[1] |
WEN Weiping, GUO Ronghua, MENG Zheng, et al.Research and Implementation on Information Security Risk Assessment Key Technology[J]. Netinfo Security, 2015, 15(2): 7-14.
|
|
文伟平,郭荣华,孟正,等.信息安全风险评估关键技术研究与实现[J].信息网络安全,2015,15(2):7-14.
|
[2] |
TENG Xilong, QU Haipeng.Research on Information Security Risk Assessment Method Based on Similarity of Interval-valued Intuitionistic Fuzzy Sets[J]. Netinfo Security, 2015,15(5): 62-68.
|
|
滕希龙,曲海鹏.基于区间值直觉模糊集相似性的信息安全风险评估方法研究[J].信息网络安全,2015,15(5):62-68.
|
[3] |
GB/T 20984-2007 20984-2007. Information Security Technology-Risk Assessment Specification for Information Security[S]. Beijing: China Standard Press, 2007.
|
|
GB/T 20984-2007 20984-2007.信息安全技术信息安全风险评估规范[S].北京:中国标准出版社,2007.
|
[4] |
ZHOU Chao, PAN Ping, HUANG Liang.Risk Assessment of Information Security Based on Quantum Gate Circuit Neural Networks[J]. Computer Engineering, 2018, 44(12): 45-51.
|
|
周超,潘平,黄亮.基于量子门线路神经网络的信息安全风险评估[J].计算机工程,2018,44(12):45-51.
|
[5] |
WANG Haoran, YAN Binyuan.Information Security Risk Assessment Method Based on Wavelet Neural Network Algorithm[J]. Information Technology, 2018, 42(12): 101-104.
|
|
王皓然,严彬元.依赖小波神经网络算法的信息安全风险评估方法[J].信息技术,2018,42(12):101-104.
|
[6] |
LIU Guocheng, WANG Huijin.Evaluation Research on and Empirical Analysis of Risks in Information System Audit Based on AHP and Entropy Weight[J]. Audit Research, 2016(1): 53-59.
|
|
刘国城,王会金.基于AHP和熵权的信息系统审计风险评估研究与实证分析[J].审计研究,2016(1):53-59.
|
[7] |
LIU Jian, ZHAO Gang, ZHENG Yunpeng.Information Security Risk Situation Analysis Model Based on AHP-Bayesian Network[J]. Journal of Beijing University of Information Science and Technology: Natural Science, 2015(3): 68-74.
|
|
刘健,赵刚,郑运鹏.基于AHP-贝叶斯网络的信息安全风险态势分析模型[J].北京信息科技大学学报:自然科学版,2015(3):68-74.
|
[8] |
DONG Xiaoning, ZHAO Huarong, LI Dianwei, et al.Research on Information Systems Security Risk Assessment Based on Fuzzy Theory of Evidence[J]. Netinfo Security, 2017, 17(5): 69-73
|
|
董晓宁,赵华容,李殿伟,等.基于模糊证据理论的信息系统安全风险评估研究[J].信息网络安全,2017,17(5):69-73.
|
[9] |
WANG Jiao, FAN Kefeng, MO Wei.Method for Information Security Risk Assessment Based on Fuzzy Set Theory and DS Evidence Theory[J]. Journal of Computer Applications, 2017(11): 234-241.
|
|
王姣,范科峰,莫玮.基于模糊集和DS证据理论的信息安全风险评估方法[J].计算机应用研究,2017(11):237-241.
|
[10] |
SHAFER G A.Mathematical Theory of Evidence[M]. Princeton: Princeton University Press, 1967.
|
[11] |
FIRTH S.Combination of Evidence in Dempster-Shafer Theory[J]. Contemporary Pacific, 2002, 11(2): 416-426.
|
[12] |
WU Jianhua, WANG Zheng.A Zero-watermark Algorithm Based on Matrix Norm[J]. Microprocessor, 2009, 30(5): 75-77.
|
|
吴建华,王铮.一种基于矩阵范数的零水印算法[J].微处理机,2009,30(5):75-77.
|