{"title":"进行信息安全风险分析的模糊工具","authors":"Jirí Bartos, Bogdan Walek, C. Klimeš, R. Farana","doi":"10.1109/CARPATHIANCC.2014.6843564","DOIUrl":null,"url":null,"abstract":"The following article proposes fuzzy tool for processing risk analysis in the area of information security. The paper reviews today's approaches (qualitative and quantitative methodologies) and together with already published results proposes a fuzzy tool to support our novel approach. In this paper the fuzzy tool itself is proposed and also every main part of this tool is described. The proposed fuzzy tool is connected with expert system and methodology which is the part of more complex approach to decision making process. The knowledge base of expert system is created based on user input values and the knowledge of the problem domain. The proposed fuzzy tool is demonstrated on examples and problems from the area of information security.","PeriodicalId":105920,"journal":{"name":"Proceedings of the 2014 15th International Carpathian Control Conference (ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Fuzzy tool for conducting information security risk analysis\",\"authors\":\"Jirí Bartos, Bogdan Walek, C. Klimeš, R. Farana\",\"doi\":\"10.1109/CARPATHIANCC.2014.6843564\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The following article proposes fuzzy tool for processing risk analysis in the area of information security. The paper reviews today's approaches (qualitative and quantitative methodologies) and together with already published results proposes a fuzzy tool to support our novel approach. In this paper the fuzzy tool itself is proposed and also every main part of this tool is described. The proposed fuzzy tool is connected with expert system and methodology which is the part of more complex approach to decision making process. The knowledge base of expert system is created based on user input values and the knowledge of the problem domain. The proposed fuzzy tool is demonstrated on examples and problems from the area of information security.\",\"PeriodicalId\":105920,\"journal\":{\"name\":\"Proceedings of the 2014 15th International Carpathian Control Conference (ICCC)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-05-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2014 15th International Carpathian Control Conference (ICCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CARPATHIANCC.2014.6843564\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2014 15th International Carpathian Control Conference (ICCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CARPATHIANCC.2014.6843564","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Fuzzy tool for conducting information security risk analysis
The following article proposes fuzzy tool for processing risk analysis in the area of information security. The paper reviews today's approaches (qualitative and quantitative methodologies) and together with already published results proposes a fuzzy tool to support our novel approach. In this paper the fuzzy tool itself is proposed and also every main part of this tool is described. The proposed fuzzy tool is connected with expert system and methodology which is the part of more complex approach to decision making process. The knowledge base of expert system is created based on user input values and the knowledge of the problem domain. The proposed fuzzy tool is demonstrated on examples and problems from the area of information security.