[1] |
GAO Zhifang, SHENG Guanshuai, PENG Dinghong.
Information security risk assessment method based on compromise rate method
[J]. Computer Engineering and Applications, 2017, 53(23): 82-87.
|
[2] |
CHEN Yun1,2, SHI Song1,2, PAN Yan1,2, YU Li2.
Hybrid ensemble approach for credit risk assessment based on SVM
[J]. Computer Engineering and Applications, 2016, 52(4): 115-120.
|
[3] |
WANG Xueli1, ZHANG Xuan1,3, LI Tong1,3, WANG Xu2.
Method of risk assessment oriented to trustworthy software
[J]. Computer Engineering and Applications, 2016, 52(19): 97-101.
|
[4] |
CHEN Yu, WANG Yadi, WANG Jindong, WANG Kun.
Method for information system risk management based on Markov logic networks
[J]. Computer Engineering and Applications, 2016, 52(18): 104-110.
|
[5] |
ZHOU Wei1, XIE Wenbin2, LI Lei3.
A kind of Cyberspace security framework design and risk assessment method
[J]. Computer Engineering and Applications, 2016, 52(18): 122-126.
|
[6] |
ZHANG Yongzheng, GENG Xiuli.
Risk assessment of service outsourcing based on DEMATEL and VIKOR
[J]. Computer Engineering and Applications, 2016, 52(18): 240-245.
|
[7] |
ZHANG Xuan1,2, LIN Yifeng1, BAI Chuan1, WANG Xu3, MA Muting1, YU Qian1,2.
Risk assessment model for mobile payment based on Bayesian network
[J]. Computer Engineering and Applications, 2014, 50(5): 60-64.
|
[8] |
CHEN Fan1, XIE Hongtao2.
Risk analysis of construction technology innovation by Bayesian networks model
[J]. Computer Engineering and Applications, 2014, 50(18): 33-38.
|
[9] |
CHE Yulong, SU Hongsheng.
Risk assessment method on train control system using Bayesian network
[J]. Computer Engineering and Applications, 2013, 49(24): 238-242.
|
[10] |
LI Weixia1, ZHANG Hao2, ZHANG Chengyi3.
Drag use risk evaluation problem of comprehensive hospital based on intuitionistic fuzzy analytic hierarchy process
[J]. Computer Engineering and Applications, 2013, 49(18): 242-244.
|
[11] |
ZHANG Shuang, KONG Deqi, LI Xiaodong.
Security risk assessment methodology for airborne system
[J]. Computer Engineering and Applications, 2013, 49(16): 232-235.
|
[12] |
CHEN Xuegang1, CHENG Jieren2.
Research on application of risk assessment approach for multi-factor hierarchical fuzzy comprehensive evaluation
[J]. Computer Engineering and Applications, 2012, 48(30): 128-131.
|
[13] |
YAO Jianbo1, ZHANG Tao2.
Side channel risk qualitative evaluation model based on hierarchy
[J]. Computer Engineering and Applications, 2012, 48(26): 84-87.
|
[14] |
WEN Guofeng1,2,CHEN Liwen1.
Building and application of data warehouse of completed construction projects
[J]. Computer Engineering and Applications, 2011, 47(4): 245-248.
|
[15] |
LIAO Niandong1,YI Yu1,HU Qi2.
Research on dynamical real-time risk assessment of network security
[J]. Computer Engineering and Applications, 2011, 47(36): 12-15.
|