[1] |
MOLDAGULOVA A N, USKENBAYEVA R K, SATYBALDIYEVA R Z, et al. On Identification of Hybrid Business Processes for Effective Implementation in the Form of Cloud Services[C]// 2019 19th International Conference onControl,Automation and Systems.Piscataway:IEEE, 2019:51-54.
|
[2] |
杨宏宇, 秦赓. 面向风险评估的关键系统识别[J]. 大连理工大学学报, 2020, 60(3):306-316.
|
|
YANG Hongyu, QIN Geng. Identification of Key Business Nodes for Risk Assessment[J]. Journal of Dalian University of Technology, 2020, 60(3):306-316.
|
[3] |
QI M, LU S. Overview of System Wide Information Management and Security Analysis[C]// 2017 IEEE 13th International Symposium on Autonomous Decentralized System.Piscataway:IEEE, 2017:191-194.
|
[4] |
SHEN Y, GU C, ZHAO P. Structural Vulnerability Assessment of Multi-energy System Using a PageRank Algorithm[J]. Energy Procedia, 2019, 158:6466-6471.
doi: 10.1016/j.egypro.2019.01.132
|
[5] |
STERGIOPOULOS G, DEDOSIS P, GRITZALIS D. Automatic Network Restructuring and Risk Mitigation through Business Process Asset Dependency Analysis(2020)[EB/OL].[2020-5-18]. https://doi.org/10.1016/j.cose.2020.101869.
|
[6] |
TORABI S A, GIAHI R, SAHEBJAMNIA N. An Enhanced Risk Assessment Framework for Business Continuity Management Systems[J]. Safety Science, 2016, 89:201-218.
doi: 10.1016/j.ssci.2016.06.015
|
[7] |
HARIYANTI E, DJUNAIDY A, SIAHAAN D O. A Conceptual Model for Information Security Risk Considering Business Process Perspective[C]// 2018 4th International Conference on Science and Technology.Piscataway:IEEE, 2018:1-6.
|
[8] |
VARELA-VACA A J, PARODY L, GASCA R M, et al. Automatic Verification and Diagnosis of Security Risk Assessments in Business Process Models[J]. IEEE Access, 2019, 7:26448-26465.
doi: 10.1109/ACCESS.2019.2901408
|
[9] |
BELOV V M, PESSTUNOV A I, PESSTUNOVA T M. On the Issue of Information Security Risks Assessment of Business Processes[C]// 2018 XIV International Scientific-Technical Conference on Actual Problems of Electronics Instrument Engineering.Piscataway:IEEE, 2018:136-139.
|
[10] |
MOHSEN O, FERESHTEH N. An Extended VIKOR Method Based on Entropy Measure for the Failure Modes Risk Assessment-A Case Study of the Geothermal Power Plant[J]. Safety Science, 2017, 92:160-172.
doi: 10.1016/j.ssci.2016.10.006
|
[11] |
YANG J, HAN J, ZHANG X. Information System Security Risk Assessment Based on IDAV Multi-Criteria Decision Model[C]// 2018 12th IEEE International Conference on Anti-Counterfeiting,Security,and Identification.Piscataway:IEEE, 2018:121-127.
|
[12] |
DIESCH R, PFAFF M, KRCMAR H. A Comprehensive Model of Information Security Factors for Decision-Makers(2020)[EB/OL].[2020-02-04]. https://doi.org/10.1016/j.cose.2020.101747.
|
[13] |
DENG Y J, LI Y Q, YIN R R, et al. Efficient Measurement Model for Critical Nodes Based on Edge Clustering Coefficients and Edge Betweenness[J]. Wireless Networks, 2019, 26:2785-2795.
doi: 10.1007/s11276-019-02040-4
|
[14] |
KIM J H, AHN B S. Extended Vikor Method Using Incomplete Criteria Weights[J]. Expert Systems with Applications, 2019, 126:124-132.
doi: 10.1016/j.eswa.2019.02.019
|
[15] |
PLOSKAS N, PAPATHANASIOU J. A Decision Support System for Multiple Criteria Alternative Ranking Using Topsis And Vikor in Fuzzy and Nonfuzzy Environments[J]. Fuzzy Sets and Systems, 2019, 377:1-30.
doi: 10.1016/j.fss.2019.01.012
|