共 50 条
- [2] Application of Fuzzy Logic in the Process of Information Security Risk Assessment [J]. INNOVATION MANAGEMENT AND EDUCATION EXCELLENCE VISION 2020: FROM REGIONAL DEVELOPMENT SUSTAINABILITY TO GLOBAL ECONOMIC GROWTH, VOLS I - VI, 2016, : 1078 - 1088
- [3] Risk assessment method based on fuzzy logic [J]. Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2015, 37 (08): : 1825 - 1831
- [4] Using fuzzy logic and entropy theory to risk assessment of the information security [J]. Proceedings of 2005 International Conference on Machine Learning and Cybernetics, Vols 1-9, 2005, : 2448 - 2453
- [6] Research on Information Security Risk Assessment Method Based on Fuzzy Rule Set [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
- [8] A Fuzzy Logic-based Information Security Control Assessment for Organizations [J]. 2012 IEEE CONFERENCE ON OPEN SYSTEMS (ICOS 2012), 2012, : 190 - 195
- [9] Risk Assessment for Information Security Based on Fuzzy Membership Matrix [J]. NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 547 - +
- [10] The Information Security Risk Assessment Based on Fuzzy Comprehensive Evaluation [J]. PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS A-C, 2008, : 2027 - 2031