hierarchy Process[M]. New York: McGraw-Hill 1980.9. |
[20] | 李德毅, 刘常昱, 杜鹢 等. 不确定性人工智能[J]. 软件学报, 2004,15(11):1583-1594. LI D Y , LIU C Y , DU Y , 等. Artificial intelligence with uncertainty[J]. Journal of Software, 2004,15(11):1583-1594. |
[21] | 李德毅, 史雪梅, 孟海军 . 隶属云和隶属云发生器[J]. 计算机研究与发展, 1995,32(6):15-20. LI D Y , SHI X M , MENG H J . Membership clouds and membership cloud generators[J]. Journal of Computer Research and Develop-ment, 1995,32(6):15-20. |
[22] | 焦跃, 李德毅, 杨朝晖 . 一种评价C3I系统效能的新方法[J]. 系统工程理论与实践, 1998,18(12):68-73. JIAO Y , LI DEYI , YANG Z . A new method to evaluate the effective-ness of C3I system[J]. Systems Engineering-Theory & Practice, 1998,18(12):68-73. |
[1] | Yu DONG, Youpeng ZHANG. Conflict evidence combination method based on clustering weighting [J]. Journal on Communications, 2023, 44(3): 157-163. |
[2] | Guojun LI, Xu HOU, Changrong YE, Yiping LUO. Wide area cooperative resource allocation algorithm for shortwave communication access network [J]. Journal on Communications, 2023, 44(2): 112-121. |
[3] | Shuai LIU, Jie GUAN, Bin HU, Sudong MA. Differential analysis of lightweight cipher algorithm ACE based on MILP [J]. Journal on Communications, 2023, 44(1): 39-48. |
[4] | Zhenyu WANG, Yang GUO, Shaoqing LI, Shen HOU, Ding DENG. Design of efficient anonymous identity authentication protocol for lightweight IoT devices [J]. Journal on Communications, 2022, 43(7): 49-61. |
[5] | Jie YANG, Biao DONG, Xue FU, Yu WANG, Guan GUI. Lightweight decentralized learning-based automatic modulation classification method [J]. Journal on Communications, 2022, 43(7): 134-142. |
[6] | Hua LONG, Shumeng SU. Research on formant estimation algorithm for high order optimal LPC root value screening [J]. Journal on Communications, 2022, 43(6): 235-245. |
[7] | Xinchun YIN, Mengyu WANG, Jianting NING. Lightweight searchable medical data sharing scheme [J]. Journal on Communications, 2022, 43(5): 110-122. |
[8] | Zilong JIANG, Chenhui JIN. Impossible differential cryptanalysis of Saturnin algorithm [J]. Journal on Communications, 2022, 43(3): 53-62. |
[9] | Xiaodong FU, Xinxin QI, Li LIU, Wei PENG, Jiaman DING, Fei DAI. Detecting and preventing collusion attack in DPoS based on power index [J]. Journal on Communications, 2022, 43(12): 123-133. |
[10] | Xiaolin ZHANG, Xiuqiao LI, Rongchen SUN. Comprehensive recognition algorithm of RS code based on fast code root trial [J]. Journal on Communications, 2022, 43(11): 117-126. |
[11] | Wei LI, Menglin WANG, Dawu GU, Jiayao LI, Tianpei CAI, Guangwei XU. Ciphertext-only fault analysis of the TWINE lightweight cryptogram algorithm [J]. Journal on Communications, 2021, 42(3): 135-149. |
[12] | Bing ZHANG, Zheng WEN, Yuxuan ZHAO, Ning WANG, Jiadong REN. Dual-granularity lightweight model for vulnerability code slicing method assessment [J]. Journal on Communications, 2021, 42(11): 233-241. |
[13] | Xiaoli DAI, Shifeng LIU, Daqing GONG. Text similarity detection method based on NLP [J]. Journal on Communications, 2021, 42(10): 173-181. |
[14] | Zhiru GU,Min LI,Yonghong LONG,Xiaohua SHU,Qing RONG. Routing optimization method based on GPCR for vehicular Ad Hoc network [J]. Journal on Communications, 2020, 41(7): 152-164. |
[15] | Hongqiang YAN,Linjie WANG. Research of authentication techniques for the Internet of things [J]. Journal on Communications, 2020, 41(7): 213-222. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|