Information security risk assessment based on G-ANP

被引:0
|
作者
机构
[1] Zhao, Gang
[2] Wu, Tianshui
来源
Zhao, G. (zhaogang@bistu.edu.cn) | 1761年 / Tsinghua University卷 / 53期
关键词
Risk assessment;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] A Study of Information Security Evaluation and Risk Assessment
    Li, Jingyi
    Chao, Shiwei
    Huo, Minxia
    2015 FIFTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2015, : 1909 - 1912
  • [22] Risk assessment of human error in information security
    Cheng, Xiang-Yun
    Wang, Ying-Mei
    Xu, Zi-Ling
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 3573 - +
  • [23] On the role of the Facilitator in information security risk assessment
    Lizzie Coles-Kemp
    Richard E. Overill
    Journal in Computer Virology, 2007, 3 (2): : 143 - 148
  • [24] Risk Assessment of Enterprises Information Security Based on Fuzzy Set and Entropy Weight
    Wang, Yi
    Yuan, Jia-hang
    Zhang, Jian-ye
    Li, Cun-bin
    4TH INTERNATIONAL CONFERENCE ON ECONOMICS AND MANAGEMENT (ICEM), 2017, : 337 - 342
  • [25] A Markov-Based Model for Information Security Risk Assessment in Healthcare MANETs
    Saini Das
    Arunabha Mukhopadhyay
    Debashis Saha
    Samir Sadhukhan
    Information Systems Frontiers, 2019, 21 : 959 - 977
  • [26] Risk Assessment of Security Requirements of Banking Information Systems Based on Attack Patterns
    Rongrat, Krissada
    Senivongse, Twittie
    APPLIED COMPUTING & INFORMATION TECHNOLOGY, 2018, 727 : 117 - 133
  • [27] A Markov-Based Model for Information Security Risk Assessment in Healthcare MANETs
    Das, Saini
    Mukhopadhyay, Arunabha
    Saha, Debashis
    Sadhukhan, Samir
    INFORMATION SYSTEMS FRONTIERS, 2019, 21 (05) : 959 - 977
  • [28] An Expert System for Risk Assessment of Information System Security Based on ISO 27002
    Sihwi, Sari Widya
    Andriyanto, Ferry
    Anggrainingsih, Rini
    2016 IEEE INTERNATIONAL CONFERENCE ON KNOWLEDGE ENGINEERING AND APPLICATIONS (ICKEA 2016), 2016, : 56 - 61
  • [29] Method of Information Security Risk Assessment Based on Improved Fuzzy Theory of Evidence
    Huang Xuepeng
    Xu Wei
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (03) : 188 - 196
  • [30] Information Security Risk Assessment Technology of Cyberspace: a Review
    Li Qianmu
    Zhang Hong
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (11A): : 4677 - 4683