Scientific and Technical Journal


ISSN Print 2221-3937
ISSN Online 2221-3805

The problem of calculating the fuzzy truth degree of linguistic variables in risk assessment in computing systems . The subject of the study are: models and methods for describing risks in computer systems . Risk analysis is proposed to carry out using the methodology Coras. Enter the complete orthogonal semantic space for computing degrees of truth of the constituent parts of risk assessment that allows you to move to calculate the fuzzy values, which more accurately describes the representation of the subject area . A description of the formal language representation of knowledge bases in order to improve the accuracy of calculations and extend the scope of the risk analysis of complex computer systems

  1. KopytchukN. B., TishinP. M., Botnar' K.V., and CjurupaM.V. Razrabotkaformalizovan-nogojazykaanalizariskovnaosnovedeskripcionnojlogiki. [Develop a Formalized Language of Risk Analysis Based Deskriptsionnoy Logic], (2011), Publ. in the Journal Elektrotehnic and Compputer Systems, Kiev, Ukraine, No. 2(78), pp. 103 –108 (In Russian).
  2. KopytchukN. B., TishinP. M., Botnar' K. V., and CjurupaM. V. Primenenienechetkojdeskripcionnojlogikiprirazrabotkeformalizovannogojazykaanalizariskov [ApplicationoffFuzzyLogicintheDevelopmentDeskriptsionnoyFormalizedLanguageofRiskAnalysis],(2011), Publ. in the Journal Elektrotehnic and Compputer Systems, Kiev, Ukraine, No. 4(80), pp 168 – 176 (In Russian).
  3. Kopytchuk N.B., Tishin P.M., Botnar' K.V., and Cjurupa M.V. Analiz vychislitel'nyh setej s pomoshh'ju mnogourovnevoj ontologii ocenki riskov s primeneniem metodologii CORAS [Analysis of Computer Networks Using a Multi-level Ontology of Risk Assessment Methodology Using CORAS], (2013), Publ. in the Journal Elektrotehnic and Compputer Systems, Kiev, Ukraine, No. 10(86), pp. 120 – 126 (In Russian).
  4. KopytchukN.B., TishinP.M., and CjurupaM.V. SozdanienechetkihbazznanijprianalizeriskovvdiagrammahCoras,[Creating Fuzzy Knowledge Bases in Risk Analysis Diagrams CORAS], (2013), Materialy Vtoroj Mezhdunarodnoj Nauchno-tehnicheskoj Konfe-rencii “Vychislitel'nyj Intelekt (SI–2013)”, Cherkassy, Ukraine, pp. 196 – 197 (in Russian).
  5. RyzhovA.P. Jelementyteoriinechetkihmnozhestvieeprilozhenij. [Elements of the theory of Fuzzy Sets and its Applications], (1998), Dialog–Moskovskij Gosudarstvennyj Universitet, Moskva, Russian Federation, 81 p. (In Russian).
  6. PospelovD.A. Nechetkiemnozhestvavmodeljahupravlenijaiiskusstvennogointellekta. [Fuzzy Sets in Management Models and Artificial Intelligence], (1986), Nauka Publ., Moskva, Russian Federation, 312 p. (In Russian).
  7. DiligenskijN.V., andDymovaL.G., Sevast'janovP.V. Nechetkoemodelirovanieimnogokriterial'najaoptimizacijaproizvodst-vennyhsistemvuslovijahneopredelennosti: tehnologija, jekonomika, jekologija [FuzzyModelingandMulti-criteriaOptimizationofProductionSystemsunderUncertainty: Technology, Economy, Ecology],(2004), Moskva, Russian Federation, Publ.Izdatel'stvoMashinostroenie, 397p. (InRussian).
  8. TishinP.M., Botnar' K.V. Nechetkiemodelisetejsvjazi [FuzzyModelsofCommunicationNetworks], (2009), Odessa, Ukraine, OdesskajaGosudarstvennajaAkademijaHoloda, No. 8, pp. 60 – 67 (InRussian).
  9. Lund, M.S., Solhaug, B., Stølen, K.:Model-driven Risk Analysis. The CORAS Approach, Springer, (2011), 476p. [In English].
  10.  Lund M.S., Solhaug B., and Stølen K. Risk Analysis of Changing and Evolving Systems using CORAS, (2011), Foundations of Security Analysis and Design VI (FOSAD'11), Number 6858 in Lecture Notes in Computer Science, Springer, pp. 231 – 274 [In English].
  11. Dahl H.E.I. The CORAS Method for Security Risk Analysis, (2008), Tutorial Presentation at 7th Estonian Summer School on Computer and Systems Science in Cooperation with the Nordic Network On Dependable Systems (NODES), Otepää, Estonia, pp. 24 – 29 [In English].
  12. Mayer N., Heymans P., and  Matulevicius R. (2007), Design of a Modelling Language for Information System Security Risk Management. In: Proceedings of the First International Conference on Research Challenges in Information Science, RCIS 2007, pp 121 – 132 [In English].
  13. International Electrotechnical Com-mission: IEC 61025, (1990), Fault Tree Analysis (FTA) [In English].
  14. International Electrotechnical Com-mission: IEC 60300-3-9 Dependability Management, Part 3: Application guide, Section 9: Risk Analysis of Technological Systems, (1995), Event TreeAnalysis (ETA) [In English].
  15. Zadeh L.A. Fuzzy Sets. Information and Control, (1965), Vol.8, pp. 338 – 353 [In English].
Last download:
2017-11-16 11:39:09

[ © KarelWintersky ] [ All articles ] [ All authors ]
[ © Odessa National Polytechnic University, 2014. Any use of information from the site is possible only under the condition that the source link! ]