Alberts C, Dorofree A. OCTAVE method implementation guide. Carnegie Mellon: Carnegie Mellon Software Engineering Instititute, 2001. http://www.cert.org/octave/octavemethod.html.
[2]
Alberts C, Dorofee A. Managing information security risks: the OCTAVE approach[M]. Boston: Addison-Wesley, 2003.
[3]
中华人民共和国. GB/T 17859—1999, 计算机信息系统安全保护等级划分准则[S]. 1999: 1-5. PRC. GB/T 17859—1999, Classified criteria for security protection of computer information system[S]. 1999: 1-5.
[4]
Schechter S E. Toward econometric models of the security risk from remote attacks[J]. IEEE Security and Privacy,2005, 3(1): 40-44.
[5]
Sun Yijian, Huang Rufu. Fuzzy set-based risk evaluation model for real estate projects[J]. Tsinghua Science and Technology, 2008(1): 158-164.
[6]
孙有发, 陈世权, 吴今培. 基于集值统计的模糊神经网络专家系统及其应用[J]. 模糊系统与数学, 2001, 15(2): 99-103. Sun Youfa, Chen Shiquan, Wu Jinpei. Set-valued statistics based fuzzy neural expert evaluation system and its application[J]. Fuzzy Systems and Mathematics, 2001, 15(2): 99-103.
[7]
Butler S A, Fischbeck P. Multi-attribute risk assessment, technical report CMD-CS-01-169. Carnegie Mellon University: Carnegie Mellon University, 2001.
[8]
Liu Sifeng, Shi Bin. An evaluation system on development of science and technology park//Proceedings of Asia Pacific Regional Workshop on Science and Technology Park Development. Jakarta: UNESCO, 2007: 46-58.
[9]
Wu Shunxiang, Li Maoqing. The method of data pre-processing in grey information systems//CARCV06. Singapore: , 2006: 1-4.