共 50 条
- [1] Overview of Enterprise Information Needs in Information Security Risk Assessment [J]. PROCEEDINGS OF THE 2014 IEEE 18TH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE (EDOC 2014), 2014, : 42 - 51
- [2] A Formal Methodology for Procedural Security Assessment [J]. 5TH INTERNATIONAL CONFERENCE ON DIGITAL SOCIETY (ICDS 2011), 2011, : 146 - 151
- [3] Methodology of quantitative risk assessment for information system security [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 526 - 531
- [5] A two-phase quantitative methodology for enterprise information security risk analysis [J]. 1600, CRL Publishing (29):
- [6] A two-phase quantitative methodology for enterprise information security risk analysis [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2014, 29 (01): : 5 - 17
- [7] Towards a formal specification method for enterprise information system security [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2006, 4332 : 373 - +
- [8] The Security Risk Assessment Methodology [J]. INTERNATIONAL SYMPOSIUM ON SAFETY SCIENCE AND ENGINEERING IN CHINA, 2012, 2012, 43 : 600 - 609
- [10] Research on Operating Data Analysis for Enterprise Intranet Information Security Risk Assessment [J]. PROCEEDINGS OF 2018 12TH IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2018, : 72 - 76