共 12 条
[1]
Visintine V., An Introduction to Information Risk Assessment [J], SANS Institute Journal, 8, 5, pp. 101-118, (2003)
[2]
Chu C.K., Chu M., An integrated framework for the assessment of network operations, reliability, and security[J], Bell Labs Technical Journal, 8, 4, pp. 133-152, (2004)
[3]
Zhang Y.-Z., Fang B.-X., Chi Y., Yun X.-C., Research on Network Node Correlation in Network Risk Assessment[J], ChineseJournal of Computers, 30, 2, pp. 234-240, (2007)
[4]
Li W.M., Lei J., Dong J., Et al., An Optimized Method for Real Time Network Security Quantification[J], Chinese Journal of Computers, 32, 4, pp. 793-800, (2009)
[5]
Chen X.-Z., Zheng Q.-H., Guan X.-H., Quantitative Hierarchical Threat Evaluation Model for Network Security[J], Journal of Software, 17, 4, pp. 885-895, (2006)
[6]
Zhao D., Jianfeng M.A., Wang Y., Model of fuzzy risk assessment of the information system[J], Journal on Communications, 28, 4, pp. 51-56, (2007)
[7]
Li D., Liu C., Gan W., A New Cognitive Model: Cloud Model[J], International Journal of Intelligent Systems, 24, 4, pp. 357-375, (2009)
[8]
Mendel J.M., John R., Type-2 fuzzy sets made simple [J], IEEE Transactions On Fuzzy Systems, 10, 2, pp. 117-127, (2002)
[9]
Mendel J.M., On a 50% savings in the computation of of a symmetrical interval type-2 fuzzy set[J], Information Sciences, 172, 3, pp. 417-430, (2005)
[10]
Wu D., Mendel J.M., A Comparative Study of Ranking Methods, Similarity Measures and Uncertainty Measures for Interval Type-2 Fuzzy Sets, [J], Information Sciences, 179, 8, pp. 1169-1192, (2009)