共 50 条
- [1] Application of Fuzzy Logic in the Process of Information Security Risk Assessment [J]. INNOVATION MANAGEMENT AND EDUCATION EXCELLENCE VISION 2020: FROM REGIONAL DEVELOPMENT SUSTAINABILITY TO GLOBAL ECONOMIC GROWTH, VOLS I - VI, 2016, : 1078 - 1088
- [2] A Fuzzy Logic based Information Security Risk Assessment Method [J]. MECHANICAL AND ELECTRONICS ENGINEERING III, PTS 1-5, 2012, 130-134 : 3726 - 3730
- [3] Using fuzzy logic and entropy theory to risk assessment of the information security [J]. Proceedings of 2005 International Conference on Machine Learning and Cybernetics, Vols 1-9, 2005, : 2448 - 2453
- [4] Security Risk Assessment in Internet of Things Systems [J]. IT PROFESSIONAL, 2017, 19 (05) : 20 - 26
- [5] The application of fuzzy-based Internet of Things in household security [J]. SPORTS MATERIALS, MODELLING AND SIMULATION, 2011, 187 : 735 - 740
- [6] Countermeasure security risks management in the Internet of Things based on fuzzy logic inference [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 654 - 659
- [7] A lightweight hierarchical method for improving security in the internet of things using fuzzy logic [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (06):
- [8] Protocol Security in the Industrial Internet of Things [J]. PROCEEDINGS OF 2024 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, NOMS 2024, 2024,
- [9] HiRAM: A hierarchical risk assessment model and its implementation for an industrial Internet of Things in the cloud [J]. SOFTWARE TESTING VERIFICATION & RELIABILITY, 2023, 33 (05):