References
- Dong-mei Zhao. Jing-hong Wang, Jing Wu, Jian-Feng Ma. “Using Fuzzy Logic and Entropy Theory to Risk Assessment of the Information Security” [A], “Proceedings of the 4th International Conference on Machine Learning and Cybernetics” [C], Guang Zhou, 18–21 August 2005. 2448–2453.
- Feng Rui. Feng Buyun. “Entropy” [M]. Science press, Beijing, 1992.
- Jaynes E T. “Information Theory and Statistical Mechanics” [J]. Phys Rev. 1957, 106(4). 620–630. doi: 10.1103/PhysRev.106.620
- Jiang Qing Hang. “Risk measure principle” [M]. Shanghai: tongji university press, 2002.
- John M Gleason. “Fuzzy Set Computational Processes in Risk Analysis” [J]. IEEE Transactions on Engineering Management. 1991. 38(2). 177–178. doi: 10.1109/17.78415
- Rifkin J, Howard T. Entropy: “A New World Outlook” [M]. Shanghai: Shanghai translation publishing house, 1987.
- Shannon C E. “A Mathematical Theory of Communication” [J]. Bell Sys Tech J. 1948. 27. 37–433. doi: 10.1002/j.1538-7305.1948.tb01338.x
- Shannon C E. “A Mathematical Theory of Communication” [J]. Bell Sys Tech J. 1948. 27. 623–659. doi: 10.1002/j.1538-7305.1948.tb00917.x
- Wang Guang Yuan. “Several Mathematic Models of Comprehensive Evaluation of the Essence and Application” [J]. Fuzzy mathematics. 1984. 4. 81–89.
- XiaoLong, Dai Zong Kun. “The Multi-grade Fuzzy Comprehensive Evaluation Model of Information System Risk” [J]. Journal of sichuan university (engineering science edition). 2004. 36(3). 98–102.
- Zadeh. L.A. “Fuzzy Sets” [J]. Information and Control. 1965. 8. 338–356. doi: 10.1016/S0019-9958(65)90241-X
- Zhao Dong Mei, Su Gong Shun, Wu Jing. “The Wireless Network Security Fuzzy Risk Assessment Based on Entropy Theory” [J]. Computer application and software. 2006, 8. 24–26.