Research on Information Security Risk Assessment Method Based on Fuzzy Rule Set

被引:0
|
作者
Cai, Wentian [1 ]
Yao, Huijun [2 ]
机构
[1] School of Cyber Science and Engineering, Southeast University, Nanjing,210096, China
[2] Jiangsu Broadcasting Cable Information Network Corp. Ltd., Nanjing,210096, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] Research on the University Network Information Security Risk Management Model Based on the Fuzzy Sets
    Huo, Cai-qiao
    Meng, Li-zhuang
    Chen, Kai
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTOMATION, MECHANICAL CONTROL AND COMPUTATIONAL ENGINEERING, 2015, 124 : 89 - 93
  • [42] Research on Network Security Risk Assessment Method Based on Bayesian Reasoning
    Li, Xiangna
    Li, Mengao
    Wang, Hui
    PROCEEDINGS OF 2019 IEEE 9TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC 2019), 2019, : 102 - 108
  • [43] Research on the Lightning Risk Assessment Method for Chongqing Based on Fuzzy Mathematics
    Yu Shuyu
    Ren Yan
    2014 INTERNATIONAL CONFERENCE ON LIGHTNING PROTECTION (ICLP), 2014, : 1054 - 1057
  • [44] Application of fuzzy set theory to evaluate the rate of aggregative risk in information security
    Tamjidyamcholo, Alireza
    Bin, Mohd Sapiyan
    Yamchello, Hamed Tamjid
    Gholipour, Rahmatollah
    2013 INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEMS (ICRIIS), 2013, : 410 - 415
  • [45] Network Information Security Risk Assessment Method Based on Machine Learning Algorithm
    Jiang, Ruirong
    Wan, Liyong
    ADVANCED HYBRID INFORMATION PROCESSING, ADHIP 2022, PT II, 2023, 469 : 403 - 416
  • [46] Research on fuzzy group decision making in security risk assessment
    Liu, F
    Dai, K
    Wang, ZY
    Ma, J
    NETWORKING - ICN 2005, PT 2, 2005, 3421 : 1114 - 1121
  • [47] An information Security Risk Assessment Method Based on Conduct Effect and Dynamic Threat
    Qiao Hong
    Tian Jianwei
    Tian Zheng
    Qi Wenhui
    Li Xi
    Zhu Hongyu
    Chen Shengsheng
    PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017, : 782 - 786
  • [48] Information security risk assessment using the AHP method
    Zaburko, J.
    Szulzyk-Cieplak, J.
    IV INTERNATIONAL CONFERENCE OF COMPUTATIONAL METHODS IN ENGINEERING SCIENCE (CMES'19), 2019, 710
  • [49] An Improved Risk Assessment Method for SCADA Information Security
    Markovic-Petrovic, J. D.
    Stojanovic, M. D.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2014, 20 (07) : 69 - 72
  • [50] Decision rule extraction method based on rough set theory and fuzzy set theory
    Wang, MC
    Wang, ZO
    Zhang, M
    Yan, P
    Proceedings of 2005 International Conference on Machine Learning and Cybernetics, Vols 1-9, 2005, : 2212 - 2216