共 50 条
- [1] A Fuzzy Logic based Information Security Risk Assessment Method [J]. MECHANICAL AND ELECTRONICS ENGINEERING III, PTS 1-5, 2012, 130-134 : 3726 - 3730
- [3] Information security risk assessment using the AHP method [J]. IV INTERNATIONAL CONFERENCE OF COMPUTATIONAL METHODS IN ENGINEERING SCIENCE (CMES'19), 2019, 710
- [4] Risk assessment of information security using fuzzy wavelet neural network [J]. Huazhong Ligong Daxue Xuebao, 2009, 11 (43-45+49):
- [5] Using fuzzy logic and entropy theory to risk assessment of the information security [J]. Proceedings of 2005 International Conference on Machine Learning and Cybernetics, Vols 1-9, 2005, : 2448 - 2453
- [7] Research on Information Security Risk Assessment Method Based on Fuzzy Rule Set [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
- [9] Fuzzy risk assessment of information security threat scenario [J]. Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2013, 36 (06): : 89 - 92
- [10] Information Security Risk Assessment: A Method Comparison [J]. COMPUTER, 2017, 50 (04) : 52 - 61