ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Information System Security Risk Assessment Based on IDAV Multi-Criteria Decision Model
2018 12th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)
◽
10.1109/icasid.2018.8693111
◽
2018
◽
Cited By ~ 3
Author(s):
Jinning Yang
◽
Jiazhen Han
◽
Xiuyan Zhang
Keyword(s):
Risk Assessment
◽
Information System
◽
Decision Model
◽
System Security
◽
Security Risk
◽
Information System Security
◽
Security Risk Assessment
Download Full-text
Related Documents
Cited By
References
Information system security risk assessment based on multidimensional cloud model and the entropy theory
2015 IEEE 5th International Conference on Electronics Information and Emergency Communication
◽
10.1109/iceiec.2015.7284476
◽
2015
◽
Cited By ~ 2
Author(s):
Liangliang Huang
◽
Yongjun Shen
◽
Guidong Zhang
◽
Huixia Luo
Keyword(s):
Risk Assessment
◽
Information System
◽
Cloud Model
◽
System Security
◽
Entropy Theory
◽
Security Risk
◽
Information System Security
◽
Multidimensional Cloud Model
◽
Security Risk Assessment
Download Full-text
Classified information system security risk assessment model of the research
2015 International Conference on Logistics, Informatics and Service Sciences (LISS)
◽
10.1109/liss.2015.7369664
◽
2015
◽
Author(s):
Chong Peng
◽
Liping Shao
Keyword(s):
Risk Assessment
◽
Information System
◽
System Security
◽
Assessment Model
◽
Risk Assessment Model
◽
Security Risk
◽
Information System Security
◽
Security Risk Assessment
Download Full-text
Research on the Quantitative Methods of Classified Information System Security Risk Assessment
LISS 2014
◽
10.1007/978-3-662-43871-8_82
◽
2015
◽
pp. 571-575
Author(s):
Kang Zhang
◽
Liping Shao
Keyword(s):
Risk Assessment
◽
Information System
◽
Quantitative Methods
◽
System Security
◽
Security Risk
◽
Information System Security
◽
Security Risk Assessment
Download Full-text
Electric power information system security risk assessment based on fuzzy rating multilevel analysis
2013 2nd International Symposium on Instrumentation and Measurement, Sensor Network and Automation (IMSNA)
◽
10.1109/imsna.2013.6743391
◽
2013
◽
Author(s):
Chen Wang
Keyword(s):
Risk Assessment
◽
Information System
◽
Electric Power
◽
Multilevel Analysis
◽
System Security
◽
Security Risk
◽
Information System Security
◽
Security Risk Assessment
Download Full-text
Network & information system security risk assessment technology
2016 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST)
◽
10.1109/ibcast.2016.7429909
◽
2016
◽
Author(s):
Yao Ye
◽
Cai Wandong
◽
Fang Nan
Keyword(s):
Risk Assessment
◽
Information System
◽
System Security
◽
Security Risk
◽
Information System Security
◽
Network Information
◽
Assessment Technology
◽
Security Risk Assessment
Download Full-text
Information system security risk assessment based on grey relational analysis and Dempster-Shafer theory
2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC)
◽
10.1109/mec.2011.6025597
◽
2011
◽
Author(s):
Wei Miao
◽
Yanhua Liu
Keyword(s):
Risk Assessment
◽
Information System
◽
Grey Relational Analysis
◽
System Security
◽
Security Risk
◽
Relational Analysis
◽
Dempster Shafer Theory
◽
Security Risk Assessment
◽
Shafer Theory
◽
Grey Relational
Download Full-text
An Information System Security Risk Assessment Model Based on Fuzzy Analytic Hierarchy Process
2009 International Conference on E-Business and Information System Security
◽
10.1109/ebiss.2009.5137926
◽
2009
◽
Cited By ~ 5
Author(s):
Dong-liang Liu
◽
Shi-song Yang
Keyword(s):
Risk Assessment
◽
Information System
◽
Analytic Hierarchy Process
◽
System Security
◽
Assessment Model
◽
Risk Assessment Model
◽
Security Risk
◽
Analytic Hierarchy
◽
Security Risk Assessment
◽
Hierarchy Process
Download Full-text
A Survey of Information Intelligent System Security Risk Assessment Models, Standards and Methods
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering - Cloud Computing, Smart Grid and Innovative Frontiers in Telecommunications
◽
10.1007/978-3-030-48513-9_48
◽
2020
◽
pp. 603-611
Author(s):
Zijian Ying
◽
Qianmu Li
◽
Shunmei Meng
◽
Zhen Ni
◽
Zhe Sun
Keyword(s):
Risk Assessment
◽
Intelligent System
◽
System Security
◽
Security Risk
◽
Risk Assessment Models
◽
Security Risk Assessment
Download Full-text
Risk Assessment of Information System Security Based on Fuzzy Multiple Criteria Group AHP
Advances in Intelligent and Soft Computing - Advances in Future Computer and Control Systems
◽
10.1007/978-3-642-29387-0_58
◽
2012
◽
pp. 385-391
Author(s):
Shengchun Sun
◽
Huaiyu Pu
◽
Shuxin Tian
Keyword(s):
Risk Assessment
◽
Information System
◽
System Security
◽
Multiple Criteria
◽
Information System Security
Download Full-text
An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management Based on TOGAF
Lecture Notes in Business Information Processing - The Practice of Enterprise Modeling
◽
10.1007/978-3-319-48393-1_27
◽
2016
◽
pp. 353-361
◽
Cited By ~ 5
Author(s):
Nicolas Mayer
◽
Jocelyn Aubert
◽
Eric Grandry
◽
Christophe Feltus
Keyword(s):
Information System
◽
Risk Management
◽
Conceptual Model
◽
Enterprise Architecture
◽
System Security
◽
Security Risk
◽
Enterprise Architecture Management
◽
Information System Security
◽
Architecture Management
◽
Security Risk Management
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close