[1]
Network security information and dynamic Weekly[EB/OL], [2013-03-26], http: /www. cert. org. cn/publish/main/upload/File/20130326CNCERT12. pdf.
Google Scholar
[2]
LU Xiang-yan, ZHONG Cheng, YANG Liu,. Security risk assessment method of website based on threat analysis, Journal of Computer Applications, 2009, 29(12), pp.94-96.
Google Scholar
[3]
GB/T20984, Information Security Risk Assessment Guideline, (2006).
Google Scholar
[4]
Joerg Christian Wolf, Phil Hall, Paul Robinson, Phil Culverhouse. Bioloid based Humanoid Soccer Robot Design, (2007).
Google Scholar
[4]
YANG Yang, YAO Shu zhen, . Risk assessment method of information security based on threat analysis, Computer Engineering and Applications, 2009, 45(3), pp.94-96, 100.
Google Scholar
[5]
Wei Qing, L Liangshuang, Yao Shan, Wu Weikang, Dynamic analysis method of network security risk, 2012, S1, pp.202-206.
Google Scholar
[6]
Ma Ji bin, Yu Hong Wei, Gao Chun lei, Study of the Issue of Personnel Promotion Based on Fuzzy Comprehensive Evaluation, Information Science and Management Engineering (ISME), 2010, pp.511-513.
DOI: 10.1109/isme.2010.159
Google Scholar
[7]
Guan shaoyun, Han xuenan, Analyses of the Captured Incidents and Its Security Strategy in Government Portal Websites, Management Science and Industrial Engineering (MSIE), 2011, pp, 1148-1150.
DOI: 10.1109/msie.2011.5707621
Google Scholar
[8]
The International Organization for Standardization. Information tech-nology-code of practice for information security management [EB /OL], [2009-05-10], http: /csrc. nist. gov/publications/sec-pubs/otherpubs/reviso-faq. pdf.
Google Scholar
[9]
Mark G. Stewart, John Mueller. A risk and cost-benefit assessment of United States aviation Security measures, Journal of Transportation Security, September 2008, Volume 1, Issue 3, pp.143-159.
DOI: 10.1007/s12198-008-0013-0
Google Scholar