共 12 条
- [1] Visintine V., An Introduction to Information Risk Assessment [J], SANS Institute Journal, 8, 5, pp. 101-118, (2003)
- [2] Chu C.K., Chu M., An integrated framework for the assessment of network operations, reliability, and security[J], Bell Labs Technical Journal, 8, 4, pp. 133-152, (2004)
- [3] Zhang Y.-Z., Fang B.-X., Chi Y., Yun X.-C., Research on Network Node Correlation in Network Risk Assessment[J], ChineseJournal of Computers, 30, 2, pp. 234-240, (2007)
- [4] Li W.M., Lei J., Dong J., Et al., An Optimized Method for Real Time Network Security Quantification[J], Chinese Journal of Computers, 32, 4, pp. 793-800, (2009)
- [5] Chen X.-Z., Zheng Q.-H., Guan X.-H., Quantitative Hierarchical Threat Evaluation Model for Network Security[J], Journal of Software, 17, 4, pp. 885-895, (2006)
- [6] Zhao D., Jianfeng M.A., Wang Y., Model of fuzzy risk assessment of the information system[J], Journal on Communications, 28, 4, pp. 51-56, (2007)
- [7] Li D., Liu C., Gan W., A New Cognitive Model: Cloud Model[J], International Journal of Intelligent Systems, 24, 4, pp. 357-375, (2009)
- [8] Mendel J.M., John R., Type-2 fuzzy sets made simple [J], IEEE Transactions On Fuzzy Systems, 10, 2, pp. 117-127, (2002)
- [9] Mendel J.M., On a 50% savings in the computation of of a symmetrical interval type-2 fuzzy set[J], Information Sciences, 172, 3, pp. 417-430, (2005)
- [10] Wu D., Mendel J.M., A Comparative Study of Ranking Methods, Similarity Measures and Uncertainty Measures for Interval Type-2 Fuzzy Sets, [J], Information Sciences, 179, 8, pp. 1169-1192, (2009)