A Performance Analysis Model for the Training and Education of Information Security Talents
暂无分享,去创建一个
[1] Jia Xu,et al. Application of a Genetic Algorithm with Random Crossover and Dynamic Mutation on the Travelling Salesman Problem , 2018 .
[2] Atanu Das,et al. Educational Website Ranking Using Fuzzy Logic and K-Means Clustering Based Hybrid Method , 2019, Ingénierie des Systèmes d Inf..
[3] Hwai-En Tseng,et al. A Block-based genetic algorithm for disassembly sequence planning , 2018, Expert Syst. Appl..
[4] Angraini,et al. Information Security Policy Compliance: Systematic Literature Review , 2019, Procedia Computer Science.
[5] InduShobha N. Chengalur-Smith,et al. Evaluating the effectiveness of learner controlled information security training , 2019, Computers & security.
[6] Tal Melamed. An active man-in-the-middle attack on bluetooth smart devices , 2018 .
[7] Wen-Hsiang Wu,et al. Applying hierarchical grey relation clustering analysis to geographical information systems - A case study of the hospitals in Taipei City , 2012, Expert Syst. Appl..
[8] Mariia Rochikashvili,et al. Multi-criteria Decision-making for Sustainable Wall Paints and Coatings Using Analytic Hierarchy Process , 2016 .
[9] Lucía Melián-Alzola,et al. Information technology capability and organisational agility: A study in the Canary Islands hotel industry , 2020, Tourism Management Perspectives.
[10] Marco A. Moreno-Armendáriz,et al. An Analytical Hierarchy Process to manage water quality in white fish (Chirostoma estor estor) intensive culture , 2019, Comput. Electron. Agric..
[11] Dobroslav Grygar,et al. An Efficient Adjustment of Genetic Algorithm for Pareto Front Determination , 2019 .
[12] Ali Eydgahi,et al. Evaluating the explanatory power of theoretical frameworks on intention to comply with information security policies in higher education , 2019, Comput. Secur..
[13] Saudah Sofian,et al. The impact of enterprise risk management on competitive advantage by moderating role of information technology , 2019, Comput. Stand. Interfaces.
[14] Seniye Ümit Oktay Fırat,et al. Evaluation of the development level of provinces by grey cluster analysis , 2019 .
[15] Gurcan Comert,et al. Short-term freeway traffic parameter prediction: Application of grey system theory models , 2016, Expert Syst. Appl..
[16] Ahmed Tealab,et al. Time series forecasting using artificial neural networks methodologies: A systematic review , 2018, Future Computing and Informatics Journal.
[17] Muammer Kaya,et al. Leaching method selection for Caldag lateritic nickel ore by the analytic hierarchy process (AHP) , 2017 .
[18] P. Loesche,et al. Estimating the true extent of gender differences in scholastic achievement: A neural network approach , 2019, Intelligence.
[19] R. Rajesh,et al. Measuring the barriers to resilience in manufacturing supply chains using Grey Clustering and VIKOR approaches , 2018, Measurement.
[20] Ivano Bongiovanni,et al. The least secure places in the universe? A systematic literature review on information security management in higher education , 2019, Comput. Secur..
[21] J. Caballero,et al. The role of self-efficacy, flexibility, and gender in pharmacy students' health information technology readiness. , 2019, Currents in pharmacy teaching & learning.
[22] Mita Nasipuri,et al. Reshaping inputs for convolutional neural network: Some common and uncommon methods , 2019, Pattern Recognit..
[23] Murat Koyuncu,et al. Understanding key skills for information security managers , 2018, Int. J. Inf. Manag..