Open Access
ITM Web Conf.
Volume 12, 2017
The 4th Annual International Conference on Information Technology and Applications (ITA 2017)
Article Number 03009
Number of page(s) 5
Section Session 3: Computer
Published online 05 September 2017
  1. W. Juan, Z. Fengli, F. Chong and C. Lisha, “Study on index system in network situation awareness, “ Computer Applications, vol. 27, no. 8, pp. 1907–1909, 2007 [Google Scholar]
  2. D. Bin, H. Weihong, and L. Aiping, “Research on quantitative assessment model for internet worm threat, “ Netinfo Security, no. 6, pp. 41–47, 2016. [Google Scholar]
  3. W. Zhiping, “Research of Network Security Situation Evaluation Based On Index System, “ National University of Science Technology, 2010. [Google Scholar]
  4. H. Lansheng, Z. Cong, Z. Mengsong and L. Qiwen, “Fuzzy Evaluation Model fro Harms of Computer Virus, “ Journal of Chinese Mini-Micro Computer System, vol. 31, no. 7, pp. 1297–1301, 2010. [Google Scholar]
  5. A. Peng, “Research and Implementation of Evaluation Technology of Network Attack Effect,” National University of Science Technology, 2015. [Google Scholar]
  6. [Google Scholar]
  7. T. L. Saaty, “how to make a decision: The analytic hierarchy process, “ European Journal of Operational Research, vol. 48, no. 1, pp. 9–26, 1990. [CrossRef] [Google Scholar]
  8. “A Comprehensive Analysis Report on Ukraine Power Grid Outage, “ Comprehensive Analysis Report on Ukraine Power Grid Outage/A Comprehensive Analysis Report on Ukraine Power Grid Outage.html, 2016. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.