Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    A Multi-Attribute Decision-Making Method Using Belief-Based Probabilistic Linguistic Term Sets and Its Application in Emergency Decision-Making

    Runze Liu, Liguo Fei*, Jianing Mi

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 2039-2067, 2023, DOI:10.32604/cmes.2023.024927 - 06 February 2023

    Abstract Probabilistic linguistic term sets (PLTSs) are an effective tool for expressing subjective human cognition that offer advantages in the field of multi-attribute decision-making (MADM). However, studies have found that PLTSs have lost their ability to accurately capture the views of decision-makers (DMs) in certain circumstances, such as when the DM hesitates between multiple linguistic terms or the decision information is incomplete, thus affecting their role in the decision-making process. Belief function theory is a leading stream of thought in uncertainty processing that is suitable for dealing with the limitations of PLTS. Therefore, the purpose of… More > Graphic Abstract

    A Multi-Attribute Decision-Making Method Using Belief-Based Probabilistic Linguistic Term Sets and Its Application in Emergency Decision-Making

  • Open Access

    ARTICLE

    Multi-VMs Intrusion Detection for Cloud Security Using Dempster-shafer Theory

    Chak Fong Cheang1,*, Yiqin Wang1, Zhiping Cai2, Gen Xu1

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 297-306, 2018, DOI:10.32604/cmc.2018.03808

    Abstract Cloud computing provides easy and on-demand access to computing resources in a configurable pool. The flexibility of the cloud environment attracts more and more network services to be deployed on the cloud using groups of virtual machines (VMs), instead of being restricted on a single physical server. When more and more network services are deployed on the cloud, the detection of the intrusion likes Distributed Denial-of-Service (DDoS) attack becomes much more challenging than that on the traditional servers because even a single network service now is possibly provided by groups of VMs across the cloud… More >

Displaying 1-10 on page 1 of 2. Per Page