共 50 条
- [21] A new fuzzy risk assessment method for the network security based on fuzzy similarity measure [J]. WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 8486 - +
- [22] Information Security Risk Assessment Based On Analytic Hierarchy Process and Fuzzy Comprehensive [J]. 2008 INTERNATIONAL CONFERENCE ON RISK MANAGEMENT AND ENGINEERING MANAGEMENT, ICRMEM 2008, PROCEEDINGS, 2008, : 404 - 409
- [23] An information security risk assessment method for cloud systems based on risk contagion [J]. PROCEEDINGS OF 2020 IEEE 5TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2020), 2020, : 83 - 87
- [25] Research on the Calculation Method of Information Security Risk Assessment Considering Human Reliability [J]. PROCEEDINGS OF 2014 10TH INTERNATIONAL CONFERENCE ON RELIABILITY, MAINTAINABILITY AND SAFETY (ICRMS), VOLS I AND II, 2014, : 457 - 462
- [26] Research on Risk Assessment of Information System Based on Fuzzy Neural Network [J]. PROCEEDINGS OF THE INTERNATIONAL ACADEMIC CONFERENCE ON FRONTIERS IN SOCIAL SCIENCES AND MANAGEMENT INNOVATION (IAFSM 2018), 2018, 62 : 50 - 55
- [27] Information Security Risk Assessment: A Method Comparison [J]. COMPUTER, 2017, 50 (04) : 52 - 61
- [28] A Method of Risk Assessment of Information Security Based on Artificial Neural Network [J]. ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 1, 2008, : 246 - 252
- [29] Gray Relational Analysis based Method for Information Security Risk Assessment [J]. PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 1086 - 1089
- [30] A Method for Information Security Risk Assessment Based on the Dynamic Bayesian Network [J]. PROCEEDINGS 2016 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS NANA 2016, 2016, : 279 - 283