Cloud Belief Rule Base Model for Network Security Situation Prediction

@article{Hu2016CloudBR,
  title={Cloud Belief Rule Base Model for Network Security Situation Prediction},
  author={Guan-Yu Hu and Pei-Li Qiao},
  journal={IEEE Communications Letters},
  year={2016},
  volume={20},
  pages={914-917}
}
To predict network security situations better using expert knowledge and quantitative data, a new forecasting model known as cloud belief rule base (CBRB) model is proposed. The CBRB model utilizes the cloud model to describe the referential point of belief rule, which is more accurate for describing expert knowledge. Moreover, to achieve the optimal parameters of the proposed model, a constraint covariance matrix adaptation evolution strategy (CMA-ES) algorithm is presented in this letter. A… CONTINUE READING

Figures, Tables, and Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-5 OF 5 CITATIONS

A New Belief Rule Base Model With Attribute Reliability

  • IEEE Transactions on Fuzzy Systems
  • 2019
VIEW 1 EXCERPT
CITES BACKGROUND

Research on Network Security Risk Assessment Method Based on Bayesian Reasoning

Xiangna Li, Mengao Li, Hongkai Wang
  • 2019 IEEE 9th International Conference on Electronics Information and Emergency Communication (ICEIEC)
  • 2019
VIEW 1 EXCERPT
CITES METHODS

References

Publications referenced by this paper.
SHOWING 1-10 OF 15 REFERENCES

Application of support vector machine (SVM) for prediction toxic activity of different data sets

C. Y. Zhao
  • Toxicology, vol. 217, nos. 2–3, pp. 105–119, 2006.
  • 2006
VIEW 1 EXCERPT

Belief rule-base inference methodology using the evidential reasoning Approach-RIMER

  • IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans
  • 2006
VIEW 1 EXCERPT

Study of Network Security Situation Awareness Model Based on Simple Additive Weight and Grey Theory

  • 2006 International Conference on Computational Intelligence and Security
  • 2006
VIEW 1 EXCERPT

The CMA Evolution Strategy: A Comparing Review

  • Towards a New Evolutionary Computation
  • 2006
VIEW 2 EXCERPTS