[1] 彭俊好, 徐国爱, 杨义先, 等. 基于效用的安全风险度量模型[J]. 北京邮电大学学报, 2006, 29(2): 59-61. Peng Junhao, Xu Guoai, Yang Yixian, et al. Measure model of security risk based on utility[J]. Journal of Beijing University of Posts and Telecommunications, 2006, 29(2): 59-61.
[2] 冯登国, 张阳, 张玉清. 信息安全风险评估综述[J]. 通信学报, 2004,25(7): 10-18. Feng Dengguo, Zhang Yang, Zhang Yuqing. Survey of information security risk assessment[J]. Journal of China Institute of Communications, 2004,25(7): 10-18.
[3] Saaty T L. A scaling method for priorities in hierarchical structures[J]. Journal of Math Psychology, 1997(15): 234-281.
[4] 宋晓莉, 余静, 孙海传, 等. 模糊综合评价法在风险评估中的应用[J]. 微计算机信息, 2006, 22(12-3): 71-73,79. Song Xiaoli, Yu Jing, Sun Haichuan, et al. The application of fuzzy synthesis evaluation in risk evaluation[J]. Microcomputer Information, 2006, 22(12-3): 71-73, 79.
[5] 赵冬梅, 苏红顺, 吴敏, 等. 基于熵理论的无线网络安全的模糊风险评估. 计算机应用与软件, 2006, 23(8): 24-26, 42. Zhao Dongmei, Su Hongshun, Wu Min, et al. Fuzzy risk assessment of the wireless network security based on entropy theory[J]. Computer Applications and Software, 2006, 23(8): 24-26, 42.
[6] Shannon C E. A mathematical theory of communication[J]. The Bell System Technical Journal, 1948, 27: 379-423, 623-656.
[7] Jaynes E T. Information theory and statistical mechanics[J]. Phy Rev, 1957, 106(5): 620-630. |