Ontology and Weighted D-S Evidence Theory-Based Vulnerability Data Fusion Method
With the rapid development of high-speed and large-scale complex network, network vulnerability data presents the characteristics of massive, multi-source and heterogeneous, which makes data fusion become more complex.Although existing data Soft Doll fusion methods can fuse multi-source data, they do not consider that the multisource data may affec