원문정보
보안공학연구지원센터(IJSIA)
International Journal of Security and Its Applications
Vol.9 No.8
2015.08
pp.261-274
피인용수 : 0건 (자료제공 : 네이버학술정보)
목차
Abstract
1. Introduction
2. Overview of the Proposed Methodology
3. Approach of Modeling Influence Diagram
4. Method of Quantitative Analysis
4.1 Marking for Nodes
4.2 Acquisition of Prior Probability of Parent Node
4.3 Allocation of conditional Probability for Intermediate Node
4.4 Callllculation of Posterior Probability of Child Node
5. Case Study
6. Conclusion
Acknowledgements
References
1. Introduction
2. Overview of the Proposed Methodology
3. Approach of Modeling Influence Diagram
4. Method of Quantitative Analysis
4.1 Marking for Nodes
4.2 Acquisition of Prior Probability of Parent Node
4.3 Allocation of conditional Probability for Intermediate Node
4.4 Callllculation of Posterior Probability of Child Node
5. Case Study
6. Conclusion
Acknowledgements
References
저자정보
참고문헌
자료제공 : 네이버학술정보