1 |
Q. Wang and H. J. Chen, Computer network security and defense technology research, in Proc. Eighth Int. Conf. Meas. Tech. Mech. Autom. (Macau, China), 2016, pp. 155-157.
|
2 |
J. Mi et al., Reliability analysis of complex multi-state system with common cause failure based on DS evidence theory and bayesian network, in Recent Advances in Multi-state Systems Reliability, Springer, 2018, pp. 19-38.
|
3 |
X. W. Liu, Network Security Situation Quantification Aware - ness and Evaluation Based on Multi-source Fuson, Harbin Engineering University, Harbin, China, 2009.
|
4 |
C. Yi, Q. Huang, and Y. Chen, An improve information fusion algorithm based on BP neural network and D-S evidence theory, in Proc. Third Int. Conf. Digital Manuf. Autom. (CuiLin, China), 2012, pp. 179-181.
|
5 |
T. Leibovich and D. Ansari, The symbol-grounding problem in numerical recognition: A review of theory, evidence, and outstanding questions, Can. J. Exp. Psychol. 70 (2016), no. 1, 12-23.
DOI
|
6 |
W. Q. Zhang and Y. Deng, Combining conflicting evidence using the DEMATEL method, Soft Comput. 23 (2018), 8207-8216.
|
7 |
Y. Wang, K. Zhang, and Y. Deng, Base belief function: an efficient method of conflict management, J. Amb. Intel. Hum. Comp. 10 (2019), 3427-3437.
DOI
|
8 |
F. Xiao, Multi-sensor data fusion based on the belief divergence measure of evidences and the belief entropy, Inform. Fusion 46 (2019), 23-32.
DOI
|
9 |
F. Y. Xiao and W. P. Ding, Divergence measure of Pythagorean fuzzy sets and its application in medical diagnosis, Appl. Soft Comput. 79 (2019), 254-267.
DOI
|
10 |
J. Wu et al., Big data analysis-based security situational awareness for smart grid, IEEE Trans. Big Data 4 (2016), no. 3, 408-417.
DOI
|
11 |
F. Xiang and Z. Jian, A D-S evidence weight computing method for conflict evidence, Comput. Eng. 2016-2 (2016).
|