A risk assessment standard and application method of computer network information security

被引:0
|
作者
Sun, T. [1 ]
机构
[1] Anhui Vocat Coll Elect & Informat Technol, Sch Software Technol, Bengbu, Peoples R China
关键词
D O I
暂无
中图分类号
R9 [药学];
学科分类号
1007 ;
摘要
148
引用
收藏
页码:91 / 91
页数:1
相关论文
共 50 条
  • [31] The Application of Cloud Matter - element in Information Security Risk Assessment
    Dai Zong-you
    Zhang Wen-long
    Shen Yan-an
    Wang Hai-tao
    2017 3RD INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2017), 2017, : 218 - 222
  • [32] Study on Assessment Method for Computer Network Security Based on Rough set
    Kong, Lisha
    Ren, Xiaofei
    Fan, Yongjian
    2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INTELLIGENT SYSTEMS, PROCEEDINGS, VOL 3, 2009, : 617 - +
  • [33] The Research of Information Security Risk Assessment Method Based on AHP
    Xu, Ning
    Zhao, DongMei
    SPORTS MATERIALS, MODELLING AND SIMULATION, 2011, 187 : 575 - 580
  • [34] A Fuzzy Logic based Information Security Risk Assessment Method
    Yang, Yaling
    Zhou, Yanhui
    MECHANICAL AND ELECTRONICS ENGINEERING III, PTS 1-5, 2012, 130-134 : 3726 - 3730
  • [35] Analysis of application strategies of computer information management technology in maintaining network security
    Zheng, Zhou
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 125 : 225 - 225
  • [36] Computer network security risk evaluation
    Li, T.
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 2361 - 2365
  • [37] A semantic network method for information system risk assessment
    Liu, Yi-Li
    Wu, Bing
    Journal of Beijing Institute of Technology (English Edition), 2010, 19 (SUPPL. 1): : 26 - 30
  • [38] A Network Security Risk Assessment Method based on Immunity Algorithm
    Yuan Hao
    PROGRESS IN MEASUREMENT AND TESTING, PTS 1 AND 2, 2010, 108-111 : 948 - 953
  • [39] Research on Ad Hoc Network Security Risk Assessment Method
    Lei, Xiaolong
    Ma, Tao
    Niu, Zhao
    Ma, Chunlai
    Shan, Hong
    PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 2272 - 2279
  • [40] Risk assessment of information security using fuzzy wavelet neural network
    School of Information Technology, Hebei Normal University, Shijiazhuang 050016, China
    不详
    不详
    Huazhong Ligong Daxue Xuebao, 2009, 11 (43-45+49):