全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

结合OCTAVE和灰色系统的信息安全风险评估方法

DOI: 10.13190/jbupt.200905.128.371, PP. 128-131

Keywords: 风险评估,灰色系统,归一化方法

Full-Text   Cite this paper   Add to My Lib

Abstract:

References

[1]  Alberts C, Dorofree A. OCTAVE method implementation guide. Carnegie Mellon: Carnegie Mellon Software Engineering Instititute, 2001. http://www.cert.org/octave/octavemethod.html.
[2]  Alberts C, Dorofee A. Managing information security risks: the OCTAVE approach[M]. Boston: Addison-Wesley, 2003.
[3]  中华人民共和国. GB/T 17859—1999, 计算机信息系统安全保护等级划分准则[S]. 1999: 1-5. PRC. GB/T 17859—1999, Classified criteria for security protection of computer information system[S]. 1999: 1-5.
[4]  Schechter S E. Toward econometric models of the security risk from remote attacks[J]. IEEE Security and Privacy,2005, 3(1): 40-44.
[5]  Sun Yijian, Huang Rufu. Fuzzy set-based risk evaluation model for real estate projects[J]. Tsinghua Science and Technology, 2008(1): 158-164.
[6]  孙有发, 陈世权, 吴今培. 基于集值统计的模糊神经网络专家系统及其应用[J]. 模糊系统与数学, 2001, 15(2): 99-103. Sun Youfa, Chen Shiquan, Wu Jinpei. Set-valued statistics based fuzzy neural expert evaluation system and its application[J]. Fuzzy Systems and Mathematics, 2001, 15(2): 99-103.
[7]  Butler S A, Fischbeck P. Multi-attribute risk assessment, technical report CMD-CS-01-169. Carnegie Mellon University: Carnegie Mellon University, 2001.
[8]  Liu Sifeng, Shi Bin. An evaluation system on development of science and technology park//Proceedings of Asia Pacific Regional Workshop on Science and Technology Park Development. Jakarta: UNESCO, 2007: 46-58.
[9]  Wu Shunxiang, Li Maoqing. The method of data pre-processing in grey information systems//CARCV06. Singapore: , 2006: 1-4.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133