2015 Seventh International Conference on Measuring Technology and Mechatronics Automation 2015
DOI: 10.1109/icmtma.2015.115
|View full text |Cite
|
Sign up to set email alerts
|

Enterprise Information Security Risk and Countermeasure Research under Network Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…On the other hand, Guohua [10] presented a risk assessment technique based on AHP (Analytic Hierarchy Process) which quantitatively determines the confidentiality, integrity, and availability of the assets with respect to the individual asset classes. In another work, Munir et al [11] proposed a risk assessment mechanism based on the classification of different attacks as per their characteristics.…”
Section: Related Workmentioning
confidence: 99%
“…On the other hand, Guohua [10] presented a risk assessment technique based on AHP (Analytic Hierarchy Process) which quantitatively determines the confidentiality, integrity, and availability of the assets with respect to the individual asset classes. In another work, Munir et al [11] proposed a risk assessment mechanism based on the classification of different attacks as per their characteristics.…”
Section: Related Workmentioning
confidence: 99%