{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T04:51:26Z","timestamp":1749099086612,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/ieem.2015.7385659","type":"proceedings-article","created":{"date-parts":[[2016,5,7]],"date-time":"2016-05-07T05:44:45Z","timestamp":1462599885000},"page":"315-319","source":"Crossref","is-referenced-by-count":2,"title":["Information security evaluation of system based on Bayesian network"],"prefix":"10.1109","author":[{"given":"Z. Q.","family":"Cai","sequence":"first","affiliation":[]},{"given":"J. B.","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Y.","family":"Li","sequence":"additional","affiliation":[]},{"given":"S. B.","family":"Si","sequence":"additional","affiliation":[]},{"given":"M. N.","family":"Ni","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"493","article-title":"An information system security evaluation model based on AHP and GRAP","author":"xu","year":"2009","journal-title":"WISM 2009 International Conference on IEEE"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1042091.1042094"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4730(01)00017-0"},{"key":"ref6","first-page":"322","article-title":"A large-scale information system security risk assessment method based on analytic hierarchy process","volume":"30","author":"li","year":"2013","journal-title":"Computer Applications and Software"},{"key":"ref11","first-page":"417","article-title":"Fuzzy linguistic multiple attribute decision making model based on Bayesian network","volume":"31","author":"wang","year":"2012","journal-title":"Mechanical Science and Technology for Aerospace Engineering"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2010.153"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"29","DOI":"10.5121\/ijcsit.2014.6103","article-title":"Information Security Risk Analysis Methods and Research Trends: AHP and Fuzzy Comprehensive Method","volume":"6","author":"lee","year":"2014","journal-title":"International Journal of Computer Science & Information Technology"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2011.145"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/0377-2217(90)90057-I"},{"journal-title":"Introduction to Information Security","year":"2012","author":"he","key":"ref9"},{"journal-title":"Information Security Risk Assessment","year":"2004","author":"wang","key":"ref1"}],"event":{"name":"2015 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM)","start":{"date-parts":[[2015,12,6]]},"location":"Singapore, Singapore","end":{"date-parts":[[2015,12,9]]}},"container-title":["2015 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7378213\/7385591\/07385659.pdf?arnumber=7385659","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T09:02:19Z","timestamp":1498294939000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7385659\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/ieem.2015.7385659","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}