共 50 条
- [1] Risk Evaluation Process Model of Information Security [J]. 2009 INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION, VOL II, 2009, : 321 - 324
- [2] Evaluation of the Risk and Security Overlay of ArchiMate to model Information System Security Risks [J]. PROCEEDINGS OF THE 2017 IEEE 21ST INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS AND DEMONSTRATIONS (EDOCW 2017), 2017, : 106 - 116
- [3] A Synthesized Risk Evaluation Model of Information Security [J]. 2009 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COMPUTATIONAL INTELLIGENCE, VOL I, PROCEEDINGS, 2009, : 305 - 308
- [4] A Study of Information Security Evaluation and Risk Assessment [J]. 2015 FIFTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2015, : 1909 - 1912
- [5] An Information System Security Risk Assessment Model Based on Fuzzy Analytic Hierarchy Process [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 874 - 877
- [6] Collaborative Information System Monitoring and Evaluation Tools Model [J]. 2020 6TH INTERNATIONAL CONFERENCE ON SCIENCE IN INFORMATION TECHNOLOGY (ICSITECH): EMBRACING INDUSTRY 4.0: TOWARDS INNOVATION IN DISASTER MANAGEMENT, 2020, : 159 - 164
- [7] General risk assessment model for information system security [J]. Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2005, 37 (SUPPL. 1): : 192 - 194
- [8] A Novel Security Risk Assessment Model for Information System [J]. 2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 4, 2010, : 282 - 287
- [9] A Practical Security Risk Analysis Process and Tool for Information System [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2006, 2 (02): : 95 - 100
- [10] An Application Security Model Based on Business Process in Information System [J]. 2017 12TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND KNOWLEDGE ENGINEERING (IEEE ISKE), 2017,