共 8 条
- [5] Project risk evaluation using a fuzzy analytic hierarchy process: An application to information technology projects[J] . FatihTüysüz,CengizKahraman.Int. J. Intell. Syst. . 2006 (6)
- [7] Using hidden markov models to evaluate the risk of intrusions .2 Ames A,Vigna V F,Kemmerer G R A. Proceedings of the International Symposium on the Recent Advances in Intrusion Detection (RAID 2006) . 2006
- [8] Eva:a framework for network analysis and risk assessment .2 M. Danforth. Proceedings of the 23rd Conference on Large Installation System Administration . 2009