General risk assessment model for information system security

被引:0
|
作者
Chi, Yue [1 ]
Zhang, Yong-Zheng [1 ]
Yun, Xiao-Chun [1 ]
机构
[1] School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, China
关键词
Computer network security - General model - General risk assessment model (GRAM) - Host information systems - Malicious attacks - Security assessment;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:192 / 194
相关论文
共 50 条
  • [31] Information Security Risk Assessment in SCM
    Roy, Arup
    Gupta, A. D.
    Deshmukh, S. G.
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM 2013), 2013, : 1002 - 1006
  • [32] Automation of Information Security Risk Assessment
    Akhmetov, Berik
    Lakhno, Valerii
    Chubaievskyi, Vitalyi
    Kaminskyi, Serhii
    Adilzhanova, Saltanat
    Ydyryshbayeva, Moldir
    [J]. INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2022, 68 (03) : 549 - +
  • [33] Grey Evaluation Method on Security Risk Assessment of Power Information System
    Liu, Ren
    Niu, Dongxiao
    [J]. APPLIED MECHANICS AND MECHANICAL ENGINEERING, PTS 1-3, 2010, 29-32 : 2157 - 2163
  • [34] Risk assessment of complex information system security based on threat propagation
    [J]. Shi, Z. (shizz@ics.ict.ac.cn), 1600, Tsinghua University (54):
  • [35] Study on Architecture-Oriented Information Security Risk Assessment Model
    Ma, Wei-Ming
    [J]. COMPUTATIONAL COLLECTIVE INTELLIGENCE: TECHNOLOGIES AND APPLICATIONS, PT III, 2010, 6423 : 218 - 226
  • [36] An information systems security risk assessment model under uncertain environment
    Feng, Nan
    Li, Minqiang
    [J]. APPLIED SOFT COMPUTING, 2011, 11 (07) : 4332 - 4340
  • [37] Study on risk assessment of information security based on cloud computing model
    Wu, Guo-Hua
    Liu, Yu-Cheng
    Qi, Kai-Kai
    Wang, Peng
    Xu, Jian-Da
    [J]. Proceedings of the 2016 International Conference on Engineering and Advanced Technology, 2016, 82 : 91 - 95
  • [38] The model of information security risk assessment based on advanced evidence theory
    Qing H.
    Qingsheng X.
    Shaobo L.
    [J]. International Journal of System Assurance Engineering and Management, 2017, 8 (Suppl 3) : 2030 - 2035
  • [39] Risk assessment of Information Security Management System inGovernment Organizations in Iran
    Fayez, Samane
    Nazeri, HodaHosseinZade
    BagherKiaroodi, Mohammad
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER, NETWORKS AND COMMUNICATION ENGINEERING (ICCNCE 2013), 2013, 30 : 77 - 79
  • [40] Research on the Quantitative Methods of Classified Information System Security Risk Assessment
    Zhang, Kang
    Shao, Liping
    [J]. LISS 2014, 2015, : 571 - 575