共 50 条
- [31] Two Scalable Approaches to Analyzing Network Security Using Compact Attack Graphs [J]. IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 90 - 94
- [32] Real-Time Risk Assessment of Network Security Based on Attack Graphs [J]. PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND COMPUTER APPLICATIONS (ICSA 2013), 2013, 92 : 75 - 80
- [33] Evaluation of the teaching-learning process with fuzzy cognitive maps [J]. ADVANCES IN ARTIFICIAL INTELLIGENCE - IBERAMIA 2004, 2004, 3315 : 922 - 931
- [34] Performance Evaluation of Practice Courses Using Fuzzy Cognitive Maps [J]. 2016 15TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY BASED HIGHER EDUCATION AND TRAINING (ITHET), 2016,
- [36] A new method for reaching equilibrium points in fuzzy cognitive maps [J]. 2004 2ND INTERNATIONAL IEEE CONFERENCE INTELLIGENT SYSTEMS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 53 - 60
- [39] A divide and conquer method for learning large Fuzzy Cognitive Maps [J]. FUZZY SETS AND SYSTEMS, 2010, 161 (19) : 2515 - 2532
- [40] A METHOD OF SECURITY EVALUATION BASED ON FUZZY MATHEMATICS [J]. 2008 INTERNATIONAL CONFERENCE ON APPERCEIVING COMPUTING AND INTELLIGENCE ANALYSIS (ICACIA 2008), 2008, : 106 - 109