Information security risk analysis model using information entropy

被引:0
|
作者
Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China [1 ]
不详 [2 ]
机构
来源
Beijing Youdian Daxue Xuebao | 2008年 / 2卷 / 50-53期
关键词
Security of data;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] Comprehensive analysis of the security risk of information system
    Song, Rushun
    [J]. Jisuanji Gongcheng/Computer Engineering, 2000, 26 (12): : 33 - 34
  • [22] Matlab Application for Information Security Risk Analysis
    Buldakova, T., I
    Mikov, D. A.
    [J]. INTERNATIONAL SCIENTIFIC AND PRACTICAL CONFERENCE MODELING IN EDUCATION 2019, 2019, 2195
  • [23] ISRAM: information security risk analysis method
    Karabacak, B
    Sogukpinar, I
    [J]. COMPUTERS & SECURITY, 2005, 24 (02) : 147 - 159
  • [24] Reliability analysis of risk model metrics based on business approach in information security
    Ibnugraha P.D.
    Nugroho L.E.
    Santosa P.I.
    [J]. Ingenierie des Systemes d'Information, 2020, 25 (04): : 475 - 480
  • [25] Threat Scenario Dependency-Based Model of Information Security Risk Analysis
    Rahmad, Basuki
    Supangkat, Suhono H.
    Sembiring, Jaka
    Surendro, Kridanto
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (08): : 93 - 102
  • [26] Improving the information security model by using TH
    Ahlfeldt, Rose-Mharie
    Spagnoletti, Paolo
    Sindre, Guttorm
    [J]. NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 73 - +
  • [27] A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis
    Feng, Nan
    Wang, Harry Jiannan
    Li, Minqiang
    [J]. INFORMATION SCIENCES, 2014, 256 : 57 - 73
  • [28] A situation awareness model for information security risk management
    Webb, Jeb
    Ahmad, Atif
    Maynard, Sean B.
    Shanks, Graeme
    [J]. COMPUTERS & SECURITY, 2014, 44 : 1 - 15
  • [29] General risk assessment model for information system security
    Chi, Yue
    Zhang, Yong-Zheng
    Yun, Xiao-Chun
    [J]. Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2005, 37 (SUPPL. 1): : 192 - 194
  • [30] Assessment Model and Method Research of Information Security Risk
    Lu Zhen
    Xiong Zhen
    Tu Keqin
    [J]. FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE IV, PTS 1-5, 2014, 496-500 : 2170 - +