{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:07:25Z","timestamp":1755907645090,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T00:00:00Z","timestamp":1698364800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,27]]},"DOI":"10.1145\/3640912.3640962","type":"proceedings-article","created":{"date-parts":[[2024,2,22]],"date-time":"2024-02-22T13:37:41Z","timestamp":1708609061000},"page":"255-258","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Fuzzy Analytic Hierarchy Process for Brittleness of Computer Network Security System"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-5481-4282","authenticated-orcid":false,"given":"Kai","family":"Jin","sequence":"first","affiliation":[{"name":"College of Weaponry Engineering, Naval University of Engineering, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6766-4720","authenticated-orcid":false,"given":"Xin","family":"Shan","sequence":"additional","affiliation":[{"name":"College of Coastal Defense, Naval University of Engineering, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8642-9536","authenticated-orcid":false,"given":"Yuan","family":"Zhou","sequence":"additional","affiliation":[{"name":"College of Weaponry Engineering, Naval University of Engineering, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6392-6116","authenticated-orcid":false,"given":"Jing","family":"Li","sequence":"additional","affiliation":[{"name":"College of Weaponry Engineering, Naval University of Engineering, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0336-1330","authenticated-orcid":false,"given":"Haidi","family":"Dong","sequence":"additional","affiliation":[{"name":"College of Weaponry Engineering, Naval University of Engineering, China"}]}],"member":"320","published-online":{"date-parts":[[2024,2,22]]},"reference":[{"volume-title":"34th Chinese Control and Decision Conference (CCDC)","author":"Zhuang Beibei","key":"e_1_3_2_1_1_1","unstructured":"Beibei Zhuang, Jianrong Wang, Fuli Huai. Evaluation of National Defense Science and Technology Venture Capital Project based on FAHP-FPP-TOPSIS model [C]. 34th Chinese Control and Decision Conference (CCDC), 2022: 4825-4830."},{"volume-title":"4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016)","key":"e_1_3_2_1_2_1","unstructured":"Chun-yuan Li. Research on Computer Network Security Assessment Based on Fuzzy Analytic Hierarchy Process [C]. 4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016), 2016: 110-115."},{"key":"e_1_3_2_1_3_1","volume-title":"Lower Indus Basin, Pakistan [C]\/\/CPS\/SEG Beijing 2018 international Geophysical Conference & Exposition","author":"Yasin Qamar","year":"2018","unstructured":"Qamar Yasin, Qizhen Du, Atif Ismail, etal. Relationships of Mechanical and Mineralogical Data for Brittleness Index Analyses of Shaheed Ghat Shale, Lower Indus Basin, Pakistan [C]\/\/CPS\/SEG Beijing 2018 international Geophysical Conference & Exposition, Beijing, China: 1578-1581, 2018."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.2991\/amee-17.2017.18"},{"issue":"2","key":"e_1_3_2_1_5_1","first-page":"368","volume":"28","author":"Weiqiang LIU","year":"2022","unstructured":"LIU Weiqiang, JIN Zhixian, XU Liyun. Health status evaluation of engine cylinder head assembly system based on brittleness and cloud model [J]. Computer Integrated Manufacturing Systems, 2022, 28(2):368-384.","journal-title":"Computer Integrated Manufacturing Systems"},{"key":"e_1_3_2_1_6_1","volume-title":"The analysis of the brittleness of the ladder-shaped shipboard power system based on risk entropy [D]","author":"Qingyu Yi","year":"2019","unstructured":"Yi Qingyu. The analysis of the brittleness of the ladder-shaped shipboard power system based on risk entropy [D]. Shanghai Jiao Tong University, 2019."},{"key":"e_1_3_2_1_7_1","volume-title":"Information Security Vulnerability Analysis of DCS System in Nuclear Power Plant Based on Attack Tree[J]","author":"Qing ZHAO","year":"2018","unstructured":"ZHAO Qing, LIU Zhaohui, CHEN Zhi. Information Security Vulnerability Analysis of DCS System in Nuclear Power Plant Based on Attack Tree[J]. Journal of University of South China (Science and Technology), 2018, 32(3):54-59."},{"key":"e_1_3_2_1_8_1","volume-title":"Research on Traffic Control Method Based on Network Brittleness [D]","author":"Xue Liu","year":"2020","unstructured":"Liu Xue. Research on Traffic Control Method Based on Network Brittleness [D]. Jilin University, 2020."},{"key":"e_1_3_2_1_9_1","volume-title":"Research on Computer Network Security Evaluation Based on Fuzzy Analytic Hierarchy Process [J]. Journal of anhui vocational and technical college","author":"Xunbao Wang","year":"2018","unstructured":"Wang Xunbao. Research on Computer Network Security Evaluation Based on Fuzzy Analytic Hierarchy Process [J]. Journal of anhui vocational and technical college, 2018, 17(1):1-3, 19."},{"issue":"7","key":"e_1_3_2_1_10_1","first-page":"85","volume":"51","author":"Shi WANG","year":"2022","unstructured":"WANG Shi, YANG Jing, JIANG Zhihao, etal. Application of Fuzzy Analytic Hierarchy Process in Modeling Optimization [J]. Computer Engineering, 2022, 51(7): 85-87.","journal-title":"Computer Engineering"},{"key":"e_1_3_2_1_11_1","volume-title":"Mining algorithm of ship fault data location based on fuzzy analytic hierarchy process [J]. Ship science and technology","author":"Chuan LI","year":"2022","unstructured":"LI Chuan. Mining algorithm of ship fault data location based on fuzzy analytic hierarchy process [J]. Ship science and technology, 2022, 44(15): 149-152."}],"event":{"name":"CNML 2023: 2023 International Conference on Communication Network and Machine Learning","acronym":"CNML 2023","location":"Zhengzhou China"},"container-title":["Proceedings of the 2023 International Conference on Communication Network and Machine Learning"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3640912.3640962","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3640912.3640962","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T14:46:28Z","timestamp":1755873988000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3640912.3640962"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,27]]},"references-count":11,"alternative-id":["10.1145\/3640912.3640962","10.1145\/3640912"],"URL":"https:\/\/doi.org\/10.1145\/3640912.3640962","relation":{},"subject":[],"published":{"date-parts":[[2023,10,27]]},"assertion":[{"value":"2024-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}