OWA trees and their role in security modeling using attack trees
From MaRDI portal
Publication:2509227
DOI10.1016/j.ins.2005.08.004zbMath1102.68665OpenAlexW2060379782MaRDI QIDQ2509227
Publication date: 19 October 2006
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2005.08.004
Related Items (8)
A novel reliability allocation approach using the OWA tree and soft set ⋮ Finding an internal state of RC4 stream cipher ⋮ Parametric aggregation in ordered weighted averaging ⋮ DAG-based attack and defense modeling: don't miss the forest for the attack trees ⋮ Finding the differential characteristics of block ciphers with neural networks ⋮ New operators on triangular intuitionistic fuzzy numbers and their applications in system fault analysis ⋮ On a family of multivariate copulas for aggregation processes ⋮ Improving minimax disparity model to determine the OWA operator weights
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Heavy OWA operators
- Bell-type inequalities for quasi-copulas
- A computational approach to fuzzy quantifiers in natural languages
- On the simultaneous associativity of F(x,y) and x+y-F(x,y)
- An introduction to copulas. Properties and applications
- Families of OWA operators
- Induced aggregation operators.
- Triangular norms
- Fuzzy logic methods in recommender systems
- Extending multicriteria decision making by mixing t-norms and OWA operators
- A Modified OWA Operator and its Use in Lossless DPCM Image Compression
- On ordered weighted averaging aggregation operators in multicriteria decisionmaking
This page was built for publication: OWA trees and their role in security modeling using attack trees