Matlab application for information security risk analysis

作者: T. I. Buldakova , D. A. Mikov

DOI: 10.1063/1.5140104

关键词:

摘要: The problem of studying complex systems and processes using simulation in the MATLAB software package learning process is considered. There are general recommendations on effective configuration, selection optimal parameters for model being developed practical use functionality educational programs specialties training areas, where study disciplines related to development various types modeling provided. noted importance engineering education, when students learn develop components automated evaluate their effectiveness. object selected as that carry out remote monitoring human health. information security risk analysis such chosen purpose. features described, its main stages preparation initial data presented. implementation fuzzy logic set theory Fuzzy Logic Toolbox environment. developing a inference system, selecting type model, setting described detail. necessity choosing methods logical conjunction disjunction, aggregation, defuzzification, construction membership functions, formation rules IF … THEN noted. conversion into neuro-fuzzy network, well training, test demonstration network An example configuration health given.The mod...

参考文章(17)
Alexander Bolshakov, Victor Glaskov, Igor Egorov, Vladimir Lobanov, Larisa Perova, Svetlana Pchelintseva, Methods and Tools for Software Development to Improve the Effectiveness of Engineering Education in the Direction of "Mechatronics" Using Grid-Computing Technologies Communications in Computer and Information Science. pp. 123- 133 ,(2014) , 10.1007/978-3-319-11854-3_12
Ping-Teng Chang, Kuo-Chen Hung, Applying the fuzzy-weighted-average approach to evaluate network security systems Computers & Mathematics With Applications. ,vol. 49, pp. 1797- 1814 ,(2005) , 10.1016/J.CAMWA.2004.10.042
Chunyang Yuan, Jiaxin Li, Ru Zhang, Jianyi Liu, Grey and Fuzzy Evaluation of Information System Disaster Recovery Capability computational science and engineering. pp. 300- 304 ,(2013) , 10.2991/CSE.2013.67
Michel Grabisch, k -order additive discrete fuzzy measures and their representation Fuzzy Sets and Systems. ,vol. 92, pp. 167- 189 ,(1997) , 10.1016/S0165-0114(97)00168-1
Yaochu Jin, W. von Seelen, B. Sendhoff, An approach to rule-based knowledge extraction ieee international conference on fuzzy systems. ,vol. 2, pp. 1188- 1193 ,(1998) , 10.1109/FUZZY.1998.686287
Y. Jin, Fuzzy modeling of high-dimensional systems: complexity reduction and interpretability improvement IEEE Transactions on Fuzzy Systems. ,vol. 8, pp. 212- 221 ,(2000) , 10.1109/91.842154
Yaochu Jin, W. Von Seelen, B. Sendhoff, On generating FC/sup 3/ fuzzy rule systems from data using evolution strategies systems man and cybernetics. ,vol. 29, pp. 829- 845 ,(1999) , 10.1109/3477.809036
Ajit Appari, M. Eric Johnson, Information security and privacy in healthcare: current state of research Journal of Internet and Enterprise Management. ,vol. 6, pp. 279- 314 ,(2010) , 10.1504/IJIEM.2010.035624
Kai Shen, Andrey V. Proletarsky, Konstantin A. Neusypin, Algorithms of constructing models for compensating navigation systems of unmanned aerial vehicles 2016 International Conference on Robotics and Automation Engineering (ICRAE). pp. 104- 108 ,(2016) , 10.1109/ICRAE.2016.7738798