共 12 条
[1]
Turskis Z., Goranin N., Nurusheva A., Boranbayev S., Information security risk assessment in critical infrastructure: A hybrid MCDM approach, Informatica, 30, 1, pp. 187-211, (2019)
[2]
Jouini M., Rabai L.B.A., Aissa A.B., Classification of security threats in information systems, Procedia Computer Science, 32, pp. 489-496, (2014)
[3]
Breier J., Schindler F., Assets dependencies model in information security risk management, Information and Communication Technology-EurAsia Conference, pp. 405-412, (2014)
[4]
Soomro Z.A., Shah M.H., Ahmed J., Information security management needs more holistic approach: A literature review, International Journal of Information Management, 36, 2, pp. 215-225, (2016)
[5]
Belov V.M., Pestunov A.I., Pestunova T.M., On the issue of information security risks assessment of business processes, 2018 XIV International Scientific-Technical Conference on Actual Problems of Electronics Instrument Engineering (APEIE), pp. 136-139, (2018)
[6]
Leung H., An asset valuation approach using fuzzy logic, Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications 2015, 9498, (2015)
[7]
Beaudoin L., Eng P., Asset valuation technique for network management and security, Sixth IEEE International Conference on Data Mining-Workshops (ICDMW'06), pp. 718-721, (2006)
[8]
Kim A., Kang M.H., Determining asset criticality for cyber defense, (2011)
[9]
Loloei I., Shahriari H.R., Sadeghi A., A model for asset valuation in security risk analysis regarding assets' dependencies, 20th Iranian Conference on Electrical Engineering (ICEE2012), pp. 763-768, (2012)
[10]
Su C., Li Y., Mao W., Hu S., Information network risk assessment based on AHP and neural network, 2018 10th International Conference on Communication Software and Networks (ICCSN), pp. 227-231, (2018)