[1] SHAMELI-SENDI A,AGHABABAEI-BARZEGAR R,CHERIET M.Taxonomy of information security risk assessment(ISRA)[J].Computer and Security,2016,57:14-30. [2] AGRAWAL V.A comparative study on information security risk analysis methods[J].Journal of Computers,2012,12(1):57-67. [3] FENG Nan,WANG H J,LI Mingqiang.A security risk analysis model for information systems:causal relation-ships of risk factors and vulnerability propagation analysis[J].Information Sciences,2014,256:57-73. [4] YU Jingjie,HU Min,WANG Peng.Evaluation and reliability analysis of network security risk factors based on D-S evidence theory[J].Journal of Intelligent and Fuzzy Systems,2018,34(2):861-869. [5] RODRIGUEZ A,ORTEGA F,CONCEPCCION R.A method for the evaluation of risk in IT projects[J].Expert Systems with Applications,2016,45(C):273-285. [6] 赵刚,吴天水.结合灰色网络威胁分析的信息安全风险评估[J].清华大学学报(自然科学版),2013,53(2):1761-1767. [7] 中国国家标准化管理委员会.信息安全技术信息安全风险评估规范:GB/T 20984-2007[S].北京,[出版者不详]:2007. [8] DEMPSTER A.Upper and lower probabilities induced by a multivalued mapping[J].Annals of Mathematical Statistics,1967,38:325-329. [9] DENG Y.D numbers:theory and applications[J].Journal of Information and Computational Science,2012,9(9):2421-2428. [10] HUANG Xiaozhong,WANG Ningkai,WEI Daijun.Investment decision using D numbers[C]//Proceedings of 2016 Chinese Control and Decision Conference.Washington D.C.,USA:IEEE Press,2016:4164-4167. [11] LIU Huchen,YOU Jianxin,FAN Xiaojun,et al.Failure mode and effects analysis using D numbers and grey relational projection method[J].Expert Systems with Applications,2014,41(10):4670-4679. [12] DENG Xinyang,HU Yong,DENG Yong.Bridge condition assessment using D numbers[J].Scientific World Journal,2014(5):358057. [13] FAN Zong,WANG Lifang.Evaluation of university scientific research ability based on the output of sci-tech papers:a D-AHP approach[J].PLoS One,2017,12(2):e0171437. [14] FAN Guichao,ZHONG Denghua,YAN Fugen,et al.A hybrid fuzzy evaluation method for curtain grouting efficiency assessment based on an AHP method extended by D numbers[J].Expert Systems with Applications,2016,44(C):289-303. [15] DENG Xinyang,HU Yong,DENG Yong.Supplier selection using AHP methodology extended by D numbers[J].Expert Systems with Applications,2014,41(1):156-167. [16] 邓聚龙.灰理论基础[M].武汉:华中科技大学出版社,2002. [17] DENG Xinyang,DENG Yong.D-AHP method with different credibility of information[J].Soft Computing,2019,23(2):683-691. |