[1] Zhao Dongmei, Wang Changguang, Ma Jianfeng. A risk assessment method of the wireless network security[J]. Journal of Electronics (China), 2007,24(3):428-432.
[2] Tsai Hsin-Yi, Huang Yu-Lun. An analytic hierarchy process-based risk assessment method for wireless networks[J]. IEEE Transactions on Reliability, 2011,60(4):801-816.
[3] 傅建新,黄联芬,姚彦. 基于层次分析法-灰色聚类的无线网络安全风险评估方法[J]. 厦门大学学报(自然科学版), 2010,49(5):622-626.
[4] 陈娟,马涛,王勇. 基于灰色模糊的无线网络安全评估模型[J]. 火力与指挥控制, 2012,37(3):177-179.
[5] 李春芳,李超,湛高峰. 无线局域网中实现信息系统安全等级保护的要求[J]. 等级保护, 2011(6):17-19.
[6]绿盟科技. 绿盟安全配置核查系统[DB/OL]. http://www.nsfocus.com.cn/products/details_36_13.html, 2014-12-28.
[8] 王甜,夏斌伟,徐辉,等. 信息系统安全等级测评配置检查工具研究与实现[J]. 计算机应用与软件, 2014,31(7):311-315.
[9] GB/T 22239-2008, 信息安全技术:信息系统安全等级保护基本要求[S].
[10] GB/T 20984-2007, 信息安全技术:信息安全风险评估规范[S].
[11] Zhu Ruoxin, Cui Xiaojie, Gong Shijuan, et al. Model for cloud computing security assessment based on AHP and FCE[C]// Proceedings of the 9th IEEE International Conference on Computer Science & Education. 2014:197-202.
[12] Fu Sha, Zhou Hangjun. The information security risk assessment based on AHP and fuzzy comprehensive evaluation[C]// Proceedings of the 3rd IEEE International Conference on Communication Software and Networks. 2011:124-128. |