期刊文献+

基于D-S证据理论的C2C交易风险评估模型 被引量:3

Risk Evaluation Model of C2C Translation Based on D-S Evidence Theory
原文传递
导出
摘要 随着电子商务广泛展开,越来越多的用户选择C2C网上交易,但交易风险也不可忽视,对于普通用户来说,如何正确认识交易中的风险是确定选择该交易的重要依据.基于D-S证据理论的证据融合法,将C2C交易中的不确定性多级多指标评估问题转化为确定性单一总指标的风险评估问题,构建了一种比较通用的C2C交易风险评估模型.实例表明利用实践证明该方法是有效性的,可以为交易者提供参考.文中实例均来自淘宝网,但方法也适用于其它C2C交易平台,具有一定的应用价值. With the electronic commerce widely launches, more and more sellers and buyers translate online. But the transaction risk is also noticeable. It is important for normal users to know the risk correctly during these translates. Based on Dempster-Shafer's evidence theory, an evaluation used to evaluate the risk of C2C translation is proposed. It converted the uncertain multi-index multi-degree assessment problem involving the risk of C2C translation into a definite single - index evaluation problem. Finally, the case analysis shows that the method is efficient and practical for the evaluation of C2C translation risk, and may provide the reference for the sellers and buyers.
出处 《数学的实践与认识》 CSCD 北大核心 2010年第12期111-117,共7页 Mathematics in Practice and Theory
关键词 D—S证据理论 C2C 风险评估 交易安全 D-S evidence theory C2C risk evaluation security of translation
  • 相关文献

参考文献6

二级参考文献56

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:308
  • 2张响亮,王伟,管晓宏.基于隐马尔可夫模型的程序行为异常检测[J].西安交通大学学报,2005,39(10):1056-1059. 被引量:16
  • 3赵冬梅,徐宁,马建峰.无线网络安全的风险评估[J].网络安全技术与应用,2006(3):91-93. 被引量:8
  • 4Ashley, P. , Hinton, H. , Vandenwauver, M. Wired versus wireless security : The Internet, WAP and iMode for e - commerce[ C]. In Proceedings of Annual Computer Security Applications Conferences, 2001. 被引量:1
  • 5Chaff, S. , Kermani, P. , Smith, S. , Tassiulas, L. Security issues in m -commerce: A usage -based taxonomy [ J ]. E -Commerce Agents, 2001, 264-282. 被引量:1
  • 6Pietro, D. , Mancini, R. L.V. Security and privacy issues of handheld and wearable devices[ J]. Communications of the ACM, 2003, 46(9) , 75 -79. 被引量:1
  • 7Ghosh, A. K., Swaminatha, T. M. Software security and privacy risks in mobile e - commerce [ J]. Communications of the ACM, 2001, 44(2) : 51 -57. 被引量:1
  • 8Bones, E., Hasvold, P. , Henriksen, E. , et al. Risk analysis of information security in a mobile instant messaging and presence system for healthcare[ J]. International Journal of Medical Informatics, 2006, 6 (2) : 1 - 11. 被引量:1
  • 9CarlaE. Brodley and Paul EU tgo. Multivariate decision trees [J]. Machine Learning, 19:45 -77,1995. 被引量:1
  • 10Shafer G. A Mathematical Theory of Evidence [ M ]. Princeton, NJ : Princeton University Press, 1976. 被引量:1

共引文献86

同被引文献40

引证文献3

二级引证文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部