94
Views
10
CrossRef citations to date
0
Altmetric
Original Articles

Quantitative risk analysis method of information security-Combining fuzzy comprehensive analysis with information entropy

, &
Pages 149-165 | Received 01 Nov 2015, Published online: 27 Dec 2016

References

  • Dong-mei Zhao. Jing-hong Wang, Jing Wu, Jian-Feng Ma. “Using Fuzzy Logic and Entropy Theory to Risk Assessment of the Information Security” [A], “Proceedings of the 4th International Conference on Machine Learning and Cybernetics” [C], Guang Zhou, 18–21 August 2005. 2448–2453.
  • Feng Rui. Feng Buyun. “Entropy” [M]. Science press, Beijing, 1992.
  • Jaynes E T. “Information Theory and Statistical Mechanics” [J]. Phys Rev. 1957, 106(4). 620–630. doi: 10.1103/PhysRev.106.620
  • Jiang Qing Hang. “Risk measure principle” [M]. Shanghai: tongji university press, 2002.
  • John M Gleason. “Fuzzy Set Computational Processes in Risk Analysis” [J]. IEEE Transactions on Engineering Management. 1991. 38(2). 177–178. doi: 10.1109/17.78415
  • Rifkin J, Howard T. Entropy: “A New World Outlook” [M]. Shanghai: Shanghai translation publishing house, 1987.
  • Shannon C E. “A Mathematical Theory of Communication” [J]. Bell Sys Tech J. 1948. 27. 37–433. doi: 10.1002/j.1538-7305.1948.tb01338.x
  • Shannon C E. “A Mathematical Theory of Communication” [J]. Bell Sys Tech J. 1948. 27. 623–659. doi: 10.1002/j.1538-7305.1948.tb00917.x
  • Wang Guang Yuan. “Several Mathematic Models of Comprehensive Evaluation of the Essence and Application” [J]. Fuzzy mathematics. 1984. 4. 81–89.
  • XiaoLong, Dai Zong Kun. “The Multi-grade Fuzzy Comprehensive Evaluation Model of Information System Risk” [J]. Journal of sichuan university (engineering science edition). 2004. 36(3). 98–102.
  • Zadeh. L.A. “Fuzzy Sets” [J]. Information and Control. 1965. 8. 338–356. doi: 10.1016/S0019-9958(65)90241-X
  • Zhao Dong Mei, Su Gong Shun, Wu Jing. “The Wireless Network Security Fuzzy Risk Assessment Based on Entropy Theory” [J]. Computer application and software. 2006, 8. 24–26.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.