一种网络安全资源分配方法
作者:苘大鹏, 杨武, 杨永田, MAN Dapeng, YANG Wu, YANG Yongtian
作者单位:哈尔滨工程大学,信息安全研究中心,哈尔滨,150001
刊名:
辽宁工程技术大学学报(自然科学版)
英文刊名:JOURNAL OF LIAONING TECHNICAL UNIVERSITY(NATURAL SCIENCE)
年,卷(期):2008,27(2)
参考文献(8条)
1.Huang C D;Hu Q;Behara R S Economics of Information Security Investment in the Case of Simultaneous Attacks 2006
2.Huang C D;Hu Q;Behara R S In Search for Optimal Level of Information Security Investment in Risk-Averse Firms 2005
3.Gordon L A;Loeb M P The Economics of Information Security Investment[外文期刊] 2002(04)
4.Cavusoglu H;Mishra B;Raghunathan S The Value of Intrusion Detection Systems in Information Technology Security Architecture[外文期刊] 2005(01)
5.Cavusoglu H;Mishra B;Raghunathan S A Model for Evaluating IT Security Investments[外文期刊]
2004(07)
6.Bodin L D;Gordon L A;Loeb M P Evaluating Information Security InvestmentsUsing Analytical Hierarchy Process 2005(02)
7.Purser S Improving the ROI of the Security Management Process[外文期刊] 2004(07)
8.Sonnenreich W;Albanese J;Stout B Return on Security Investment (ROSI):A Practical Quantitative Model 2006(01)
本文链接:https://www.wendangku.net/doc/121517037.html,/Periodical_lngcjsdxxb200802028.aspx