1THOMAS F. Information Security Implemented in:The theory on Stock Market Efficiency,Markowitz's Portfolio Theory and Porter's Value Chain[J].{H}Computers & Security,1997,(6):469-479.
2CHEN S J,CHEN S M. Fuzzy Risk Analysis Based on Similarity Measures of Generalized Fuzzy Numbers[J].{H}IEEE Transactions on Fuzzy Systems,2003,(5):45-55.
3ZHAO D M;WANG J H;WU J.Using Fuzzy Logic and Entropy Theory to Risk Assessment of the Information Security[A]{H}广州,2005.
4李焕;刘树吉;赵永彬.电力企业云计算信息安全风险评估研究[A]{H}北京,2012.
5SABRINA D M,WALTER S,THIERRY D. Risk Assessment Based on Weak Information Using Belief Functions:A Case Study in Water Treatment[J].IEEE Transactions on Systems Man and Cybernetics Psrt C:Applications and Reviews,2006,(3):382-396.
6Guy B. Technology is not enough:Taking a holistic view for informa- tion assurance [ J ]. Intbrmation Security Technical Report, 2012 (17) :19 -25.
7] Chen L, Zhang Y, Song Z L,et al. Automatic web services classifi- cation based on rough set theory [.l ]. Journal of Central South Uni- versity ,2013,20( 10 ) :2708 - 2714.