共 50 条
- [31] Application of Fuzzy Logic in the Process of Information Security Risk Assessment [J]. INNOVATION MANAGEMENT AND EDUCATION EXCELLENCE VISION 2020: FROM REGIONAL DEVELOPMENT SUSTAINABILITY TO GLOBAL ECONOMIC GROWTH, VOLS I - VI, 2016, : 1078 - 1088
- [32] Study on Assessment Method for Computer Network Security Based on Rough set [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INTELLIGENT SYSTEMS, PROCEEDINGS, VOL 3, 2009, : 617 - +
- [33] The Research of Information Security Risk Assessment Method Based on AHP [J]. SPORTS MATERIALS, MODELLING AND SIMULATION, 2011, 187 : 575 - 580
- [34] A Fuzzy Logic based Information Security Risk Assessment Method [J]. MECHANICAL AND ELECTRONICS ENGINEERING III, PTS 1-5, 2012, 130-134 : 3726 - 3730
- [36] Computer network security risk evaluation [J]. DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 2361 - 2365
- [37] A semantic network method for information system risk assessment [J]. Journal of Beijing Institute of Technology (English Edition), 2010, 19 (SUPPL. 1): : 26 - 30
- [38] A Network Security Risk Assessment Method based on Immunity Algorithm [J]. PROGRESS IN MEASUREMENT AND TESTING, PTS 1 AND 2, 2010, 108-111 : 948 - 953
- [39] Risk assessment of information security using fuzzy wavelet neural network [J]. Huazhong Ligong Daxue Xuebao, 2009, 11 (43-45+49):
- [40] Research on Ad Hoc Network Security Risk Assessment Method [J]. PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 2272 - 2279