共 11 条
- [1] Xu Shuo, Tang Zuoqi, Wang Xin, Information security risk assessment based on D-AHP and grey theory, Computer Engineering, 45, 7, pp. 194-202, (2019)
- [2] Zhao Gang, Wu Tianshui, Information security risk assessment based on G-ANP, Journal of Tsinghua University (Science and Technology), 53, 2, pp. 1761-1767, (2013)
- [3] Antonio R, Ortega F, Ramrio C., A method for the evaluation of risk in IT projects, Expert Systems with Applications, 45, C, pp. 273-285, (2016)
- [4] Hong Q, Jian W T, Zheng T, Et al., An information security risk assessment algorithm based on risk propagation in energy Internet, 2017 IEEE Conference on Energy Internet and Energy System Integration (EI2), pp. 1-6, (2017)
- [5] Feng N, Wang H J, Li M Q., A security risk analysis model for information systems: causal relationships of risk factors and vulnerability propagation analysis, Information Sciences, 6, pp. 57-73, (2014)
- [6] Brin S, Page L., The anatomy of a large-scale hyper textual web search engine, Computer Networks and ISDN Systems, 30, 1, pp. 107-117, (1998)
- [7] Xi Rongrong, Yun Xiaochun, Zhang Yongzheng, Et al., An improved quantitative evaluation method for network security, Chinese Journal of Computers, 38, 4, pp. 749-758, (2015)
- [8] Whitman M, Mattord H, Whitman, Et al., Principles of information security, pp. 60-64, (2003)
- [9] The standardization administration of china. information security risk assessment specification: GB/T 20984-2007, pp. 6-8, (2007)
- [10] Huang Yujie, Tang Zuoqi, Liang Jing, Information security risk assessment based on information entropy and three-parameter interval, Computer Engineering, 44, 12, pp. 65-69, (2018)