[1] 张曼. 信息安全风险评估方法的研究[J]. 信息安全与技术, 2015, 25(1):18-20. Zhang Man. Survey of information security risk assessment methods[J]. Information Security and Technology, 2015, 25(1):18-20.
[2] Qasem M M. Information technology risk assessment methodologies:current status and future directions[J]. International Journal of Scientific & Engineering Research, 2013, 4 (12):966-973.
[3] Dzazali S, Zolait A. Assessment of information security maturity:an exploration study of Malaysian public service organization[J]. Journal of Systems and Information Technology, 2012, 14(1):23-57.
[4] Hemanidhi A, Chimmanee S, Kimpan C. Cyber risk evaluation framework based on risk environment of military operation[C]//The First Asian Conference on Defense Technology. Hua Hin, Thailand:IEEE, 2015:42-47.
[5] Teixeira A, Kin C S, Sandberg H, et al. Secure control systems:a quantitative risk management approach[J]. Control System, 2015, 35(1):24-45.
[6] Mousavian S, Valenzuela J, Wang Jianhui. A probabilistic risk mitigation model for cyber-attacks to PMU networks[J]. Power Systems, 2015, 30(1):156-165.
[7] Moyo M, Abdullah H, Nienaber R C. Information security risk management in small-scale organisations:a case study of secondary schools computerised information systems[C]//Information Security for South Africa. Johannesburg:IEEE, 2013:1-6. |