共 50 条
- [2] Risk Evaluation Process Model of Information Security [J]. 2009 INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION, VOL II, 2009, : 321 - 324
- [3] Evaluation of the national information security policy by analytic hierarchy process [J]. PERSPECTIVAS EM CIENCIA DA INFORMACAO, 2022, 27 (04): : 108 - 145
- [4] Process Capability Evaluation of Product Development Based on Information Entropy [J]. 2018 5TH INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND THEIR APPLICATIONS (DSA), 2018, : 91 - 95
- [5] Evaluation Process Management Software for Security Evaluation [J]. 2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 1628 - 1631
- [6] A FRAMEWORK FOR INFORMATION SECURITY EVALUATION [J]. INFORMATION & MANAGEMENT, 1994, 26 (03) : 143 - 153
- [7] Security evaluation for information assurance [J]. ICCSA 2007: PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND APPLICATIONS, 2007, : 227 - +
- [8] Development of Information System for Product Redesign: Evaluation of Assembly Process and Characteristics of Product Functions [J]. INDUSTRIAL ENGINEERING AND MANAGEMENT SYSTEMS, 2010, 9 (03): : 215 - 226
- [9] Study on security risk evaluation model, process and tools of information system [J]. PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON E-RISK MANAGEMENT (ICERM 2008), 2008, : 47 - +
- [10] Evaluation Model for Computer Network Information Security Based on Analytic Hierarchy Process [J]. 2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 3, PROCEEDINGS, 2009, : 186 - 189