[1]高会生,朱静.基于D-S证据理论的网络安全风险评估模型[J].计算机工程与应用,2008,44(6):157-168.
[2]李健宏, 李广振.网络安全综合评价方法的应用研究[J].计算机仿真,2011,28(7):165-168.
[3]巫建文,王涛,徐凌魁,等.基于多木桶模型的信息安全量化评估方案[J].计算机应用研究,2011,28(5):1914-1928.
[4]SATTY T L. How to handle dependence with the analytic hierarchy process [J]. Mathematical Modelling, 1987,9(3/4/5): 369-376.
[5]TENG C-C, HORNG J-S, HU M-L M, et al. Developing energy conservation and carbon reduction indicators for the hotel industry in Taiwan [J]. International Journal of Hospitality Management, 2012, 31(1): 199-208.
[6]DAS S, CHAKRABORTY S. Selection of non-traditional machining processes using analytic network process [J]. Journal of Manufacturing Systems, 2011, 30(1): 41-53.
[7]马俊,刘芳,戴葵,等.一种信息系统安全性定量评估方法的研究与实现[J].计算机工程与科学,2008,30(1): 18-21.
[8]高会生,郭爱玲.组合核函数SVM 在网络安全风险评估中的应用[J].计算机工程与应用, 2009, 45(11): 123-126.
[9]吴坚,梁昌勇,李绩才.群决策中专家决策意见的可靠性研究[J].合肥工业大学学报:自然科学版,2009,32(3): 366-368.
[10]AYAG Z, ZDEMIR R G. A hybrid approach to concept selection through fuzzy analytic network process [J]. Computers and Industrial Engineering, 2009, 56(1): 368-379.
[11]SHIHA H-S, SHYURB H-J, LEE E S. An extension of TOPSIS for group decision making [J]. Mathematical and Computer Modelling, 2007, 45(7/8): 801-813.
[12]BORAN F E, GEN S, KURT M, et al. A multi-criteria intuitionistic fuzzy group decision making for supplier selection with TOPSIS method [J]. Expert Systems with Applications: An International Journal, 2009, 36(8): 11363-11368.
[13]XU ZESHUI, CHEN JIAN. Group decision-making procedure based on incomplete reciprocal relations [J]. Soft Computing: A Fusion of Foundations, Methodologies and Applications, 2008, 12(6): 515-521.
[14]PANG JIFANG, LIANG JIYE. Evaluation of the results of multi-attribute group decision-making with linguistic information [J]. Omega, 2012,40(3): 294-301.
[15]ZHOU LI-GANG, CHEN HUA-YOU, MERIG J M, et al. Uncertain generalized aggregation operators [J]. Expert Systems with Applications, 2012, 39(1):1105-1117. |