Information security risk assessment based on G-ANP

被引:0
|
作者
机构
[1] Zhao, Gang
[2] Wu, Tianshui
来源
Zhao, G. (zhaogang@bistu.edu.cn) | 1761年 / Tsinghua University卷 / 53期
关键词
Risk assessment;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Security Risk Assessment of Information Systems in an Indeterminate Environment
    Basumatary, Basundhara
    Kumar, Chandan
    Yadav, Dilip Kumar
    2021 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (CONFLUENCE 2021), 2021, : 82 - 87
  • [32] Network & Information System Security Risk Assessment Technology
    Yao Ye
    Cai Wandong
    Fang Nan
    2016 13TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2016, : 397 - 401
  • [33] INFORMATION SECURITY RISK ASSESSMENT - THE DEVELOPMENT OF THE STANDARD APPROACHES
    Wawrzyniak, Dariusz
    5TH INTERNATIONAL SCIENTIFIC CONFERENCE BUSINESS AND MANAGEMENT' 2008, 2008, : 495 - 500
  • [34] Assessment Model and Method Research of Information Security Risk
    Lu Zhen
    Xiong Zhen
    Tu Keqin
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE IV, PTS 1-5, 2014, 496-500 : 2170 - +
  • [35] A new quantitative approach for information security risk assessment
    Asosheh, Abbas
    Dehmoubed, Bijan
    Khani, Amir
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2009, : 222 - +
  • [36] Towards a Risk Assessment Matrix for Information Security Workarounds
    Slabbert, Eugene
    Thomson, Kerry-Lynn
    Futcher, Lynn
    HUMAN ASPECTS OF INFORMATION SECURITY AND ASSURANCE, HAISA 2021, 2021, 613 : 164 - 178
  • [37] An Improved Risk Assessment Method for SCADA Information Security
    Markovic-Petrovic, J. D.
    Stojanovic, M. D.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2014, 20 (07) : 69 - 72
  • [38] Dynamic Interpretation Approaches for Information Security Risk Assessment
    Alhajri, Reem M.
    Alsunaidi, Shikah J.
    Zagrouba, Rachid
    Almuhaideb, Abdullah M.
    Alqahtani, Mohammed A.
    2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, : 453 - 458
  • [39] A Novel Security Risk Assessment Model for Information System
    Lv, Huiying
    2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 4, 2010, : 282 - 287
  • [40] Information asset valuation method for information technology security risk assessment
    Foroughi, Farhad
    WORLD CONGRESS ON ENGINEERING 2008, VOLS I-II, 2008, : 576 - 581