Computer Science ›› 2007, Vol. 34 ›› Issue (10): 309-310.

Previous Articles    

HUANG Qin, ZHANG Yue-Qin ,LIU Yi-Liang (Automation School, Chongqing University, Chongqing 400030)   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Information system has been used in every walk of life and its security has nearly been noticed. The risk evaluation which can analyze the current status and potential risk of information system provide gist and direction for later security programming, m

Key words: Risk evaluation, Modularization, Hiberarehy

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!