[1] |
YANG Hongyu, YUAN Haihang, ZHANG Liang.
A Risk Assessment Method of Network Host Node with Host Importance
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(2): 16-21.
|
[2] |
YANG Hong-yu, ZHANG Le, ZHANG Liang.
An Information System Risk Assessment Method Based on Risk Propagation
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(4): 41-48.
|
[3] |
LU Yi-qin, HUANG Jun-xian, CHENG Zhe, QIN Jian-cheng.
A Multi-Index Mimic Voting Algorithm Based on Improved AHP-FCE Model
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(2): 8-13.
|
[4] |
TIAN Xing-peng, ZHU Xiao-rong, ZHU Hong-bo.
Distributed Wireless Node Task Allocation Method Based on KM Algorithm
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(6): 96-102.
|
[5] |
ZHAO Jian, WANG Rui, LI Zheng-min, LEI Min, MA Min-yao.
Security Threats and Risk Assessment of IoT System
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(s1): 135-139.
|
[6] |
LEI Min, LIU Xiao-ming, ZHANG Hong, WANG Mian, YANG Yu.
Research on Security Threats and Risk Assessment of Web Information System
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(s1): 87-93.
|
[7] |
LEI Wei-jia, SHENG Jie, XIE Xian-zhong.
Encoding and Decoding Scheme of Security-Enhanced LT Codes
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(4): 108-113.
|
[8] |
YANG Hong-yu, CHENG Xiang.
Information System Risk Control Method Based on Work-Flow
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(3): 105-109.
|
[9] |
AN Jian, GUI Xiao-lin, HE Chang-qi, WU Ruo-biao.
Crowdsourcing Assignment Mechanism Based on AHP in Mobile Crowd Sensing
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(5): 37-41.
|
[10] |
JIANG Hai-ou, SONG Mei-na, E Hai-hong, DENG Jiang-dong.
A Generic Method of Migrating Operation Support System Partially to the Cloud
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(5): 1-5.
|
[11] |
GE Hai-hui, ZHENG Shi-hui, CHEN Tian-ping, YANG Yi-xian.
Fuzzy Risk Assessment of Information Security Threat Scenario
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(6): 89-92,107.
|
[12] |
.
Network Security Analysis Based on Host-Security-Group
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(1): 19-23.
|
[13] |
WU Huan, PAN Lin, WANG Xiao-zhen, XU Rong-sheng.
A Risk Assessment Model Using Incomplete Attack Graphs Analysis
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(3): 57-61.
|
[14] |
QIN Hua-wang;DAI Yue-wei;WANG Zhi-quan.
Threshold Signature Scheme Based on the General Access Structure
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(6): 102-104.
|
[15] |
LEI Xin-Feng.
Implement of Chinese-Wall Model Based on an Open Synthetical Security Model
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(3): 73-76.
|