Research Article An Approach to Evaluating Computer Network Security with Intuitionistic Trapezoidal Fuzzy Information



Similar documents
Application and research of fuzzy clustering analysis algorithm under micro-lecture English teaching mode

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA

Modified Line Search Method for Global Optimization

ODBC. Getting Started With Sage Timberline Office ODBC

The Canadian Council of Professional Engineers

A Method for Trust Quantificationin Cloud Computing Environments

Data Analysis and Statistical Behaviors of Stock Market Fluctuations

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series

Center, Spread, and Shape in Inference: Claims, Caveats, and Insights

Research Article Sign Data Derivative Recovery

Online Banking. Internet of Things

Journal of Chemical and Pharmaceutical Research, 2015, 7(3): Research Article

DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments

Installment Joint Life Insurance Actuarial Models with the Stochastic Interest Rate

Risk Factors Assessment for Software Development Project Based on Fuzzy Decision Making

Study on the application of the software phase-locked loop in tracking and filtering of pulse signal

STUDENTS PARTICIPATION IN ONLINE LEARNING IN BUSINESS COURSES AT UNIVERSITAS TERBUKA, INDONESIA. Maya Maria, Universitas Terbuka, Indonesia

ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC

The Forgotten Middle. research readiness results. Executive Summary

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return

Chapter 1 INTRODUCTION TO MAINTENANCE AND REPLACEMENT MODELS

Research Article A Selection Method Based on MAGDM with Interval-Valued Intuitionistic Fuzzy Sets

Department of Computer Science, University of Otago

Chatpun Khamyat Department of Industrial Engineering, Kasetsart University, Bangkok, Thailand

Baan Service Master Data Management

76 SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 9 - NUMBER 1 - YEAR 2011 ISSN:

A quantitative definition of engineering professional profiles

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

Supply Chain Management

Assessment of the Board

Entropy of bi-capacities

Chapter 7 Methods of Finding Estimators

Open Access Non-operating Urban Infrastructure Project Management Maturity Model on Agent Construction Based on the Evolutionary Algorithm

Page 1. Real Options for Engineering Systems. What are we up to? Today s agenda. J1: Real Options for Engineering Systems. Richard de Neufville

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

PENSION ANNUITY. Policy Conditions Document reference: PPAS1(7) This is an important document. Please keep it in a safe place.

Amendments to employer debt Regulations

Investing in Stocks WHAT ARE THE DIFFERENT CLASSIFICATIONS OF STOCKS? WHY INVEST IN STOCKS? CAN YOU LOSE MONEY?

iprox sensors iprox inductive sensors iprox programming tools ProxView programming software iprox the world s most versatile proximity sensor

Building Blocks Problem Related to Harmonic Series

Research Article Allocating Freight Empty Cars in Railway Networks with Dynamic Demands

How to read A Mutual Fund shareholder report

Subject CT5 Contingencies Core Technical Syllabus

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN

RISK TRANSFER FOR DESIGN-BUILD TEAMS

Properties of MLE: consistency, asymptotic normality. Fisher information.

Pre-Suit Collection Strategies

Hypergeometric Distributions

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.

Confidence Intervals for One Mean

UM USER SATISFACTION SURVEY Final Report. September 2, Prepared by. ers e-research & Solutions (Macau)

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS

Professional Networking

Alternative Form of Dempster s Rule for Binary Variables

Best of security and convenience

SaaS Resource Management Model and Architecture Research

Making training work for your business

How To Find FINANCING For Your Business

Hypothesis testing. Null and alternative hypotheses

Institute of Actuaries of India Subject CT1 Financial Mathematics

A Flexible Web-Based Publication Database

Ideate, Inc. Training Solutions to Give you the Leading Edge

SPC for Software Reliability: Imperfect Software Debugging Model

Sequences and Series

Impact your future. Make plans with good advice from ACT. Get Set for College 1. THINK 2. CONSIDER 3. COMPARE 4. APPLY 5. PLAN 6.

Annuities Under Random Rates of Interest II By Abraham Zaks. Technion I.I.T. Haifa ISRAEL and Haifa University Haifa ISRAEL.

CREATIVE MARKETING PROJECT 2016

Configuring Additional Active Directory Server Roles

TO: Users of the ACTEX Review Seminar on DVD for SOA Exam FM/CAS Exam 2

A note on the boundary behavior for a modified Green function in the upper-half space

AGC s SUPERVISORY TRAINING PROGRAM

Overview on S-Box Design Principles

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method

1. C. The formula for the confidence interval for a population mean is: x t, which was

Agency Relationship Optimizer

One Goal. 18-Months. Unlimited Opportunities.

Estimating Probability Distributions by Observing Betting Practices

ADMISSION AND REGISTRATION

EUROCONTROL PRISMIL. EUROCONTROL civil-military performance monitoring system

Specifications for inventories of digitised content

INVESTMENT PERFORMANCE COUNCIL (IPC)

A Guide to Better Postal Services Procurement. A GUIDE TO better POSTAL SERVICES PROCUREMENT

Research Article Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis

Study in the United States. Post Graduate Programs

Output Analysis (2, Chapters 10 &11 Law)

(VCP-310)

Performance Evaluation and Prioritization of Leasing Companies Using the Super Efficiency Data Envelopment Analysis Model

Clustering Algorithm Analysis of Web Users with Dissimilarity and SOM Neural Networks

Information for Programs Seeking Initial Accreditation

Patentability of Computer Software and Business Methods

Performance Measurement In The ecommerce Industry Jamshed Mistry ( Worcester Polytechnic Institute

.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth

Information about Bankruptcy

Capacity of Wireless Networks with Heterogeneous Traffic

Transcription:

Joural of Cotrol Sciece ad Egieerig, Article ID 604920, 4 pages http://dx.doi.org/10.1155/2014/604920 Research Article A Approach to Evaluatig Computer Network Security with Ituitioistic Trapezoidal Fuzzy Iformatio Mig Xue Hea Uiversity of Techology, Zhegzhou, Hea 450001, Chia Correspodece should be addressed to Mig Xue; xuemig11980@163.com Received 29 Jue 2014; Accepted 9 July 2014; Published 17 July 2014 Academic Editor: Xiaofei Zhao Copyright 2014 Mig Xue. This is a ope access article distributed uder the Creative Commos Attributio Licese, which permits urestricted use, distributio, ad reproductio i ay medium, provided the origial work is properly cited. We ivestigate the multiple attribute decisio-makig problems for evaluatig the computer etwork security with ituitioistic trapezoidal fuzzy iformatio. We utilize the ituitioistic trapezoidal fuzzy weighted average (ITFWA) operator to aggregate the ituitioistic trapezoidal fuzzy iformatio correspodig to each alterative ad get the overall value of the alteratives ad the rak the alteratives ad select the most desirable oe(s) accordig to the distace betwee the overall value of the alteratives ad ideal solutio. Fially, a illustrative example for evaluatig the computer etwork security is give. 1. Itroductio With sciece ad techology developmet, computer techology improves costatly ad more ad more software ad hardware of educatio idustry have appeared 1. Uses i educatig the professio especially the software ad the hardware appear oe after aother, have brought a lot of coveiece for the school teachig maagemet, ad simultaeously have also provided may coveiet coditios for teacher s ad studet s daily life. The applicatio of these hightechs i the school coveiet for the educatioal circles also gave the educatioal circles a questio about the safety of the iformatio maagemet; the etwork security questio has become a ew questio to educatioal circles 2, 3. As a result of a oe-card appearace, the school has applied this techology i the first time. It provides the coveiece for both teachers ad studets. Meawhile, the school also must cosider the safety of the card. The ehacemet of etwork ad the server security is the most importat thig for schools. These high-techs, for example, multimedia slides, etwork iformatio, laser projectio, ad so o, brig about ew breakthrough to school educatio. The emergece of oe-card also as the educatio sector developmet has played a role ad sigificatly improved the maagemet of schoolsivariousfields4. The appearace of the card has solved a lot of igglig problems ad makes the campus cosumptios more coveiet. A card ca be slippery i school, ad it also facilitates schools i wealth maagemet. The developmet of the educatio sector is affected by the techical implicatios ad also costraied by ecoomic coditios, particularly those three-table istitutios or ogovermetal istitutios. They strive to build a moder campus ad, therefore, will ot abado advaced techology to serve schools. However, due to shortage of fuds, schools are ofte just goig to the applicatio but did ot cosider the quality ad future problems. I the teder, as log as the low price of whom, let someoe to do the costructio, this is wrog. For moder campus, improvig the techology is right, but it is also eeded to cosider the questio of safety ad quality, especially oe-card; security is aparticularlyimportatproblemwhichcaotbeigored. The author participated i a oe-card case of a uiversity ad is resposible for the costructio of a hardware ad server teder selectio ad purchasig also the maiteace work later. But due to the problem of school fuds, this makes some very good compaies usuccessful ad the midrage be elected. The author also wet to a survey of may istitutios admadearesearchabouttheoperatioofthecampuscard ad the cooperatios of those uiversities. All the istitutios the author picked are capable; they oly cosider the quality ottheprice.tomakethecardmoresecureforourschool, the author got the school s secret istructios ad carried

2 Joural of Cotrol Sciece ad Egieerig out mock attacks i order to detect the oe-card server backgroud security issues. Although we spet less moey, to require security comes first. Oly school leadership ad the direct leadership kow about this actio. Sice those IP ad scree shots i the papers are ot real, they are very similar. Thistaskistobepossibletocotrolalloftheservers,so we ca require developers to do the upgrade or debuggig, guaratee the safety of the school etwork server, ad make future work be well prepared 5.This school cotais campus etwork, oe-card service, postal savigs, ad other fiacial systems. All of these four systems are i oe etwork, so the security is the most importat thig. The iformatio o the etwork is real moey; if ay problem occurs, the cosequece will be uable to be estimated. With the fast developmet of Iteret techologies recetly, computer etworks have played a icreasigly importat role i the fields of politics, ecoomy, military, ad social life. Although etwork techologies brig about edless coveiece for people s lifeadwork,theopeessaditercoectioofetworks make etwork attacks become more uiversal, ad etwork security problems have attracted wide attetio. Risk always exists i the real etwork eviromet. I order to esure ormal operatio of etworks, hidde troubles i etworks must be idetified ad aalyzed, ad proper measures must be adopted to decrease the risk accordig to aalysis results. Therefore, how to accurately evaluate the security of a etwork becomes a importat problem, ad it has bee oe of the research focuses i the field of etwork security 6. Hao ad Li 7 proposed a ew sortig method which used the possible degree matrix to solve the sortig problem of ituitioistic trapezoidal fuzzy umbers. Wag 8 reviewed the curret research o the multicriteria liguistic decisio-makig methods ad fuzzy multicriteria decisiomakig methods based o fuzzy umber, ituitioistic fuzzy set, ad vague set ad the proposed the defiitio of ituitioistic trapezoidal fuzzy umbers ad iterval ituitioistic trapezoidal fuzzy umber. Wag ad Zhag 9proposed a multicriteria decisio-makig approach for multicriteria decisio-makig problems i which weight iformatio was ot completely kow ad the criteria values were ituitioistic trapezoidal fuzzy umbers. Wa ad Dog 10 studied the multiattribute group decisio-makig method based o ituitioistic trapezoidal fuzzy umbers. Firstly, the expectatios ad the expected score of ituitioistic trapezoidal fuzzy umber were defied based o the fuctio of the gravity ceter of the image. Secodly the IT-OWA ad IT- HA operators were proposed. Based o these operators, the multiattribute group decisio-makig method based o ituitioistic trapezoidal fuzzy umber was preseted. Wag et al. 11 proposed the ituitioistic trapezoidal fuzzy geometric aggregatio operators,icludig the ituitioistic trapezoidal fuzzy weighted geometric (IT-WG) operator, ituitioistic trapezoidal fuzzy ordered weighted geometric (IT-OWG) operator, ad ituitioistictrapezoidal fuzzy hybrid geometric (IT-HG) operator. The the multicriteria decisiomakigmethodbasedotheaggregatiooperatorswas proposed.wuadliu12proposedtheiterval-valuedituitioistic trapezoidal fuzzy weighted geometric (IVITFWG) operator, the iterval-valued ituitioistic trapezoidal fuzzy ordered weighted geometric (IVITFOWG) operator, ad the iterval-valued ituitioistic trapezoidal fuzzy hybrid geometric (IVITFHG) operator. Wu ad Cao 13 ad Wei et al. 14 proposed the iterval ituitioistic trapezoidal fuzzy weighted geometric (IITFWG) operator, the iterval ituitioistic trapezoidal fuzzy ordered weighted geometric (IIT- FOWG) operator, ad iterval ituitioistic trapezoidal fuzzy hybrid geometric (IITFHG) operator, ad based o these operators, a ew decisio-makig method was preseted to solve the MAGDM problems i which attribute values take the form of iterval ituitioistic trapezoidal fuzzy umbers. I this paper, we ivestigate the multiple attribute decisio-makig problems for evaluatig the computer etwork security with ituitioistic trapezoidal fuzzy iformatio. We utilize the ituitioistic trapezoidal fuzzy weighted average (ITFWA) operator to aggregate the ituitioistic trapezoidal fuzzy iformatio correspodig to each alterative ad get the overall value of the alteratives ad the rak the alteratives ad select the most desirable oe(s) accordig to thedistacebetweetheoverallvalueofthealterativesad ideal solutio. Fially, a illustrative example for evaluatig the computer etwork security is give. 2. Prelimiaries I the followig, we will itroduce some basic cocepts related to ituitioistic trapezoidal fuzzy umbers. Defiitio 1. Let a be a ituitioistic trapezoidal fuzzy umber; its membership fuctio is 9, 15 x a b a μ a, a x<b; { μ a, b x c; μ a (x) d x { d c μ a, c<x d; { 0, others. Its omembership fuctio is b x+ a (x a 1 ), a b a 1 x<b; 1 { a, b x c; a (x) x c+ a (d 1 x), c<x d { d 1 c 1 ; { 0, others, where 0 μ a 1; 0 a 1;adμ a + a 1; a, b, c, d R. I the followig, Wei developed a ew operator called ituitioistic trapezoidal fuzzy weighted average (ITFWA) operator 16. Defiitio 2 (see 16). Let a j (a j,b j,c j,d j ; μ aj, aj ) (j 1,2,...,) be a collectio of ituitioistic (1) (2)

Joural of Cotrol Sciece ad Egieerig 3 trapezoidalfuzzy umbers, ad let ITFWA: Q Q, if ITFWA ω ( a 1, a 2,, a ) (ω j a j ) ( ω j a j, 1 ω j b j, (1 μ aj ) ω j, ω j c j, ω j d j ; ( aj ) ω j), where ω(ω 1,ω 2,...,ω ) T is the weight vector of a j (j 1,2,...,)adω j 0, ω j 1; the ITFWA is called the ituitioistic trapezoidal fuzzy weighted average (ITFWA) operator. Defiitio 3 (see 16). For a ormalized ituitioistic trapezoidal fuzzy decisio-makig matrix R ( r ij ) m (a ij,b ij,c ij,d ij ; μ ij, ij ) m,where0 a ij b ij c ij d ij 1, 0 μ ij, ij 1,0 μ ij + ij 1, the ituitioistic trapezoidal fuzzy positive ideal solutio is defied as follows: (3) r + (a +,b +,c +,d + ;μ +, + ) (1, 1, 1, 1 ;1,0). (4) Defiitio 4 (see 16). Let a 1 (a 1,b 1,c 1,d 1 ; μ a1, a1 ) ad a 2 (a 2,b 2,c 2,d 2 ; μ a2, a2 ) be two ituitioistic trapezoidal fuzzy umbers; the the ormalized Hammig distace betwee a 1 ad a 2 is defied as follows: d( a 1, a 2 ) 1 8 ( (1 + μ a 1 a1 )a 1 (1+μ a2 a2 )a 2 a1 )b 1 (1+μ a2 a2 )b 2 a1 )c 1 (1+μ a2 a2 )c 2 a1 )d 1 (1+μ a2 a2 )d 2 ). (5) 3. Numerical Example With the popularizatio of computer techology, etwork provides great impetus for the advacemet of society. However, the developmet of the etwork techology faces great challeges uder the uceasig rigorous etwork situatio, ad traditioal sigle-poit heterogeeous security defese techologies, such as IDS, Firewall, ad VPN, ca ehace security performace of etwork system to a certai degree, amog which lack of effective collaboratio leads to beig uable to moitor the whole etwork security situatio. Uder this circumstace, the research about etwork security situatio awareess (NSSA) has upper academic valueadcomprehesivepracticalvalue.buttheresearches related to NSSA are still far away from maturatio at the preset. Most of the situatio awareess models are based o sigle-source eviromet; quatificatio awareess methods maily deped o quatifyig the raw alerts of the security sesor ad they caot actualize the awareess of attack steps ad sequeces. The research about situatio evaluatio maily focuses o the costructio of idex systemadislackofdeepstudyievaluatiomodelad method. This sectio presets a umerical example to evaluate the computer etwork security with ucertai liguistic iformatio to illustrate the method proposed i this paper. There are five possible computer etwork systems A i (i 1, 2, 3, 4, 5) forfourattributesg j (j 1, 2, 3, 4). The four attributes iclude the tactics (G 1 ), techology ad ecoomy (G 2 ), logistics (G 3 ), ad strategy (G 4 ), respectively. The five possible computer etwork systems A i (i 1,2,...,5)are to be evaluated usig the ituitioistic trapezoidal fuzzy iformatio by the decisio maker uder the above four attributes whose weightig vector ω (0.3, 0.2, 0.1, 0.4) T,as listed i the followig matrix R (0.5, 0.6, 0.7, 0.8 ; 0.5, 0.4) (0.6, 0.7, 0.8, 0.9 ; 0.7, 0.3) (0.1, 0.2, 0.4, 0.5 ; 0.6, 0.4) (0.3, 0.4, 0.5, 0.6 ; 0.8, 0.1) (0.2, 0.3, 0.4, 0.5 ; 0.6, 0.2) (0.1, 0.2, 0.3, 0.4 ; 0.6, 0.3) (0.5, 0.6, 0.7, 0.8 ; 0.7, 0.2) (0.2, 0.3, 0.5, 0.6 ; 0.5, 0.4) (0.1, 0.3, 0.4, 0.5 ; 0.6, 0.3) (0.3, 0.4, 0.5, 0.6 ; 0.4, 0.3) (0.5, 0.6, 0.8, 0.9 ; 0.3, 0.6) (0.4, 0.5, 0.7, 0.8 ; 0.7, 0.2) (0.5, 0.6, 0.7, 0.8 ; 0.5, 0.3) (0.1, 0.3, 0.5, 0.7 ; 0.3, 0.4) (0.2, 0.3, 0.4, 0.5 ; 0.7, 0.1) (0.4, 0.5, 0.6, 0.7 ; 0.2, 0.7) (0.5, 0.6, 0.7, 0.9 ; 0.4, 0.5) (0.3, 0.5, 0.7, 0.9 ; 0.2, 0.3) (0.6, 0.7, 0.8, 0.9 ; 0.2, 0.6) (0.5, 0.6, 0.7, 0.8 ; 0.1, 0.3). (6) The, we utilize the approach developed to get the most desirable computer etwork system(s). Step 1. Utilize the weight vector ω (0.3, 0.2, 0.1, 0.4) T,ad by (3), we obtai the overall values r i of the computer etwork systems A i (i 1, 2, 3, 4, 5): r 1 (0.37, 0.46, 0.65, 0.71 ; 0.2435, 0.6127), r 2 (0.46, 0.52, 0.66, 0.84 ; 0.4780, 0.4011), r 3 (0.30, 0.43, 0.61, 0.72 ; 0.4203, 0.4521), r 4 (0.22, 0.43, 0.51, 0.67 ; 0.3055, 0.4322), r 5 (0.23, 0.35, 0.42, 0.51 ; 0.4954, 0.3247). Step 2. Calculate the distaces betwee overall values r i (a i,b i,c i,d i ; μ i, i ) ad ituitioistic trapezoidal fuzzy (7)

4 Joural of Cotrol Sciece ad Egieerig positive ideal solutio r + (a +,b +,c +,d + ; μ +, + ) (1, 1, 1, 1; 1, 0): d( r 1, r + ) 0.8435, d ( r 2, r + ) 0.6568, d( r 3, r + ) 0.7089, d ( r 4, r + ) 0.7879, d( r 5, r + ) 0.7326. Step 3. Rak all the alteratives A i (i 1, 2, 3, 4, 5) i accordace with the distaces d( r i, r + ) betwee overall values r i (a i,b i,c i,d i ; μ i, i ) ad ituitioistic trapezoidal fuzzy positive ideal solutio: A 2 A 3 A 5 A 4 A 1,adthus the most desirable computer etwork system is A 2. 4. Coclusio Computer etwork security assessmet is a active security techology, which ca make etwork iformatio system more secure ad robust. Takig so may security factors such as threats, assets, ad vulerabilities ito accout, the computer etwork security assessmet techology ca help admiistrators take a active attitude to idetify those potetial threats that their systems will be exposed to. Now it has become the fudametal work ad the key lik for the atioal iformatio assurace framework. Whe we rely moreadmoreotheworldofiteretdaybyday,research o etwork iformatio risk assessmet will be oe of the research focuses i the etwork security field. The research of this dissertatio focuses o the quatitative methodologies of the etwork security assessmet. I this paper, we ivestigate the multiple attribute decisio-makig problems for evaluatig the computer etwork security with ituitioistic trapezoidal fuzzy iformatio. We utilize the ituitioistic trapezoidal fuzzy weighted average (ITFWA) operator to aggregate the ituitioistic trapezoidal fuzzy iformatio correspodig to each alterative ad get the overall value of the alteratives ad the rak the alteratives ad select the most desirable oe(s) accordig to the distace betwee theoverallvalueofthealterativesadidealsolutio.fially, a illustrative example for evaluatig the computer etwork security is give. Coflict of Iterests The author declares that there is o coflict of iterests regardig the publicatio of this paper. Refereces (8) ad ACO, Iteratioal Joural o Advaces i Iformatio Scieces ad Service Scieces,vol.5,o.1,pp.120 127,2013. 4 Y. Li, J. Yi, ad G. Wu, Model for evaluatig the computer etwork security with iterval-valued ituitioistic fuzzy iformatio, Iteratioal Joural of Digital Cotet Techology ad Its Applicatios,vol.6,o.6,pp.140 146,2012. 5 J. Dog, A approach to evaluatig the computer etwork security with hesitat fuzzy iformatio, Iteratioal Joural of Digital Cotet Techology ad Its Applicatios,vol.6,o.20, pp. 633 639, 2012. 6 Y.Li,X.Sha,adG.Wu, Comprehesiveevaluatiomodel for computer etwork security with liguistic iformatio, Advaces i Iformatio Scieces ad Service Scieces,vol.3,o. 9, pp. 126 131, 2011. 7 F.L.HaoadD.Q.Li, Aewrakigmethodoffuzzyumbers, Joural of Ordace Egieerig College,vol.19,pp.73 75,2007. 8 J. Q. Wag, Overview o fuzzy multi-criteria decisio-makig approach, Cotrol ad Decisio,vol.23,pp.601 607,2008. 9 J. Q. Wag ad Z. Zhag, Multi-criteria decisio-makig method with icomplete certai iformatio based o ituitioistic fuzzy umbers, Cotrol ad Decisio, vol. 24, o. 2, pp. 226 230, 2009. 10 S. P. Wa ad J. Y. Dog, Method of the ituitioistic trapezoidal fuzzy umber for multi-attribute group decisio, Cotrol ad Decisio,vol.25,o.5,pp.773 776,2010. 11 Y. Wag, S. F. Zhag, ad S. Q. Xie, Ituitioistic trapezoidal fuzzy geometric aggregatio operators ad their applicatio to group decisio makig, Value Egieerig,vol.27,pp.159 161, 2012. 12 J. Wu ad Y. Liu, A approach for multiple attribute group decisio makig problems with iterval-valued ituitioistic trapezoidal fuzzy umbers, Computers & Idustrial Egieerig,vol.66,pp.311 324,2013. 13 J. Wu ad Q. Cao, Same families of geometric aggregatio operators with ituitioistic trapezoidal fuzzy umbers, Applied Mathematical Modellig,vol.37,o.1-2,pp.318 327,2013. 14 G. Wei, X. Zhao, ad H. Wag, A approach to multiple attribute group decisio makig with iterval ituitioistic trapezoidal fuzzy iformatio, Techological ad Ecoomic Developmet of Ecoomy,vol.18,o.2,pp.317 330,2012. 15 J. Wag ad Z. Zhag, Programmig method of multi-criteria decisio-makig based o ituitioistic fuzzy umber with icomplete certai iformatio, Cotrol ad Decisio, vol.23, o. 10, p. 1145, 2008. 16 G. Wei, Some arithmetic aggregatio operators with ituitioistic trapezoidal fuzzy umbers ad their applicatio to group decisio makig, Joural of Computers, vol.5,o.3,pp.345 351, 2010. 1 X. Mo, Research o the computer etwork security evaluatio based o the ULCGM operator with ucertai liguistic iformatio, Joural of Covergece Iformatio Techology,vol.8, o. 3, pp. 160 166, 2013. 2 G. Zhag, H. Li, R. Che et al., Research ad desig o vulerability testig i computer etwork security system, Advaces i Iformatio Scieces ad Service Scieces,vol.5,o. 7, pp. 1 10, 2013. 3 G. Sog, Computer etwork security ad precautio evaluatio based o icremetal relevace vector machie algorithm

Iteratioal Joural of Rotatig Machiery The Scietific World Joural Joural of Robotics Advaces i Mechaical Egieerig Joural of Sesors Egieerig Joural of Iteratioal Joural of Chemical Egieerig Submit your mauscripts at Iteratioal Joural of Distributed Sesor Networks Advaces i Civil Egieerig VLSI Desig Advaces i OptoElectroics Modellig & Simulatio i Egieerig Iteratioal Joural of Navigatio ad Observatio Advaces i Acoustics ad Vibratio Joural of Cotrol Sciece ad Egieerig Active ad Passive Electroic Compoets Iteratioal Joural of Joural of Ateas ad Propagatio Shock ad Vibratio Electrical ad Computer Egieerig