共 7 条
[1]
Ge H., Gu L., Yang Y., Et al., An attack graph based network security evaluation model for hierarchical network, Yixian Yang. Proceedings 2010 IEEE International Conference on Information Theory and Information Security, pp. 208-211, (2010)
[2]
Li K., Gu N., Bi K., Et al., Network security evaluation algorithm based on access level vector, The 9th International Conerence for Young Computer Scientists, pp. 1538-1544, (2008)
[3]
Zhang L., Yao Y., Peng J., Et al., Intelligent information security risk assessment based on a decision tree algorithm, Journal of Tsing hua University: Science and Technology, 51, 10, pp. 1236-1239, (2011)
[4]
Niu H., Shang Y., Research on risk assessment model of information security based on Particle swarm algorithm-RBF neural network, Circuits, Communications and System (PACCS), pp. 479-482, (2010)
[5]
Qu Z., Application of comprehensive fuzzy evaluation in enterprise network security, Power Electronics and Intelligent Transportation System (PEITS), pp. 54-57, (2009)
[6]
Lu Z., Zhou B., Hierarchical risk assessment based on shapley entropies and choquet integrals, Journal of Beijing University of Posts and Telecommunications, 32, 6, pp. 83-87, (2009)
[7]
Zhao D., Ma J., Wang Y., Model of fuzzy risk assessment of the information system, Journal on Communications, 28, 4, pp. 51-64, (2007)