Information security risk analysis model using information entropy

被引:0
|
作者
Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China [1 ]
不详 [2 ]
机构
来源
Beijing Youdian Daxue Xuebao | 2008年 / 2卷 / 50-53期
关键词
Security of data;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] Information security risk assessment using the AHP method
    Zaburko, J.
    Szulzyk-Cieplak, J.
    [J]. IV INTERNATIONAL CONFERENCE OF COMPUTATIONAL METHODS IN ENGINEERING SCIENCE (CMES'19), 2019, 710
  • [42] Assessing Information Security Risk Using Markov Chain
    Tse, Daniel
    Pan, Xiaoting
    Zong, Yuan
    Liu, Jiaxi
    Yang, Qinyan
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEE IEEM), 2018, : 808 - 813
  • [43] Method of Determine Index Weight in Security Risk Evaluation Based on Information Entropy
    Xiong Jin-shi
    Li Jian-hua
    Yang Ying-hui
    [J]. 2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 43 - 48
  • [44] Risk Assessment of Enterprises Information Security Based on Fuzzy Set and Entropy Weight
    Wang, Yi
    Yuan, Jia-hang
    Zhang, Jian-ye
    Li, Cun-bin
    [J]. 4TH INTERNATIONAL CONFERENCE ON ECONOMICS AND MANAGEMENT (ICEM), 2017, : 337 - 342
  • [45] Information Security Risk Modeling Using Bayesian Index
    Chan, Chien-Lung
    [J]. COMPUTER JOURNAL, 2011, 54 (04): : 628 - 638
  • [46] A Business Aware Information Security Risk Analysis Method
    Sadok, M.
    Spagnoletti, P.
    [J]. INFORMATION TECHNOLOGY AND INNOVATION TRENDS IN ORGANIZATIONS, 2011, : 453 - 460
  • [47] Power System Risk Security Assessment Based on Maximum Information Entropy Principle
    Zeng, Ke
    Li, Hua-qiang
    Zeng, Meng-jie
    Liu, Pei-qing
    [J]. 2014 INTERNATIONAL CONFERENCE ON POWER SYSTEM TECHNOLOGY (POWERCON), 2014,
  • [48] Fuzzy tool for conducting information security risk analysis
    Bartos, Jiri
    Walek, Bogdan
    Klimes, Cyril
    Farana, Radim
    [J]. 2014 15TH INTERNATIONAL CARPATHIAN CONTROL CONFERENCE (ICCC), 2014, : 28 - 33
  • [49] Social Interaction Propensity Model using Information Entropy
    Park, Jaehui
    Park, Yunkyung
    [J]. 2013 IEEE THIRD INTERNATIONAL CONFERENCE ON CLOUD AND GREEN COMPUTING (CGC 2013), 2013, : 283 - 288
  • [50] A framework and tool for the assessment of information security risk, the reduction of information security cost and the sustainability of information security culture
    Govender S.G.
    Kritzinger E.
    Loock M.
    [J]. Personal and Ubiquitous Computing, 2021, 25 (05) : 927 - 940