[1]
|
Li Ben-Xian, Li Meng-Jun. The simulation of fear diffusion based on parallel system under the paroxysmal terrorism incident circumstance. Computer Engineering and Application, 2012, 38(8): 1321-1328 (李本先, 李孟军. 基于平行系统的恐怖突发事件下恐惧传播的仿真研究. 自动化学报, 2012, 38(8): 1321-1328)
|
[2]
|
Zheng Zhou-Yi, Du Zhi-Guo, Wang Xin. Visual implementation for vulnerability assessment algorithm of security and protection systems. Computer Engineering and Application, 2014, 50(5): 70-73 (郑舟毅, 杜志国, 王欣. 安防系统弱点评估算法的可视化实现. 计算机工程与应用, 2014, 50(5): 70-73)
|
[3]
|
Guo Xi, Hu Rui-Min. The effectiveness evaluation for security system based on risk entropy model and Bayesian network theory. In: Proceedings of the 2010 IEEE International Carnahan Conference Security Technology ICCST. San Jose, CAL: IEEE, 2010. 57-65
|
[4]
|
Sendi A S, Jabbarifar M, Shajari M, Dagenais M. FEMRA: fuzzy expert model for risk assessment. In: Proceedings of the 5th Inter National Conference on Internet Monitoring and Protection. Barcelona: IEEE, 2010. 48-52
|
[5]
|
Zhu Zong-Lin, Guo Shi-Min. Research for automatic control equipment system Synthetical evaluation. Acta Automatica Sinica, 1999, 25(2): 59-63(朱宗林, 郭世民. 自动控制装置系统综合评估研究. 自动化学报, 1999, 25(2): 59-63)
|
[6]
|
Wu Qiong, Yan Li-Li. The risk evaluation research of enterprise security and protection systems. Security Science and Technology, 2010, 9(10): 10-14 (吴穹, 闫黎黎. 企业安全防范系统风险评价模式研究. 安防科技, 2010, 9(10): 10-14)
|
[7]
|
Huang Min, Yang Hong-Mei, Wang Xing-Wei. Genetic algorithm and fuzzy synthetic evaluation based risk programming for virtual enterprise. Acta Automatica Sinica, 2004, 30(3): 449-454(黄敏, 杨红梅, 王兴伟. 基于遗传算法和模糊综合评价的虚拟企业风险规划. 自动化学报, 2004, 30(3): 449-454)
|
[8]
|
Xu Tian-Kun, Liang Qing-Huai, Ren Xing-Chen. Risk assessment of metro DC750V power supply system operation based on fault tree model. Journal of Beijing Jiaotong University, 2012, (6): 57-62
|
[9]
|
Doyon L R. Stochastic modeling of facility security-systems for analytical solutions. Computers and Industrial Engineering, 1981, 5(2): 127-138
|
[10]
|
Hug G, Giampapa J A. Vulnerability assessment of AC state estimation with respect to false data injection cyber-attacks. IEEE Transactions on Smart Grid, 2012, 3(3): 1362-1370
|
[11]
|
Hicks M J, Snell M S, Sandoval J S, Potter C S. Physical protection systems cost and performance analysis: a case study. Aerospace and Electronic Systems Magazine, 1999, 14(4): 9-13
|
[12]
|
Garcia M L. The Design and Evaluation of Physical Protection Systems. Boston: Butterworth-Heinemann, 2001. 135-149
|
[13]
|
Garcia M L. Vulnerability Assessment of Physical Protection Systems. Boston: Butterworth-Heinemann, 2005. 123-144
|
[14]
|
Fischer R J, Halibozek E P, Walters D C. Introduction to Security. Boston: Butterworth-Heinemann, 2012.
|
[15]
|
Xu P, Su X, Wu J, Sun X, Zhang Y, Deng Y. Risk analysis of physical protection system based on evidence theory. Journal of Information and Computational Science, 2010, 7: 2871-2878
|
[16]
|
Xie Lei, Feng Hao, Zhang Jian-Ming. A new approach to performance assessment based on initial closed-system. Acta Automatica Sinica, 2013, 39(5): 649-653 (谢磊, 冯皓, 张建明. 一种基于初始闭环系统的性能评估方法. 自动化学报, 2013, 39(5): 649-653)
|
[17]
|
Dai J J, Hu R M, Chen J, Cai Q. Benefit-cost analysis of security systems for multiple protected assets based on information entropy. Entropy, 2012, 14(3): 571-580
|
[18]
|
Clausius R. The Mechanical Theory of Heat: with Its Applications to the Steam-Engine and to the Physical Properties of Bodies. London: John van Voorst, 1867
|
[19]
|
Shannon C E. A mathematical theory of communication. ACM SIGMOBILE Mobile Computing and Communications Review, 2001, 5(1): 3-55
|