[1] 许硕, 唐作其, 王鑫. 基于D-AHP与灰色理论的信息安全风险评估[J]. 计算机工程, 2019, 45(7):194-202. Xu Shuo, Tang Zuoqi, Wang Xin. Information security risk assessment based on D-AHP and grey theory[J]. Computer Engineering, 2019, 45(7):194-202. [2] 赵刚, 吴天水. 结合灰色网络威胁分析的信息安全风险评估[J]. 清华大学学报(自然科学版), 2013, 53(2):1761-1767. Zhao Gang, Wu Tianshui. Information security risk assessment based on G-ANP[J]. Journal of Tsinghua University (Science and Technology), 2013, 53(2):1761-1767. [3] Antonio R, Ortega F, Ramrio C. A method for the evaluation of risk in IT projects[J]. Expert Systems with Applications, 2016, 45(C):273-285. [4] Hong Q, Jian W T, Zheng T, et al. An information security risk assessment algorithm based on risk propagation in energy Internet[C]//2017 IEEE Conference on Energy Internet and Energy System Integration (EI2). Beijing:IEEE, 2017:1-6. [5] Feng N, Wang H J, Li M Q. A security risk analysis model for information systems:causal relationships of risk factors and vulnerability propagation analysis[J]. Information Sciences, 2014, 6:57-73. [6] Brin S, Page L. The anatomy of a large-scale hyper textual web search engine[J]. Computer Networks and ISDN Systems, 1998, 30(1):107-117. [7] 席荣荣, 云晓春, 张永铮, 等. 一种改进的网络安全态势量化评估方法[J]. 计算机学报, 2015, 38(4):749-758. Xi Rongrong, Yun Xiaochun, Zhang Yongzheng, et al. An improved quantitative evaluation method for network security[J]. Chinese Journal of Computers, 2015, 38(4):749-758. [8] Whitman M, Mattord H, Whitman, et al. Principles of information security[M]. Beijing:Tsinghua University Press, 2003:60-64. [9] 中国国家标准化管理委员会. 信息安全风险评估规范:GB/T 20984-2007[S]. 北京:中国标准出版社, 2007:6-8. The standardization administration of China. Information security risk assessment specification:GB/T 20984-2007[S]. Beijing:Standards Press of China, 2007:6-8. [10] 黄玉洁, 唐作其, 梁静. 基于信息熵与三参数区间的信息安全风险评估[J]. 计算机工程, 2018, 44(12):178-183. Huang Yujie, Tang Zuoqi, Liang Jing. Information security risk assessment based on information entropy and three-parameter interval[J]. Computer Engineering, 2018, 44(12):65-69. [11] 林健, 姜永. 基于三参数区间数型偏好序的群决策方法[J]. 山东大学学报(理学版), 2011, 46(7):65-69. Lin Jian, Jiang Yong. Information security risk assessment based on information entropy and three-parameter interval[J]. Journal of Shandong University (Natural Science), 2011, 46(7):65-69. |