6Naoki Satoh, Hiromitsu Kumamoto. An application of probabilistic risk assessment to information security audit [ C ]// Proceedings ofthe 9th WSEAS International Conference on Applied Informatics and Communications Tokyo : WSEAS, 2009 : 436 - 443.
7Xiao Long, Qi Yong, Li Qianmu. Information security risk assessment based on analytic hierarchy process and fuzzy comprehensive[ C ]// IEEE Proceedings of the 2008 International Conference on Risk Management & Engineering Management. Califormia : IEEE Computer Society Press, 2008 : 404 - 409.
8Zhao Dongmei, Wang Jinghong, Wu Jing, et al. Using fuzzy logic and entropy theory to risk assessment of the information security [ C ] //IEEE Proceedings of the Fourth International Conference on Machine Learning and Cybernetics. California : IEEE Computer Society Press, 2005.
9Li Lianfa, Wang Jinfeng, Leung Hareton, et al. Assessment of catastrophic risk using bayesian network constructed from domain knowledge and spatial data [ J ]. Risk Analysis, 2010, 30(7): 1157- 1175.
10Han Jiawei, Micheline Kamber. Data mining concepts and techniques, second edition [ M ].北京:机械工业出版社, 2008 : 204.