A semantic network method for information system risk assessment

被引:0
|
作者
Liu, Yi-Li [1 ]
Wu, Bing [1 ]
机构
[1] Department of Management Science and Engineering, School of Economics and Management, Tongji University, Shanghai 200092, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
13
引用
收藏
页码:26 / 30
相关论文
共 50 条
  • [41] An Improved Risk Assessment Method for SCADA Information Security
    Markovic-Petrovic, J. D.
    Stojanovic, M. D.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2014, 20 (07) : 69 - 72
  • [42] Augmenting a characterization network with semantic information
    Berger, FC
    VanBommel, P
    INFORMATION PROCESSING & MANAGEMENT, 1997, 33 (04) : 453 - 479
  • [43] Assessment Model and Method Research of Information Security Risk
    Lu Zhen
    Xiong Zhen
    Tu Keqin
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE IV, PTS 1-5, 2014, 496-500 : 2170 - +
  • [44] Risk Assessment Method of Information Security Based on AHP
    Ning, Xu
    PROCEEDINGS OF 2010 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS I AND II, 2010, : 430 - 433
  • [45] Flood Risk Assessment Based on the Information Diffusion Method
    Qiong, Li
    ADVANCES IN COMPUTER SCIENCE, ENVIRONMENT, ECOINFORMATICS, AND EDUCATION, PT I, 2011, 214 : 111 - 117
  • [46] Semantic information and the network theory of account
    Luciano Floridi
    Synthese, 2012, 184 : 431 - 454
  • [47] Augmenting a characterization network with semantic information
    Berger, F.C.
    Van Bommel, P.
    Information Processing and Management, 1997, 33 (04): : 453 - 479
  • [48] Semantic information and the network theory of account
    Floridi, Luciano
    SYNTHESE, 2012, 184 (03) : 431 - 454
  • [49] Construction of information network vulnerability threat assessment model for CPS risk assessment
    Xiong, Juxia
    Wu, Jinzhao
    COMPUTER COMMUNICATIONS, 2020, 155 : 197 - 204
  • [50] Semantic Risk Assessment for Cybersecurity
    Aviad, Adiel
    Wecel, Krzysztof
    Abramowicz, Witold
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018), 2018, : 513 - 520