共 49 条
[1]
NIST, SP 800-30, Guide for Conducting Risk Assessments, (2012)
[2]
ISO, 27001:2005, Information Technology - Security Techniques - Information Security Management Systems - Requirements, (2005)
[3]
ISO, 27005:2011, Information Technology-security Techniques-information Security Risk Management, (2011)
[4]
Saleh M.S., Alfantookh A., A new comprehensive framework for enterprise information security risk management, Applied Computing and Informatics, 9, 2, pp. 107-118, (2011)
[5]
Shameli-Sendi A., Aghababaei-Barzegar R., Cheriet M., Taxonomy of information security risk assessment (isra), Computers & Security, 57, pp. 14-30, (2016)
[6]
Shamala P., Ahmad R., Yusoff M., A conceptual framework of info structure for information security risk assessment (isra), Journal of Information Security and Applications, 18, 1, pp. 45-52, (2013)
[7]
Feng N., Li M., An information systems security risk assessment model under uncertain environment, Applied Soft Computing, 11, 7, pp. 4332-4340, (2011)
[8]
Lee Z.J., Chang L.Y., Apply fuzzy decision tree to information security risk assessment, International Journal of Fuzzy Systems, 16, 2, pp. 265-269, (2014)
[9]
Awad G.A., Sultan E.I., Ahmad N., Ithnan N., Beg A., Multi-objectives model to process security risk assessment based on ahp-pso, Modern Applied Science, 5, 3, (2011)
[10]
Eren-Dogu Z.F., Celikoglu C.C., Information security risk assessment: Bayesian prioritization for ahp group decision making, International Journal of Innovative Computing, Information and Control, 8, pp. 8001-8018, (2012)