94
Views
10
CrossRef citations to date
0
Altmetric
Original Articles

Quantitative risk analysis method of information security-Combining fuzzy comprehensive analysis with information entropy

, &
Pages 149-165 | Received 01 Nov 2015, Published online: 27 Dec 2016

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (4)

Chamkaur Singh, Kamini, Neenu Juneja, Prabal Kumar Joshi & Rachit Garg. (2022) Performance comparison of Putnam model using new technology trends for software maintenance cost estimation. Journal of Discrete Mathematical Sciences and Cryptography 25:3, pages 691-703.
Read now
Suruchi Gera & Adwitiya Sinha. (2021) A machine learning-based malicious bot detection framework for trend-centric twitter stream. Journal of Discrete Mathematical Sciences and Cryptography 24:5, pages 1337-1348.
Read now
Sarvesh Tanwar & Anil Kumar. (2019) An efficient and secure identity based multiple signatures scheme based on RSA. Journal of Discrete Mathematical Sciences and Cryptography 22:6, pages 953-971.
Read now
Jin Wang, Bo Li, Wei Li & Shan Lin Yang. (2018) Two-sided matching model based on cumulative prospect theory for decision making of two-way referral system. Journal of Interdisciplinary Mathematics 21:5, pages 1097-1102.
Read now

Articles from other publishers (6)

Hong Chai & Yibo Zhang. (2023) Evaluation model of energy-saving potential of green buildings by entropy weight method. Proceedings of the Institution of Civil Engineers - Smart Infrastructure and Construction, pages 1-11.
Crossref
He Li, Xiaohui Li, Feng Yuan, Simon M. Jowitt, Fanfan Dou, Mingming Zhang, Xiangling Li, Yue Li, Xueyi Lan, Sanming Lu & Wenxiang Ding. (2022) Knowledge-driven based three-dimensional prospectivity modeling of Fe–Cu skarn deposits; a case study of the Fanchang volcanic basin, anhui province, Eastern China. Ore Geology Reviews 149, pages 105065.
Crossref
Li Yang, Kai Zou, Kai Gao & Zhiyi Jiang. (2022) A fuzzy DRBFNN-based information security risk assessment method in improving the efficiency of urban development. Mathematical Biosciences and Engineering 19:12, pages 14232-14250.
Crossref
Chandershekhar Sharma, SC Jain & Arvind K Sharma. (2019) A quantitative risk analysis methodology for the security of web application database against SQL injection (SQLi) attacks utilizing fuzzy logic system as computational technique. International Journal of Electrical Engineering & Education, pages 002072091984754.
Crossref
Kexun Chen, Xueying Zhang & K. Kiatsupaibul. (2018) Simulation research on high precision multimode GNSS positioning algorithm. Journal of Intelligent & Fuzzy Systems 35:4, pages 4037-4048.
Crossref
Jundian Song, Bingrong Dai, Fengyuan Liu & Rui Zhang. (2018) An Approach of Vehicle Defects Assessment upon Multi - source Data. An Approach of Vehicle Defects Assessment upon Multi - source Data.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.