A risk assessment standard and application method of computer network information security

被引:0
|
作者
Sun, T. [1 ]
机构
[1] Anhui Vocat Coll Elect & Informat Technol, Sch Software Technol, Bengbu, Peoples R China
关键词
D O I
暂无
中图分类号
R9 [药学];
学科分类号
1007 ;
摘要
148
引用
收藏
页码:91 / 91
页数:1
相关论文
共 50 条
  • [21] An Improved Risk Assessment Method for SCADA Information Security
    Markovic-Petrovic, J. D.
    Stojanovic, M. D.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2014, 20 (07) : 69 - 72
  • [22] Risk Assessment Method of Information Security Based on AHP
    Ning, Xu
    PROCEEDINGS OF 2010 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS I AND II, 2010, : 430 - 433
  • [23] The Application and Practice of Computer Network Security Technology in Electronic Information Engineering
    Guilin University of Electronic Science and Technology, Guangxi, Guilin
    541000, China
    ACM Int. Conf. Proc. Ser., 1600, (73-77):
  • [24] Analysis on Computer Application of under the Management of Network Information Security Technology
    Xue, Chu
    2019 4TH INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2019), 2019, : 187 - 190
  • [25] Information asset valuation method for information technology security risk assessment
    Foroughi, Farhad
    WORLD CONGRESS ON ENGINEERING 2008, VOLS I-II, 2008, : 576 - 581
  • [26] Risk Assessment Approach of In-Vehicle Network Information Security
    Wanh, Jian
    Zhang, Shaowei
    Chen, Hengwei
    Wang, Pengcheng
    CICTP 2022: INTELLIGENT, GREEN, AND CONNECTED TRANSPORTATION, 2022, : 1957 - 1968
  • [27] Strategic Approaches in Network Communication and Information Security Risk Assessment
    Alsafwani, Nadher
    Fazea, Yousef
    Alnajjar, Fuad
    INFORMATION, 2024, 15 (06)
  • [28] Security Vulnerability Analysis Assessment Method of Power Information Network
    Zhao, Yong-bin
    Zhang, Tao
    Zhang, Bo
    Hou, Jun
    COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 372 - 380
  • [29] Research on the application of neural networks to the security and risk assessment of information
    Lai, Kai
    Wang, Yan
    International Journal of Digital Content Technology and its Applications, 2012, 6 (09) : 132 - 140
  • [30] Application of Fuzzy Logic in the Process of Information Security Risk Assessment
    Kokles, Mojmir
    Filanova, Jana
    Korcek, Frantisek
    INNOVATION MANAGEMENT AND EDUCATION EXCELLENCE VISION 2020: FROM REGIONAL DEVELOPMENT SUSTAINABILITY TO GLOBAL ECONOMIC GROWTH, VOLS I - VI, 2016, : 1078 - 1088