Information systems security risk assessment on improved fuzzy AHP
暂无分享,去创建一个
[1] Samantha Thomas Cruz,et al. Information Security Risk Assessment , 2007, Information Security Management Handbook, 6th ed..
[2] Chen Chuang-xi. Risk Calculation for Information System Based on Fuzzy Theory , 2007 .
[3] Wang Yue-sheng. Model of fuzzy risk assessment of the information system , 2007 .
[4] Zhang Yu-qing. Survey of information security risk assessment , 2004 .
[5] Wang Qiang. Least variance priority method for triangular fuzzy number complementary judgment matrix , 2008 .
[6] Barry R. Litman. Is Network Ownership in the Public Interest , 1978 .
[7] Zhang Xue-jun. Fuzzy Risk Assessment of Information System Security Based on Entropy-weight Coefficient Method , 2005 .
[8] Dong-Liang Liu,et al. An Information System Security Risk Assessment Model Based on Fuzzy Analytic Hierarchy Process , 2009, 2009 International Conference on E-Business and Information System Security.
[9] Xu Ze-shui,et al. On priority method of triangular fuzzy number complementary judgement matrix , 2003 .
[10] Sheng-Yuan Wang,et al. Survey of Information Security Risk Assessment , 2010, 2010 International Conference on Electrical and Control Engineering.