Netinfo Security ›› 2015, Vol. 15 ›› Issue (11): 84-89.doi: 10.3969/j.issn.1671-1122.2015.11.014
Previous Articles Next Articles
ZHENG Lu-jun, WEI Ru-hao, WANG Dong, TIAN Jia-xi
Received:
2015-10-29
Online:
2015-11-25
Published:
2015-11-20
CLC Number:
ZHENG Lu-jun, WEI Ru-hao, WANG Dong, TIAN Jia-xi. Research on Evaluation Model and Its Verification of IT Emergency Response Capabilities of the People,s Bank of China Based on G1 and Entropy Method[J]. Netinfo Security, 2015, 15(11): 84-89.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2015.11.014
[1] | 祁明亮,池宏,许保光,等.突发公共事件应急管理[C]//2007-2008管理科学与工程学科发展报告.北京:中国科学技术出版社,2008:108-123. |
[2] | Federal Emergency Management Agency.State Capability Assessment for Readiness,a Report to United States Senate Committee on Appropriations [EB/OL].. |
[3] | 冯百侠,王绍玉.关于尽快开展城市灾害应急能力评价的思考[EB/OL].. |
[4] | Florrida Division of EmergencyManagement.EmergencyManagement Capability Assessment Checklist [EB/OL].. |
[5] | 吴新燕,顾建华.国内外城市灾害应急能力评价的研究进展[J].自然灾害学报,2007,16(6):109-114. |
[6] | Department of Transport & Regional Services.2002.Natural Disasters in Australia: Reforming mitigation, relief and recovery arrangements-A report to the Council of Australian Governments by a high level official's group.[EB/OL].. |
[7] | Public Safety Canada.An Emergency Management Framework for Canada [EB/OL]. . |
[8] | 莫靖龙,夏卫生,李景保,等.湖南长株潭城市群灾害应急管理能力评价[J].灾害学,2009,(3):137-140. |
[9] | 赵玲,唐敏康.城市灾害应急能力评价指标体系的研究[J].职业卫生与应急救援,2008,(1):31-33. |
[10] | 李玉亮,樊立华,李康,等.黑龙江省市县级疾病预防控制机构应急能力评价指标体系研究[J].医学与社会,201l,(7):33-35. |
[11] | 申锦玉,牛建军,陈敏,等.厦门医疗机构突发公共卫生事件应急能力现状调查[J].中国公共卫生管理,2011,(3):282-284. |
[12] | 清华大学公共管理学院危机管理课题组等.中国城市居民危机意识网络调查报告[J].中国公共安全(综合版),2006,(6):30-52. |
[13] | 徐华宇,徐敏,刘伟伟,等.北京公众灾害应急能力调查研究[J].城市与减灾,201l,(4):8-11. |
[14] | 黄俊会,石立春.政府公共危机应急能力评价体系的尝试性构建[J].成都大学学报(社会科学版),2011,(4):16-18. |
[15] | 林鸿潮.政府应急能力建设及其自我认知调查——“社会预警与应急管理建设”问卷分析报告[J].行政法学研究,2009,(1)42-52. |
[16] | Brown B.Delphi Process: A Methodology Used for the Elicitation of Opinions of Experts[J].The Rand Corporation, 1987, (9) : 3925. |
[17] | Saaty T L.Making and validating complex decisions with the AHP/ANP[J].Journal of Systems Science and Systems Engineering.2005,14(1):1-36. |
[18] | Negoita C V.Applications of Fuzzy Sets to Systems Analysis[J].Applied Economics Letters, 1997, 44(2): 497-501P. |
[19] | 郭亚军,潘德惠.一类决策问题的新算法[J].决策与决策支持系统,1992,(3):56-62. |
[20] | 黄维成. 优序图法在评比中的应用[J].技术经济,1997,(3):63-64. |
[21] | 李仲来. 确定因素权重的专家调查法[J].教育学报,1991,(2):35-38. |
[22] | 蔡良斌. 多目标规划法确定公路网的等级结构[J].公路,2002,(5):4-7. |
[23] | 上官廷华,冯荣耀,柳宏川.一种基于熵和均方差法综合赋权的K-means算法[J].计算机与现代化,2010,(4):34-36. |
[24] | 郭显光. 改进的熵值法及其在经济效益评价中的应用[J].系统工程理论与实践,1998,(12):98-102. |
[25] | 张鹏. 基于主成分分析的综合评价研究[D].南京:南京理工大学,2004. |
[26] | 刘健,何继军.基于不完全信息动态博弈的人民银行应急管理研究[J].金融理论与实践,2011,(6):56-60. |
[27] | 何继军. 基于AHP法的人民银行应急能力评估研究—以济南分行为例[J].金融发展研究,2011,(12):30-35. |
[28] | 王亚洲,方咏,王祥君.人民银行系统应急预案评估方法研究与应用[J].中国应急管理,2012,(7):37-41. |
[29] | 刘燕. 基于城域网的网络安全应急响应系统[J]. 信息网络安全,2015,(9):163-166. |
[1] | HUANG Wangwang, ZHOU Hua, WANG Daiqiang, ZHAO Qi. Design of Reconfigurable Key Security Authentication Protocol for IoT Based on National Cryptography SM9 [J]. Netinfo Security, 2024, 24(7): 1006-1014. |
[2] | ZHANG Xiaojun, ZHANG Nan, HAO Yunpu, WANG Zhouyang, XUE Jingting. Three-Factor Authentication and Key Agreement Protocol Based on Chaotic Map for Industrial Internet of Things Systems [J]. Netinfo Security, 2024, 24(7): 1015-1026. |
[3] | ZHANG Jiwei, WANG Wenjun, NIU Shaozhang, GUO Xiangkuo. Blockchain Scaling Solutions: ZK-Rollup Review [J]. Netinfo Security, 2024, 24(7): 1027-1037. |
[4] | ZHANG Liqiang, LU Mengjun, YAN Fei. A Cross-Contract Fuzzing Scheme Based on Function Dependencies [J]. Netinfo Security, 2024, 24(7): 1038-1049. |
[5] | DONG Yunyun, ZHU Yuling, YAO Shaowen. High-Quality Full-Size Image Steganography Method Based on Improved U-Net and Hybrid Attention Mechanism [J]. Netinfo Security, 2024, 24(7): 1050-1061. |
[6] | ZHOU Shucheng, LI Yang, LI Chuanrong, GUO Lulu, JIA Xinhong, YANG Xinghua. Context-Based Abnormal Root Cause Algorithm [J]. Netinfo Security, 2024, 24(7): 1062-1075. |
[7] | REN Changyu, ZHANG Ling, JI Hangyuan, YANG Liqun. Research on TTP Extraction Method Based on Pre-Trained Language Model and Chinese-English Threat Intelligence [J]. Netinfo Security, 2024, 24(7): 1076-1087. |
[8] | CAI Manchun, XI Rongkang, ZHU Yi, ZHAO Zhongbin. A Fingerprint Identification Method of Multi-Page and Multi-Tag Targeting Tor Website [J]. Netinfo Security, 2024, 24(7): 1088-1097. |
[9] | XIANG Hui, XUE Yunhao, HAO Lingxin. Large Language Model-Generated Text Detection Based on Linguistic Feature Ensemble Learning [J]. Netinfo Security, 2024, 24(7): 1098-1109. |
[10] | SHEN Xiuyu, JI Weifeng. Optimization of Cost of Edge-Cloud Collaborative Computing Offloading Considering Security [J]. Netinfo Security, 2024, 24(7): 1110-1121. |
[11] | ZHAO Xinqiang, FAN Bo, ZHANG Dongju. Research on APT Attack Defense System Based on Threat Discovery [J]. Netinfo Security, 2024, 24(7): 1122-1128. |
[12] | WEN Wen, LIU Qinju, KUANG Lin, REN Xuejing. Research and Scheme Design of Cyber Threat Intelligence Sharing under Privacy Protection System [J]. Netinfo Security, 2024, 24(7): 1129-1137. |
[13] | LIU Yidan, MA Yongliu, DU Yibin, CHENG Qingfeng. A Certificateless Anonymous Authentication Key Agreement Protocol for VANET [J]. Netinfo Security, 2024, 24(7): 983-992. |
[14] | LUO Ming, ZHAN Qibang, QIU Minrong. A Heterogeneous Cross-Domain Conditional Privacy Protection Ring Signcryption Scheme for V2I Communication [J]. Netinfo Security, 2024, 24(7): 993-1005. |
[15] | LI Zengpeng, WANG Siyang, WANG Mei. Research of Privacy-Preserving Proximity Test [J]. Netinfo Security, 2024, 24(6): 817-830. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||