Computer Science ›› 2023, Vol. 50 ›› Issue (6A): 220400293-7.doi: 10.11896/jsjkx.220400293
• Information Security • Previous Articles Next Articles
BING Ying’ao1, WANG Wenting2, SUN Shengze1, LIU Xin2, NIE Qigui2, LIU Jing2
CLC Number:
[1]ZHAN X,GUO H,HE X Y,et al.Research on security risk assessment method of state grid edge computing information system[J].Computer Science,2019,46(S2):428-432. [2]WANG H,ZHANG J,ZHAO Y,et al.A new Bayesian model for network risk assessment[J].Small and Microcomputer Systems,2020,41(9):1898-1904. [3]DING M S,SUN W J,CAI X P,et al.Risk assessment and prevention of extreme events in power system[J].China Electric Power,2020,53(1):32-39,65. [4]WANG W H,GUO P,ZHU J,et al.Risk assessment and fault location method of relay protection system based on fault tree and Bayesian network[J].Journal of Electric Power Science and Technology,2021,36(4):81-90. [5]YIN J J,ZHAO D M.Power system backup risk assessmentmethod based on full probability risk measurement[J].Electric Power Automation Equipment,2020,40(1):156-162. [6]BU Y,GAO C H,LI W F,et al.Risk assessment of power system under the framework of big data[J].Power Grid and Clean Energy,2021,37(1):77-83. [7]WEI Y,CUI J B,LIU X T,et al.Reliability analysis method of power system wide area protection communication system based on improved dynamic fault Tree[J].Power System Protection and Control,2021,49(23):171-177. [8]ZHU R C,LI X,LIN X N.Security risk analysis method of video private network based on Bayesian network[J].Information Network Security,2021,21(12):91-101. [9]ZHOU W,ZHANG H,LI B H.Network risk assessment me-thod based on attack and defense state graph model[J].Journal of Southeast University(Natural Science Edition),2016,46(4):688-694. [10]FU J J,WU Z H,SHI Z.Reliability optimization algorithm for power communication network based on improved clustering algorithm[J].Computing Technology and Automation,2020,39(4):92-95. [11]LI W T,JIAO Y L,YANG Z L,et al.Risk assessment of centralized control wind farm based on probabilistic neural network[J].Electrical Measurement and Instrumentation,2019,56(17):76-81,152. [12]LI S B,LI J,TANG G,et al.Network security status prediction and risk assessment method of industrial control system based on HMM[J].Information Network Security,2020,20(9):57-61. [13]YANG H Y,YUAN H H,ZHANG L.A network host noderisk assessment method based on host importance[J/OL].Journal of Beijing University of Posts and Telecommunications,2022:1-5. [14]HE Y G,LIU J.Security Risk Assessment of Power Internet of Things Based on Combination Empowerment-Cloud Model[J].Power SystemTechnology,2020,44(11):4302-4309. [15]ZHAO X L,ZHAO B,ZHAO J J,et al.Research on network security measurement method based on attack identification[J].Information Network Security,2021,21(11):17-27. [16]WANG Y,LIU Y,SONG W H.Research on the evaluationmethod of emergency response capability of petrochemical enterprises based on fuzzy comprehensive evaluation method[J].Journal of Nankai University(Natural Science Edition),2021,54(6):75-80. [17]LI H,YANG J F.Design of reliability assessment software for substation automation system based on fault tree analysis me-thod[J].Automation and Instrumentation,2016(2):138-141. |
[1] | ZHAO Xuefeng, HOU Xiao, SUN Zhe, LI Mengxuan. Multidimensional Evaluation Method for Domestic Building Information Modeling Software Based on Entropy-Weight-AHP and Cloud Model [J]. Computer Science, 2023, 50(6A): 220400216-9. |
[2] | CHU An-qi, DING Zhi-jun. Application of Gray Wolf Optimization Algorithm on Synchronous Processing of Sample Equalization and Feature Selection in Credit Evaluation [J]. Computer Science, 2022, 49(4): 134-139. |
[3] | LIU Zi-qi, GUO Bing-hui, CHENG Zhen, YANG Xiao-bo and YIN Zi-qiao. Science and Technology Strategy Evaluation Based on Entropy Fuzzy AHP [J]. Computer Science, 2020, 47(6A): 1-5. |
[4] | ZHENG Geng-feng. Emergency Plan Evaluation of Special Equipment Accident Based on Intuitionistic Fuzzy Analytic Hierarchy Process [J]. Computer Science, 2020, 47(6A): 616-621. |
[5] | WU Yu-kun,XIAO Jie,Wei William LEE,LOU Ji-lin. Support Vector Machine Model Based on Grey Wolf Optimization Fused Asymptotic [J]. Computer Science, 2020, 47(2): 37-43. |
[6] | YUE Wen-jiao, LI Peng, WEN Jun-hao, XING Bin. Study on Impact Assessment Model of Enterprise Data Application [J]. Computer Science, 2020, 47(11A): 520-523. |
[7] | ZHONG Ma-chi, ZHANG Jun-lang, LAN Yang-bo, HE Yue-hua. Study on Online Education Focus Degree Based on Face Detection and Fuzzy Comprehensive Evaluation [J]. Computer Science, 2020, 47(11A): 196-203. |
[8] | FENG Shen-feng, GAO Jian-hua. Test Case Prioritization Method Based on AHP for Regression Testing [J]. Computer Science, 2019, 46(8): 233-238. |
[9] | HENG Hong-jun, WANG Rui. Long-term Operational Situation Assessment System for Terminal Buildings [J]. Computer Science, 2019, 46(5): 310-314. |
[10] | ZHENG Zhi-yun, JIA Chun-yuan, WANG Zhen-fei and LI Dun. Computing Research of User Similarity Based on Micro-blog [J]. Computer Science, 2017, 44(2): 262-266. |
[11] | WAN Xue-lian and ZHANG Jing-he. Research on Comprehensive Assessment Method of Information System Security Based on System Attack and Defense [J]. Computer Science, 2016, 43(Z6): 322-327. |
[12] | LUO Feng-e, ZHANG Cheng-wei and LIU An. Flight Delays Early Warning Management and Analysis Based on Data Mining [J]. Computer Science, 2016, 43(Z6): 542-546. |
[13] | XU Wen-hua, CHEN Hai-yan, ZHANG Yu-ping and WANG Jian-dong. Fuzzy Comprehensive Evaluation Method Based on Measure of Medium Truth Degree [J]. Computer Science, 2016, 43(2): 204-209. |
[14] | SHAN Mei-jing. Analytic Hierarchy Process-based Assessment Method on Mobile Payment Security [J]. Computer Science, 2015, 42(Z11): 368-371. |
[15] | CHEN Xi-hong, JIN Yue-hui and YANG Tan. Study on Quality Assessment Model for Mobile Videos over 3G Network [J]. Computer Science, 2015, 42(9): 86-93. |
|