HUANG Yujie, TANG Zuoqi. Information Security Risk Assessment Based on Improved Bayesian Network Model[J]. Computer and Modernization, 2018, 0(04): 95-.
[1] GB/T 209842007, 信息安全技术——信息安全风险评估规范[S].
[2] GB/Z 243642009, 信息安全技术——信息安全风险管理指南[S].
[3] GB/T 315092015, 信息安全技术——信息安全风险评估实施指南[S].
[4] GB/T 317222015, 信息技术——安全技术——信息安全风险管理[S].
[5] ISO/IEC 27001:2005, Information Technology—Security Techniques—Information Security Management Systems—Requirements[S].
[6] ISO/IEC 27002:2005, Information Technology—Security Techniques—Code of Practice for Information Security Managements[S].
[7] ISO/IEC 27005:2011, Information Technology—Security Techniques—Information Security Risk Management[S].
[8] Solic K, Ocevcic H, Golub M. The information systems’ security level assessment model based on an ontology and evidential reasoning approach[J]. Computers and Security, 2015,55:100112.
[9] Zhao Xiangmo, Dai Ming, Ren Shuai, et al. Risk assessment model of information security for transportation industry system based on risk matrix[J]. Applied Mathematics and Information Sciences, 2014,8(3):13011306.
[10]Wu Kehe, Ye Shichao. An information security threat assessment model based on Bayesian network and OWA operator[J]. Applied Mathematics and Information Sciences, 2014,8(2):833838.
[11]付钰,吴晓平,严承华. 基于贝叶斯网络的信息安全风险评估方法[J]. 武汉大学学报(理学版), 2006,52(5):631634.
[12]张鸣天. 基于贝叶斯网络的信息安全风险评估研究[D]. 北京:北京化工大学, 2016.
[13]吴晓平,付钰. 信息系统安全风险评估理论与方法[M]. 北京:科学出版社, 2016:185194.