CN105005738A - Information security effect promotion method based on multi-attribute decision - Google Patents

Information security effect promotion method based on multi-attribute decision Download PDF

Info

Publication number
CN105005738A
CN105005738A CN201510338436.6A CN201510338436A CN105005738A CN 105005738 A CN105005738 A CN 105005738A CN 201510338436 A CN201510338436 A CN 201510338436A CN 105005738 A CN105005738 A CN 105005738A
Authority
CN
China
Prior art keywords
information security
lifting scheme
effectiveness
information
security effectiveness
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510338436.6A
Other languages
Chinese (zh)
Inventor
龙震岳
魏理豪
钱扬
樊凯
梁志宏
邹洪
艾解清
张金波
张超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Information Center of Guangdong Power Grid Co Ltd
Original Assignee
Information Center of Guangdong Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Information Center of Guangdong Power Grid Co Ltd filed Critical Information Center of Guangdong Power Grid Co Ltd
Priority to CN201510338436.6A priority Critical patent/CN105005738A/en
Publication of CN105005738A publication Critical patent/CN105005738A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses an information security effect promotion method based on a multi-attribute decision. The method is characterized by comprising the following steps of S1, obtaining basic requirements for an information system; S2, determining candidate information security effect promotion schemes; S3, obtaining an efficiency index EI of each information security effect promotion scheme; S4, determining key impacting factors of an information security effect promotion scheme decision; S5, computing the weight of each key impacting factor; S6, obtaining a comprehensive index GI of each information security effect promotion scheme; and S7, sorting according to a relative comprehensive index RGI, and selecting an optimal information security effect promotion scheme. The method for selecting an optimal scheme for effect promotion of information security measures based on the multi-attribute decision provides a decision support for effectively implementing system information security management, and has the advantages of good stability, high reliability, high precision, low complexity, good information security evaluation normalization and consistency, and strong information management credibility.

Description

A kind of information security effectiveness method for improving of multiple attribute decision making (MADM)
Technical field
The present invention relates to technical field of information management, especially relate to a kind of information security effectiveness method for improving of multiple attribute decision making (MADM).
Background technology
Multiple-criteria Decision Problems extensively exists in each field.Wherein, it is multiple attribute decision making (MADM) in limited time that alternatives has, and is multiobjectives decision time alternatives continuous (infinitely individual).The investigation and application of criteria decision-making method is a lot, as: the Vague diversity method proposing a kind of new Multi-Objective Fuzzy Decision in " Multicriteria fuzzy decision-making method of Vague collection " literary composition, the method utilizes a new score function to sort to scheme, select optimal case, and provide its relevant nature, prove the defect which solving the Multicriteria fuzzy decision-making method of existing Vague collection, illustrated validity and the superiority of new method by example.A kind of new evaluation method is proposed in " the multiobjectives decision ideal interval method of Integrated Assessment of Urban Environmental Quality " literary composition, i.e. multiobjectives decision ideal interval method, city environmental quality is evaluated by the method, evaluation criterion is processed into the form of ideal interval, and determines weight by hereditary projection Pursuit Method.Project Bidding Procurement is also the decision-making problem of multi-objective of a quasi-representative, in " fuzzy Multiobjective Group Decision of Project Bidding Procurement " literary composition, the Fuzzy Multiobjective groups Decision Method based on Fuzzy Set Theory is used in calling for tenders of project decision-making, decision maker only need comply with its experience and preference, independently index evaluation is carried out to each bidder by linguistic variable, again by these linguistic variables of Fuzzy Quantification process, the calculating via decision model obtains the trap queuing of scheme.Other method somebody artificial neural networks, genetic algorithm, grey evaluation, fuzzy Bayesian decision, rough set and evidence theory, random and theory of probability, FUZZY SET APPROACH TO ENVIRONMENTAL etc.
But information security effectiveness lifting scheme or effectiveness are promoted to the multiple attribute decision making (MADM) of system of selection, research both domestic and external is few.As: have studied the correlativity that different safety practices resists a certain risk at " Evaluation of Effectiveness for Information System Safety Measurements " in literary composition, obtain safety practice Effectiveness Evaluation Model.Ambiguity multiple attributive decision making method is utilized in " application of Fuzzy Multi-Attribute Decision Making in Information Security Evaluation " literary composition, establish the quantitative model of a kind of information system security management comprehensive assessment, be intended to the impact of comprehensive various qualitative, quantitative evaluation factor, obtain the quantized value of the comprehensive evaluation to security of system, thus improve the level of scientific management of infosystem.In " Evaluation of Information System Security theory and key technology research thereof " literary composition, propose the information system security decision-making technique based on fuzzy multi-attribute group decision, and adopt the various Index Assessment safety practices of multi objective, obtain the sequence of safety practice.
When selecting optimization information security effectiveness lifting scheme, in existing major part research or selection evaluation procedure, do not utilize Fuzzy Multiple Attribute Decision Making Theory, but use the unique method that manual operation or subjective judgement are selected as optimal case simply, the selection mechanism of information security effectiveness lifting scheme is made to have suitable subjective judgement color, and select evaluation procedure comparatively complicated loaded down with trivial details, its most of system of selection does not have objectivity, thus causing information security effectiveness lifting scheme and non-optimal, its Selection effect is not good.
Summary of the invention
Technical matters to be solved by this invention is for above-mentioned deficiency of the prior art, a kind of information security effectiveness method for improving of multiple attribute decision making (MADM) is provided, the information security measures effectiveness lifting optimal case system of selection that the present invention is based on multiple attribute decision making (MADM) is that effective implementation system information security management provides decision support, the heavy dependence to the subjective factor of personnel in information security measures effect assessment process can be alleviated, subjective error disturbance is investigated to the influence degree of net result by sensitivity analysis, namely when the internal and external factor of scheme changes, desired value is in what range, the order of having discharged is constant, thus the stability of analysis decision result and reliability, decrease the subjectivity of input data.The standardization of the measure effect assessment process that can ensure information security and the consistance of information security measures effect assessment result and trackability, reduce the complexity that information security measures effectiveness promotes optimal case selection, improve the objective confidence level that information security measures effectiveness promotes optimal case selection, its effect is all good, for the information security management activity in real network environment provides guidance.
For solving the problems of the technologies described above, the technical solution used in the present invention is: a kind of information security effectiveness method for improving of multiple attribute decision making (MADM), is characterized in that, comprise the following steps:
The basic demand of S1, obtaining information system;
S2, determine alternative information security effect lifting scheme;
The efficiency index EI of S3, obtaining information safety effectiveness lifting scheme;
The main affecting factors of S4, the decision-making of comformed information safety effectiveness lifting scheme;
The weight of S5, calculating main affecting factors;
The aggregative index GI of S6, obtaining information safety effectiveness lifting scheme;
S7, to sort according to relative aggregative index RGI, select optimization information security effect lifting scheme.
Further, described step S1 is specially: described infosystem basic demand is the basic demand meeting safe class requirement, and the unacceptable material risk of energy countermeasure system, cost is at acceptable scope and other related requests.
Further, described step S2 is specially: determine alternative information security effectiveness lifting scheme set P:{Pj|j=1,2 ..., s}, wherein, Pj is jth kind information security effectiveness lifting scheme, and s is the quantity of the safe effectiveness lifting scheme of alternate information.
Further, described step S3 is specially: described efficiency index EI account form is wherein, RLi is the risk class of risk ri, eji be information security effectiveness lifting scheme Pi to the validity of anti-risk ri, provide according to theoretical analysis, historical data, knowledge experience and actual conditions by sensitivity analysis and human expert are common.
Further, described step S4, S5 are specially: described main affecting factors be expressed as set F:{fi|i=1,2 ..., t}, corresponding weight be expressed as set W '=wi ' | i=1,2 ..., t}.
Further, described main affecting factors F is respectively the usefulness of information security effectiveness lifting scheme, safety practice utility value, protection based on security rank require, cost of investment, enforcement cost, its weights W ' be respectively 0.35,0.10,0.30,0.15,0.10.
Further, described step S6 is specially: described aggregative index GI computing formula is wherein, GIj is the aggregative index of information security effectiveness lifting scheme Pj, and Wi ' is the weight of i-th kind of factor of influence fi, and gji is the result be normalized k, and k is the value of information security effectiveness lifting scheme Pj on factor of influence fi.
Further, the account form of described parameter gji divides profit evaluation model objective attribute target attribute and cost type objective attribute target attribute two kinds, and wherein profit evaluation model objective attribute target attribute and cost type objective attribute target attribute account form are respectively:
g j i = h j i - min k = 1 s h k i max k = 1 s h k i - min k = 1 s h k i , g j i = max k = 1 s h k i - h j i max k = 1 s h k i - min k = 1 s h k i .
Wherein, h ji, h kibe respectively jth, a kth factor of influence.
Further, described step S7 is specially: described relative aggregative index RGI computing formula is then each information security effectiveness lifting scheme is sorted, thus draw optimized information security effectiveness lifting scheme.
The present invention compared with prior art has the following advantages: the information security measures effectiveness lifting optimal case system of selection that the present invention is based on multiple attribute decision making (MADM) is that effective implementation system information security management provides decision support, the heavy dependence to the subjective factor of personnel in information security measures effect assessment process can be alleviated, subjective error disturbance is investigated to the influence degree of net result by sensitivity analysis, namely when the internal and external factor of scheme changes, desired value is in what range, the order of having discharged is constant, thus the stability of analysis decision result and reliability, decrease the subjectivity of input data.The standardization of the measure effect assessment process that can ensure information security and the consistance of information security measures effect assessment result and trackability, reduce the complexity that information security measures effectiveness promotes optimal case selection, improve the objective confidence level that information security measures effectiveness promotes optimal case selection, its effect is all good, for the information security management activity in real network environment provides guidance.
Below by drawings and Examples, technical scheme of the present invention is described in further detail.
Accompanying drawing explanation
Fig. 1 is workflow diagram of the present invention;
Embodiment
As shown in Figure 1, a kind of information security effectiveness method for improving of multiple attribute decision making (MADM), is characterized in that, comprise the following steps:
The basic demand of S1, obtaining information system;
S2, determine alternative information security effect lifting scheme;
The efficiency index EI of S3, obtaining information safety effectiveness lifting scheme;
The main affecting factors of S4, the decision-making of comformed information safety effectiveness lifting scheme;
The weight of S5, calculating main affecting factors;
The aggregative index GI of S6, obtaining information safety effectiveness lifting scheme;
S7, to sort according to relative aggregative index RGI, select optimization information security effect lifting scheme.
In the present embodiment, described step S1 is specially: described infosystem basic demand is the basic demand meeting safe class requirement, and the unacceptable material risk of energy countermeasure system, cost is at acceptable scope and other related requests.
In the present embodiment, described step S2 is specially: determine alternative information security effectiveness lifting scheme set P:{Pj|j=1,2 ..., s}, wherein, Pj is jth kind information security effectiveness lifting scheme, and s is the quantity of the safe effectiveness lifting scheme of alternate information.
In the present embodiment, described step S3 is specially: described efficiency index EI account form is
EI i = Σ i = 1 n ( RL i × e t i ) - - - ( 1 )
Wherein, RLi is the risk class of risk ri, eji be information security effectiveness lifting scheme Pj to the validity of anti-risk ri, provide according to theoretical analysis, historical data, knowledge experience and actual conditions by sensitivity analysis and human expert are common.Efficiency index EI is the index of scaling information safe effectiveness lifting scheme usefulness, represents that various information security effectiveness lifting scheme is to anti-risk usefulness, and reflection information security effectiveness lifting scheme is to anti-risk resultant effect.
The risk of the infosystem of the present embodiment and the validity of information security effectiveness lifting scheme as shown in table 1.
The validity of table 1 information security effectiveness lifting scheme
The fundamental purpose that information security effectiveness lifting scheme usefulness calculates measures out various information security effectiveness lifting scheme to anti-risk relative efficacy, and sort to it, is beneficial to carry out security decision.Therefore, in order to make result more clear be convenient to contrast, use relative efficiency index to represent the relative efficacy of information security effectiveness lifting scheme here.REI is the result be normalized EI, as follows: REI i = ( EI i / max k = 1 s { EI k } ) × 100 - - - ( 2 )
According to table 1 and formula (1) and (2), efficiency index and the relative efficiency index of the safe effectiveness lifting scheme of alternate information can be calculated, as shown in table 2.
The relative efficiency index of table 2 information security effectiveness lifting scheme
Protection based on security rank requirement is the hard and fast rule of infosystem.When selecting information security effectiveness lifting scheme, except considering that the safe class of infosystem requires, except the usefulness of information security effectiveness lifting scheme, safety practice utility value, also to consider to introduce the cost of investment of information security effectiveness lifting scheme, implementing the factors such as cost.For different infosystems, the influence degree that various factor pair information security effectiveness lifting scheme is selected is different, so need according to actual conditions, determine various factor of influence F:{fi|i=1,2, ..., t} and corresponding weights W '=wi ' | and i=1,2 ..., t}, wherein fi is the weight of i-th kind of factor of influence.
In the present embodiment; described main affecting factors F is respectively the usefulness of information security effectiveness lifting scheme, safety practice utility value, protection based on security rank require, cost of investment, enforcement cost, its weights W ' be respectively 0.35,0.10,0.30,0.15,0.10.The factor and the weight that affect the selection of information security effectiveness lifting scheme are as shown in table 3.
Table 3 affects Main Factors and the weight thereof of information security effectiveness lifting scheme
In the present embodiment, described step S6 is specially: described aggregative index GI computing formula is wherein, GIj is the aggregative index of information security effectiveness lifting scheme Pj, and Wi ' is the weight of i-th kind of factor of influence fi, and gji is the result be normalized k, and k is the value of information security effectiveness lifting scheme Pj on factor of influence fi.
When selecting information security effectiveness lifting scheme, need to consider the many-sided factor affecting information security effectiveness lifting scheme and select, obtain information security effectiveness lifting scheme aggregative index GI with this, carry out choosing comprehensively information security effectiveness lifting scheme.According to GI, can determine, how under the prerequisite meeting the many-sided demand of infosystem, to take optimum information security effectiveness lifting scheme.
In the present embodiment, the account form of described parameter gji divides profit evaluation model objective attribute target attribute and cost type objective attribute target attribute two kinds, and wherein profit evaluation model objective attribute target attribute and cost type objective attribute target attribute account form are respectively:
g j i = h j i - min k = 1 s h k i max k = 1 s h k i - min k = 1 s h k i , g j i = max k = 1 s h k i - h j i max k = 1 s h k i - min k = 1 s h k i .
Wherein, h ji, h kibe respectively jth, a kth factor of influence.
In the present embodiment, hj1 is the relative efficiency index of information security effectiveness lifting scheme; Hj2 is the safety practice utility value of information security effectiveness lifting scheme; Hj3 be information security effectiveness lifting scheme to the matching degree of protection based on security rank requirement, can provide according to actual conditions; Hj4 is the cost of investment of information security effectiveness lifting scheme, and hj5 is the enforcement cost of information security effectiveness lifting scheme.
According to the analysis of table 2 with assessment experts, in above-mentioned evaluated infosystem, determine any one information security effectiveness lifting scheme Pj (j=1,2, ..., s) relative to various factor of influence fi (i=1,2 ..., t) value hji and gji, according to the data message of table 2 with table 3, thus obtain the aggregative index of information security effectiveness lifting scheme, as shown in table 4.
Table 4 information security effectiveness lifting scheme aggregative index
In table 4, information security effectiveness lifting scheme has considered the usefulness of information security effectiveness lifting scheme, safety practice utility value, protection based on security rank require, the factor such as cost of investment and enforcement cost.
In the present embodiment, described step S7 is specially: described relative aggregative index RGI computing formula is then each information security effectiveness lifting scheme is sorted, thus draw optimized information security effectiveness lifting scheme.As shown in table 5, the present embodiment, according to the relative aggregative index of table 5, sorts to each information security effectiveness lifting scheme.
The relative aggregative index of each information security effectiveness lifting scheme of table 5
The above; it is only preferred embodiment of the present invention; not the present invention is imposed any restrictions, every above embodiment is done according to the technology of the present invention essence any simple modification, change and equivalent structure change, all still belong in the protection domain of technical solution of the present invention.

Claims (9)

1. an information security effectiveness method for improving for multiple attribute decision making (MADM), is characterized in that, comprise the following steps:
The basic demand of S1, obtaining information system;
S2, determine alternative information security effect lifting scheme;
The efficiency index EI of S3, obtaining information safety effectiveness lifting scheme;
The main affecting factors of S4, the decision-making of comformed information safety effectiveness lifting scheme;
The weight of S5, calculating main affecting factors;
The aggregative index GI of S6, obtaining information safety effectiveness lifting scheme;
S7, to sort according to relative aggregative index RGI, select optimization information security effect lifting scheme.
2. according to the information security effectiveness method for improving of a kind of multiple attribute decision making (MADM) according to claim 1, it is characterized in that, described step S1 is specially: described infosystem basic demand is the basic demand meeting safe class requirement, the unacceptable material risk of energy countermeasure system, cost is at acceptable scope and other related requests.
3. according to the information security effectiveness method for improving of a kind of multiple attribute decision making (MADM) according to claim 1, it is characterized in that, described step S2 is specially: determine alternative information security effectiveness lifting scheme set P:{Pj|j=1,2, ..., s}, wherein, Pj is jth kind information security effectiveness lifting scheme, and s is the quantity of the safe effectiveness lifting scheme of alternate information.
4. according to the information security effectiveness method for improving of a kind of multiple attribute decision making (MADM) according to claim 1, it is characterized in that, described step S3 is specially: described efficiency index EI account form is wherein, RLi is the risk class of risk ri, eji be information security effectiveness lifting scheme Pj to the validity of anti-risk ri, provide according to theoretical analysis, historical data, knowledge experience and actual conditions by sensitivity analysis and human expert are common.
5. according to the information security effectiveness method for improving of a kind of multiple attribute decision making (MADM) according to claim 1, it is characterized in that, described step S4, S5 are specially: described main affecting factors is expressed as set F:{fi|i=1,2 ..., t}, corresponding weight be expressed as set W '=wi ' | i=1,2 ..., t}.
6. according to the information security effectiveness method for improving of a kind of multiple attribute decision making (MADM) according to claim 5; it is characterized in that; described main affecting factors F is respectively the usefulness of information security effectiveness lifting scheme, safety practice utility value, protection based on security rank require, cost of investment, enforcement cost, its weights W ' be respectively 0.35,0.10,0.30,0.15,0.10.
7. according to the information security effectiveness method for improving of a kind of multiple attribute decision making (MADM) according to claim 1, it is characterized in that, described step S6 is specially: described aggregative index GI computing formula is wherein, GIj is the aggregative index of information security effectiveness lifting scheme Pj, and Wi ' is the weight of i-th kind of factor of influence fi, and gji is the result be normalized k, and k is the value of information security effectiveness lifting scheme Pj on factor of influence fi.
8. according to the information security effectiveness method for improving of a kind of multiple attribute decision making (MADM) according to claim 7, it is characterized in that, the account form of described parameter gji divides profit evaluation model objective attribute target attribute and cost type objective attribute target attribute two kinds, and wherein profit evaluation model objective attribute target attribute and cost type objective attribute target attribute account form are respectively:
g j i = h j i - min k = 1 s h k i max k = 1 s h k i - min k = 1 s h k i , g j i = max k = 1 s h k i - h j i max k = 1 s h k i - min k = 1 s h k i
Wherein, hji, hki are respectively jth, a kth factor of influence.
9. according to the information security effectiveness method for improving of a kind of multiple attribute decision making (MADM) according to claim 1, it is characterized in that, described step S7 is specially: described relative aggregative index RGI computing formula is then each information security effectiveness lifting scheme is sorted, thus draw optimized information security effectiveness lifting scheme.
CN201510338436.6A 2015-06-17 2015-06-17 Information security effect promotion method based on multi-attribute decision Pending CN105005738A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510338436.6A CN105005738A (en) 2015-06-17 2015-06-17 Information security effect promotion method based on multi-attribute decision

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510338436.6A CN105005738A (en) 2015-06-17 2015-06-17 Information security effect promotion method based on multi-attribute decision

Publications (1)

Publication Number Publication Date
CN105005738A true CN105005738A (en) 2015-10-28

Family

ID=54378407

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510338436.6A Pending CN105005738A (en) 2015-06-17 2015-06-17 Information security effect promotion method based on multi-attribute decision

Country Status (1)

Country Link
CN (1) CN105005738A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107369081A (en) * 2017-07-19 2017-11-21 无锡企业征信有限公司 The system and method for data validity is determined with the dynamic effects factor of data source

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101640914A (en) * 2008-07-28 2010-02-03 华为技术有限公司 Method and device for achieving network selection
CN102781072A (en) * 2012-07-27 2012-11-14 南京邮电大学 Network selecting method based on multi-attribute decision-making and group decision-making
CN102932279A (en) * 2012-10-30 2013-02-13 北京邮电大学 Multidimensional resource scheduling system and method for cloud environment data center

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101640914A (en) * 2008-07-28 2010-02-03 华为技术有限公司 Method and device for achieving network selection
CN102781072A (en) * 2012-07-27 2012-11-14 南京邮电大学 Network selecting method based on multi-attribute decision-making and group decision-making
CN102932279A (en) * 2012-10-30 2013-02-13 北京邮电大学 Multidimensional resource scheduling system and method for cloud environment data center

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
刘芳: "信息***安全评估理论及其关键技术研究", 《中国优秀博硕士学位论文全文数据库(博士)信息科技辑》 *
马俊等: "一种信息***安全性定量评估方法的研究与实现", 《计算机工程与科学》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107369081A (en) * 2017-07-19 2017-11-21 无锡企业征信有限公司 The system and method for data validity is determined with the dynamic effects factor of data source

Similar Documents

Publication Publication Date Title
Brauers et al. MULTIMOORA for the EU Member States updated with fuzzy number theory
Fathi et al. A novel bidirectional network data envelopment analysis model for evaluating sustainability of distributive supply chains of transport companies
Roostaee et al. A multi-criteria intuitionistic fuzzy group decision making method for supplier selection with VIKOR method
CN102930482A (en) Investment effect evaluation method for county power distribution networks
Ilangkumaran et al. Optimization of wastewater treatment technology selection using hybrid MCDM
Esbouei et al. Using FANP and fuzzy VIKOR for ranking manufacturing companies based on their financial performance
Asadzadeh et al. Assessing site selection of new towns using topsis method under entropy logic: A case study: New towns of tehran metropolitan region (TMR)
Zhang et al. Risk assessment of water environment treatment PPP projects based on a cloud model
Li et al. Stochastic interval-grey number VIKOR method based on prospect theory
CN110288142A (en) A kind of engineering based on XGBoost algorithm is exceeded the time limit prediction technique
CN110135743A (en) Scientific and technological achievement benefit evaluation method based on intuition fuzzy hierarchical analysis model
Wang et al. Eco‐efficiency evaluation of petrochemical enterprises: An application of 3D state‐space model
CN105005738A (en) Information security effect promotion method based on multi-attribute decision
Rochman et al. Decision Support System of Poor Community Category in Sampang District using AHP (Analytical Hierarchy Process)
Hussain et al. Micro-factors influencing site selection for small and medium enterprises (SMEs) in Saudi Arabia: Al-Hassa area using Analytical Hierarchy Process (AHP) analysis
Liao Decision method of optimal investment enterprise selection under uncertain information environment
Roghanian et al. An approach in BOT project selection based on fuzzy QFD and TOPSIS with consideration of risk
Zawora Synthetic Assessment of Financial Situation of Local Governments in Podkarpackie Voivodeship Compared with other Polish Provinces.
CN101425157A (en) Overall evaluation method for railway emergency scheme
Bose et al. Application of optimized multi-criteria decision-making in an environmental impact assessment study
Polat Forecasting of production and scrap amounts using artificial neural networks
Warid et al. GIS-based Sustainability Assessment for Palm Oil Industry
Momade et al. Modeling labor costs using artificial intelligence tools
ELMA RENEWABLE ENERGY COMPANIES’RECENT OUTLOOK ON BORSA ISTANBUL WITH MOORA AND MABAC METHODS
Van Berkel et al. Building Loss Given Default Scorecard Using Weight of Evidence Bins in SAS Enterprise Miner

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20151028