共 50 条
- [1] Study on security risk evaluation model, process and tools of information system [J]. PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON E-RISK MANAGEMENT (ICERM 2008), 2008, : 47 - +
- [2] A Synthesized Risk Evaluation Model of Information Security [J]. 2009 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COMPUTATIONAL INTELLIGENCE, VOL I, PROCEEDINGS, 2009, : 305 - 308
- [3] Evaluation of the Risk and Security Overlay of ArchiMate to model Information System Security Risks [J]. PROCEEDINGS OF THE 2017 IEEE 21ST INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS AND DEMONSTRATIONS (EDOCW 2017), 2017, : 106 - 116
- [4] Information security: Process evaluation and product evaluation [J]. INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 11 - 18
- [5] A Model to Assess the Maturity Level of the Risk Management Process in Information Security [J]. 2009 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT - WORKSHOPS, 2009, : 61 - 70
- [6] A New Evaluation Model for Information Security Risk Management of SCADA Systems [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL CYBER PHYSICAL SYSTEMS (ICPS 2019), 2019, : 757 - 762
- [7] Evaluation Model for Computer Network Information Security Based on Analytic Hierarchy Process [J]. 2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 3, PROCEEDINGS, 2009, : 186 - 189
- [8] An Evaluation Model for Information Security of Android Application Based on Analytic Hierarchy Process [J]. 2016 WORLD AUTOMATION CONGRESS (WAC), 2016,
- [9] Information security risk assessment model for risk management [J]. TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 21 - 30
- [10] A novel security risk evaluation for information systems [J]. 2007 JAPAN-CHINA JOINT WORKSHOP ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, PROCEEDINGS, 2007, : 67 - +