共 11 条
[1]
Bass T(2001)Defense-in-depth revisited: qualitative risk analysis methodology for complex network-centric operations IEEE 1 64-70
[2]
Robichaux R(1991)Software risk management: principles and practices Software, IEEE 8 32-41
[3]
Boehm BW(1999)A State-of-the-art Environment for Research, Design, Evaluation, Prototyping, and Integration of Dual-Use Advanced Networking and Net-Centric Information Technologies IEEE 1 376-380
[4]
Driscoll D(1993)Risk associated with software development: a holistic framework for assessment and management Systems, Man and Cybernetics, IEEE Transactions on 23 710-723
[5]
Haimes YY(2000)Are we Forgetting the Risks of Information Technology? IEEE Journal: Computer 33 43-51
[6]
Chittister C(1995)The three dimensions of software risk: technical, organizational, and environmental System Sciences III 369-378
[7]
Longstaff TA(undefined)undefined undefined undefined undefined-undefined
[8]
Chittister C(undefined)undefined undefined undefined undefined-undefined
[9]
Pethia R(undefined)undefined undefined undefined undefined-undefined
[10]
Haimes YY(undefined)undefined undefined undefined undefined-undefined