-
1
-
-
46449092367
-
Survey of information security[J]
-
SHEN Changxiang, ZHANG Huanguo, CAO Zhenfu, et al. Survey of Information SecurityJ. SCIENCE CHINA E: Information Sciences, 2007, 37(2):129-150.
-
(2007)
Science China E: Information Sciences
, vol.37
, Issue.2
, pp. 129-150
-
-
Shen, C.1
Zhang, H.2
Cao, Z.3
-
4
-
-
80051975607
-
China information security standardization technical committe
-
China Information Security Standardization Technical Committee. Baseline for Classified Protection of Information System[S]. 2007, http^/www.tc260.org. cn.
-
(2007)
Baseline for Classified Protection of Information System[S]
-
-
-
6
-
-
80051988813
-
Preface of special issue: Theory and technology of testing and evaluation for information security[J]
-
FENG Dengguo. Preface of Special Issue: Theory and Technology of Testing and Evaluation for Information securityJ. Chinese Journal ofComputers, 2009, 32(4): 1-3.
-
(2009)
Chinese Journal ofComputers
, vol.32
, Issue.4
, pp. 1-3
-
-
Feng, D.1
-
7
-
-
80052006508
-
-
Beijing: Tsinghua University Press
-
FAN Hong, FENG Dengguo, WU Yafei. Method and Application of Risk Assessment of Information SecurityM. Beijing: Tsinghua University Press, 2006.
-
(2006)
-
-
Fan, H.1
Feng, D.2
Wu, Y.3
-
10
-
-
65349185023
-
A trust model based on behaviors risk evaluation [J]
-
ZHANG Runlian, WU Xiaonian, ZHOU Shengyuan, et d. A Trust Model Based on Behaviors Risk Evaluation J. Chinese Journal of Computers, 2009, 32(4): 688-698.
-
(2009)
Chinese Journal of Computers
, vol.32
, Issue.4
, pp. 688-698
-
-
Zhang, R.1
Wu, X.2
Zhou, S.3
-
12
-
-
0242439292
-
Research of subjective trust management model based on the fuzzy set theory [J]
-
TANG Wen, CHEN Zhong. Research of Subjective Trust Management Model Based on the Fuzzy Set Theory [J]. Journal of Software, 2003, 14(8): 1401-1408.
-
(2003)
Journal of Software
, vol.14
, Issue.8
, pp. 1401-1408
-
-
Tang, W.1
Chen, Z.2
-
15
-
-
78649399471
-
Information security risk assessment based on AHP and fuzzy entirety evaluation[J]
-
XIAO Long, QI Yong, LI Qianmu. Information Security Risk Assessment Based on AHP and Fuzzy Entirety Evaluation[J]. Computer Engineering and Applications, 2009, 45 (22): 82-85.
-
(2009)
Computer Engineering and Applications
, vol.45
, Issue.22
, pp. 82-85
-
-
Xiao, L.1
Qi, Y.2
Li, Q.3
-
16
-
-
77953280651
-
Analytic hierarchy process based on variable weights [J]
-
LI Chunhao, SUN Yonghe, JIA YanhuL Analytic Hierarchy Process Based on Variable Weights [J]. Systems Engineering-Theory & Practice, 2010, 30(4): 723-731.
-
(2010)
Systems Engineering-Theory & Practice
, vol.30
, Issue.4
, pp. 723-731
-
-
Chunhao, L.1
Yonghe, S.2
Jia, Y.3
-
17
-
-
80051971312
-
Application of variable weight entirety evaluation to safety assessment of highway in mountainous areas[J]
-
YOU Kesi, LU Sun, GU Wenjun. Application of Variable Weight Entirety Evaluation to Safety Assessment of Highway in Mountainous Areas[J]. Systems Engineering, 2010, 28(5): 85-88.
-
(2010)
Systems Engineering
, vol.28
, Issue.5
, pp. 85-88
-
-
You, K.1
Lu, S.2
Gu, W.3
|