An Approach to Evaluating the Computer Network Security with Uncertain Linguistic Information

Jian Wu
March 2012
International Journal of Digital Content Technology & its Applic;Mar2012, Vol. 6 Issue 5, p174
Academic Journal
The problem of evaluating the computer network security with uncertain linguistic information is the multiple attribute group decision making (MAGDM) problems. In this paper, we investigate the multiple attribute group decision making (MAGDM) problems for evaluating the computer network security with uncertain linguistic information. We utilize the uncertain linguistic weighted geometric (ULWG) operator and uncertain linguistic hybrid geometric (ULHG) operator to aggregate and get the overall value of the computer network security, then rank the computer network security and select the most desirable one(s) by using the formula of the degree of possibility for the comparison between two uncertain linguistic variables. Finally, an illustrative example for evaluating the computer network security is given to verify the developed approach and to demonstrate its practicality and effectiveness.


Related Articles

  • Networking and Security Measures. Gupta, Vaibhav; Goswami, Sumit; Kumar, Ashok; Singh, Mohinder // DESIDOC Bulletin of Information Technology;Mar2004, Vol. 24 Issue 2, p9 

    By writing this paper a small effort has been put to understand the growing network needs and its security. Various types of network threats and security services are discussed. This will help in designing a secure and robust network infrastructure by discussing management security policies and...

  • An Ounce of Prevention. Willebeek-LeMair, Marc // Telecommunications - Americas Edition;Aug2004, Vol. 38 Issue 9, p22 

    Points out that proactive security through a managed service can benefit both telecommunications providers and customers. Importance of the connected IT infrastructure; Inadequacy of traditional security tools to protect networks; Intrusion prevention systems (IPS) technology; Increased system...

  • Fit for anything. Sterlicchi, John // SC Magazine: For IT Security Professionals (UK Edition);Feb2005, p50 

    This article presents a case study on the network infrastructure used by Gold's Gym. A private company, Gold's still uses the original Venice Beach building, not only as a gym, but also one of 3 corporate offices it has in the U.S. Although it franchises hundreds of gyms, Gold's actually runs...

  • MU SECURITY TAKES A HACKER'S APPROACH. McLaughlin, Kevin // CRN;4/17/2006, Issue 1192, p83 

    The article introduces the MU Security's MU-4000 Security Analyzer, a test laboratory appliance that launches a barrage of attacks on network infrastructure prior to deployment. According to Ajit Sancheti, co-founder and CEO of MU Security, the idea is to adopt ethical hacking techniques to...

  • Super Power Passwords - The Threat From Within. Macleod, Calum // Software World;Nov2006, Vol. 37 Issue 6, p12 

    The article reports on "Administrative Passwords" or "Super Power Passwords." These passwords allow you to access the network, change anything or everything, assume their identity, manipulate their move and others. According to Cyber-Ark's survey, one-half of all the companies have more...

  • Engaging The Infrastructure For Internal Security. Schneider, Herb // Business Communications Review;Nov2006, Vol. 36 Issue 11, p48 

    The article discusses the challenges in maintaining security in a complex computer network. The weaknesses of security devices used by themselves is presented. The author argues that security can be tightened by integrating the security system with the network infrastructure. In order for this...

  • DOD eyes network revamp. Roberts, Paul F. // eWeek;1/16/2006, Vol. 23 Issue 3, p19 

    This article reports that according to Air Force Lieutenant General Charles Croom, a total overhaul of the U.S. government's classified and unclassified information networks may be necessary to protect the networks from future attacks. Croom is commander of the Joint Task Force-Global Network...

  • Viruses … In An instant.  // Software World;Jan2006, Vol. 37 Issue 1, p23 

    The article provides information on how to prevent viruses that can be shared through instant messaging system (IM). Many companies insist that whenever employees communicate with colleagues or customers through IM, the corporate's sensitive information is threaten by worms and viruses. In 2005,...

  • Link-Layer Security. Fogarty, Kevin // Baseline;Nov2004, Issue 37, p86 

    This article provides information on link-layer security in wireless networks. Imagine you are driving to a military base. Before you can even get onto the property, you are stopped and have to prove that the car is yours and the car itself is allowed to drive on the base, and that the base's...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics