Ontology and Weighted D-S Evidence Theory-Based Vulnerability Data Fusion Method

With the rapid development of high-speed and large-scale complex network, network vulnerability data presents the characteristics of massive, multi-source and heterogeneous, which makes data fusion become more complex. Although existing data fusion methods can fuse multi-source data, they do not con...

Full description

Bibliographic Details
Main Authors: Xiaoling Tao, Liyan Liu, Feng Zhao, Yan Huang, Saide Zhu
Format: Article
Language:English
Published: Graz University of Technology 2019-03-01
Series:Journal of Universal Computer Science
Subjects:
Online Access:https://lib.jucs.org/article/22592/download/pdf/