共 50 条
- [2] The Information Security Risk Management [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE QUALITY MANAGEMENT,TRANSPORT AND INFORMATION SECURITY, INFORMATION TECHNOLOGIES (IT&QM&IS), 2017, : 106 - 109
- [3] Information security and risk management [J]. COMMUNICATIONS OF THE ACM, 2008, 51 (04) : 64 - 68
- [4] Statistics Based Information Security Risk Management Methodology [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (10): : 117 - 123
- [5] Enterprise Risk Management and Information Systems Security Risk [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON RISK MANAGEMENT & GLOBAL E-BUSINESS, VOLS I AND II, 2009, : 1 - 5
- [6] Information security risk assessment model for risk management [J]. TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 21 - 30
- [7] Risk assessment of complex information system security based on threat propagation [J]. Shi, Z. (shizz@ics.ict.ac.cn), 1600, Tsinghua University (54):
- [8] Overview of Information Security Management-Based on Enterprise Risk Management [J]. INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 384 - 387
- [9] Security through Information Risk Management [J]. IEEE SECURITY & PRIVACY, 2009, 7 (03) : 45 - 52
- [10] A Research on Information Value in Energy Internet Based on Risk Theory [J]. 2017 IEEE CONFERENCE ON ENERGY INTERNET AND ENERGY SYSTEM INTEGRATION (EI2), 2017,