[1] EHRENFELD J M. Wannacry, cybersecurity and health information technology: A time to act[J]. Journal of Medical Systems, 2017,41(7):104.
[2] Kaspersky Website. Kaspersky Security Bulletin 2019. Statistics[EB/OL]. (2019-12-12)[2020-11-01]. https://securelist. com/kaspersky-security-bulletin-2019-statistics/95475/.
[3] WANGEN G B. Information security risk assessment: A method comparison[J]. Computer, 2017,50(4):52-61.
[4] 冯登国,张阳,张玉清. 信息安全风险评估综述[J]. 通信学报, 2004,25(7):10-18.
[5] HE M X, AN X. Information security risk assessment based on analytic hierarchy process[J]. Indonesian Journal of Electrical Engineering and Computer Science, 2016,1(3):656-664.
[6] WANG H, CHEN Z F, FENG X, et al. Research on network security situation assessment and quantification method based on analytic hierarchy process[J]. Wireless Personal Communications, 2018,102(2):1401-1420.
[7] TAO L L, LIN H, SHEN Y J, et al. Optimal combination between subjective weighting and objective weighting based on maximum square sum of distance for information security risk assessment[C]// 2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS). 2016:471-474.
[8] KOKANGUL A, POLAT U, DAGSUYU C. A new approximation for risk assessment using the AHP and Fine Kinney methodologies[J]. Safety Science, 2017,91:24-32.
[9] 彭道刚,卫涛,赵慧荣,等. 基于D-AHP和TOPSIS的火电厂控制系统信息安全风险评估[J]. 控制与决策, 2019,34(11):2445-2451.
[10]LI W M, LIANG Y, WANG W Y, et al. Research on security risk assessment based on the improved FAHP[J]. IOP Conference Series: Materials Science and Engineering, 2020,719(1):012008.
[11]HUANG X P, XU W. Method of information security risk assessment based on improved fuzzy theory of evidence[J]. International Journal of Online and Biomedical Engineering (iJOE), 2018,14(3):188-196.
[12]WU X Q, SHEN Y J, ZHANG G D, et al. Information security risk assessment based on DS evidence theory and improved TOPSIS[C]// 2016 7th IEEE International Conference on Software Engineering and Service Science. 2016:153-156.
[13]WANG D Q, LU Y M, GAN J F. An information security evaluation method based on entropy theory and improved TOPSIS[C]// 2017 IEEE 2nd International Conference on Data Science in Cyberspace. 2017:595-600.
[14]弭乾坤,吴斌,杜宁,等. 基于不完全信息博弈模型的信息系统安全风险评估方法[J]. 计算机与现代化, 2019(4):118-126.
[15]LUO H S, SHEN Y J, ZHANG G D, et al. Information security risk assessment based on two stages decision model with grey synthetic measure[C]// 2015 6th IEEE International Conference on Software Engineering and Service Science. 2015:795-798.
[16] 高志方,盛冠帅,彭定洪. 妥协率法在信息安全风险评估中的应用[J]. 计算机工程与应用, 2017,53(23):82-87.
[17]DUAN Y C, CAI Y H, WANG Z K, et al. A novel network security risk assessment approach by combining subjective and objective weights under uncertainty[J]. Applied Sciences, 2018,8(3):428.
[18]YU J J, HU M, WANG P. Evaluation and reliability analysis of network security risk factors based on DS evidence theory[J]. Journal of Intelligent & Fuzzy Systems, 2018,34(2):861-869.
[19]HAMID T, AL-JUMEILY D, HUSSAIN A, et al. Cyber security risk evaluation research based on entropy weight method[C]// 2016 9th International Conference on Developments in eSystems Engineering. 2016:98-104.
[20]XIE H Y, WANG Y, ZHANG X H, et al. The study of information security risk assessment based on support vector machine[J]. MATEC Web of Conferences, 2018,232:01043.
[21]GAO Y Y, SHEN Y J, ZHANG G D, et al. Information security risk assessment model based on optimized support vector machine with artificial fish swarm algorithm[C]// 2015 6th IEEE International Conference on Software Engineering and Service Science. 2015:599-602.
[22]WANG J, FAN K F, MO W, et al. A method for information security risk assessment based on the dynamic Bayesian network[C]// International Conference on Networking & Network Applications. 2016:279-283.
[23]SU C M, LI Y G, MAO W, et al. Information network risk assessment based on AHP and neural network[C]// 2018 10th International Conference on Communication Software and Networks. 2018:227-231.
[24]SONG Y Q, SHEN Y J, ZHANG G D, et al. The information security risk assessment model based on GA-BP[C]// 2016 7th IEEE International Conference on Software Engineering and Service Science. 2016.
[25] 李森宇,毕方明,刘晋,等. ICS-BPNN在信息安全风险评估中的应用[J]. 中国科技论文, 2018,13(2):171-175.
[26]DONG G S, LI W C, WANG S W, et al. The assessment method of network security situation based on improved BP neural network[C]// International Conference on Computer Engineering and Networks. 2018:67-76.
[27]HU J J, GUO S S, KUANG X H, et al. I-HMM-based multidimensional network security risk assessment[J]. IEEE Access, 2019,8:1431-1442.
[28]VAN LAARHOVEN P J M, PEDRYCZ W. A fuzzy extension of Saaty’s priority theory[J]. Fuzzy Sets and Systems 1983,11(1):199-227.
[29]LIOU T S, WANG M J J. Ranking fuzzy numbers with integral value[J]. Fuzzy Sets and Systems, 1992,50(3):247-255.
[30]张吉军. 模糊层次分析法(FAHP)[J]. 模糊系统与数学, 2000,14(2):80-88.
[31]阮民荣,王玉燕. 基于模糊一致判断矩阵排序方法的比较[J]. 统计与决策, 2006(23):16-17.
[32]ZHI H, ZHANG G D, LIU Y Q, et al. A novel risk assessment model on software system combining modified fuzzy entropy-weight and AHP[C]// 2017 8th IEEE International Conference on Software Engineering and Service Science. 2017:451-545.
|