The Fuzzy Comprehensive Assessment Model of Information Security Based on Knowledge Value Chain.
Hou DianleiLiu HuiPublished in: ICEE (2010)
Keyphrases
- information security
- security issues
- countermeasures
- information systems
- computer security
- knowledge base
- network security
- intrusion detection
- design theory
- real world
- security requirements
- risk assessment
- databases
- security level
- smart grid
- fuzzy sets
- fuzzy logic
- artificial intelligence
- database
- smart card
- privacy concerns
- sensitive data
- data security
- learning algorithm
- security risks
- information assurance
- cyber defense