参考文献 [1]阙华坤,杨劲锋,肖勇,等.基于一体化平台的信息安全等级评估[J].计算机工程,2013,39(10):133-137,142. [2]刘仁山,孟祥宏.主机系统安全态势实时评估方法的研究[J].河南理工大学学报:自然科学版,2014,33(3):344-348. [3]National Institute of Standards and Technology.NIST SP 800-30-2001 Risk Management Guide for Information Technology System[S].2001. [4]Australian and New Zealand Standard Committee.AS/NZS 4360-2004 Risk Management[S].2004. [5]New British Standard Committee.BS 7799-3-2006 Risk Management Guidelines[S].2006. [6]中国国家标准化管理委员会.GB/T 25070-2010 信息系统等级保护安全设计技术要求[S].2010. [7]付国庆,龚军,吕小毅,等.基于AHP与模糊数学的信息安全风险评估模型[J].信息安全与通信保密,2014,(10):100-103. [8]Irfan S.Multicriteria Evaluation and Sensitivity Analysis on Information Security[J].International Journal of Computer Applications,2013,69(24):22-25. [9]Anuar N B,Papadaki M,Furnell S,et al.Incident Prioritization Using Analytic Hierarchy Process(AHP):Risk Index Model (RIM)[J].Security and Communica-tion Networks,2013,6(9):1087-1116. [10]崇小蕾,庄子旻,路超,等.基于层次模糊综合评价法的信息安全评价[J].信息安全与通信保密,2014,(11):137-139,143. [11]李杨,韦伟,刘永忠,等.一种基于AHP的信息安全威胁评估模型研究[J].计算机科学,2012,39(1):61-64. [12]Thalia S,Tuteja A,Dutta M.Comparative Performance Analysis of Information System Security Using Crisp and Fuzzy AHP Methods[C]//Proceedings of the 3rd IEEE International Advance Computing Conference.Washington D.C.,USA:IEEE Press,2013:983-988. [13]Saaty T L.How to Make a Decision:The Analytic Hierarchy Process[J].European Journal of Operational Research,1990,48(1):9-26. [14]王元放,俞晓安,薛阳,等.基于层次分析法的信息化项目评估模型[J].计算机工程,2007,33(8):68-70. [15]程平,李宁.云会计环境下基于ANP的AIS可信性评估[J].计算机工程,2014,40(11):273-277. [16]李德毅,刘常昱.论正态云模型的普适性[J].中国工程科学,2004,6(8):28-34. [17]吴涛.基于概念的不确定性关联规则挖掘[J].现代计算机:专业版,2007,(5):11-13. 编辑金胡考 |