共 50 条
- [41] Research on the University Network Information Security Risk Management Model Based on the Fuzzy Sets [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTOMATION, MECHANICAL CONTROL AND COMPUTATIONAL ENGINEERING, 2015, 124 : 89 - 93
- [42] Research on Network Security Risk Assessment Method Based on Bayesian Reasoning [J]. PROCEEDINGS OF 2019 IEEE 9TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC 2019), 2019, : 102 - 108
- [43] Research on the Lightning Risk Assessment Method for Chongqing Based on Fuzzy Mathematics [J]. 2014 INTERNATIONAL CONFERENCE ON LIGHTNING PROTECTION (ICLP), 2014, : 1054 - 1057
- [44] Application of fuzzy set theory to evaluate the rate of aggregative risk in information security [J]. 2013 INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEMS (ICRIIS), 2013, : 410 - 415
- [45] Network Information Security Risk Assessment Method Based on Machine Learning Algorithm [J]. ADVANCED HYBRID INFORMATION PROCESSING, ADHIP 2022, PT II, 2023, 469 : 403 - 416
- [46] An information Security Risk Assessment Method Based on Conduct Effect and Dynamic Threat [J]. PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017, : 782 - 786
- [47] Research on fuzzy group decision making in security risk assessment [J]. NETWORKING - ICN 2005, PT 2, 2005, 3421 : 1114 - 1121
- [49] Information security risk assessment using the AHP method [J]. IV INTERNATIONAL CONFERENCE OF COMPUTATIONAL METHODS IN ENGINEERING SCIENCE (CMES'19), 2019, 710
- [50] Decision rule extraction method based on rough set theory and fuzzy set theory [J]. Proceedings of 2005 International Conference on Machine Learning and Cybernetics, Vols 1-9, 2005, : 2212 - 2216