2019 IEEE 14th International Conference on Computer Sciences and Information Technologies (CSIT) 2019
DOI: 10.1109/stc-csit.2019.8929770
|View full text |Cite
|
Sign up to set email alerts
|

Automatic construction of a neuro-fuzzy vulnerability risk analysis model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…In paper [20], a fuzzy model of the Evaluation() function (4) was constructed, membership functions were determined and a rule base was formed based on expert evaluation. According to paper [20], the size of the characteristic vector and of linguistic variables is len(T i )=8, and the number of term-sets is len(T i j)=34. In order to take into consideration most possible cases, the size of the required rule base should be ≈82.000.…”
Section: Neuro-fuzzy Systemsmentioning
confidence: 99%
“…In paper [20], a fuzzy model of the Evaluation() function (4) was constructed, membership functions were determined and a rule base was formed based on expert evaluation. According to paper [20], the size of the characteristic vector and of linguistic variables is len(T i )=8, and the number of term-sets is len(T i j)=34. In order to take into consideration most possible cases, the size of the required rule base should be ≈82.000.…”
Section: Neuro-fuzzy Systemsmentioning
confidence: 99%