9Naoki Satoh, Hiromitsu Kumamoto. An application of probabilistic risk assessment to information security audit [ C ]// Proceedings ofthe 9th WSEAS International Conference on Applied Informatics and Communications Tokyo : WSEAS, 2009 : 436 - 443.
10Xiao Long, Qi Yong, Li Qianmu. Information security risk assessment based on analytic hierarchy process and fuzzy comprehensive[ C ]// IEEE Proceedings of the 2008 International Conference on Risk Management & Engineering Management. Califormia : IEEE Computer Society Press, 2008 : 404 - 409.