Fuzzy Logic Based Method for Network Information Security Risk Assessment
暂无分享,去创建一个
[1] W. Pedrycz,et al. A fuzzy extension of Saaty's priority theory , 1983 .
[2] Lotfi A. Zadeh,et al. Fuzzy Sets , 1996, Inf. Control..
[3] Zili Zhang,et al. Fuzzy Logic Based Metric in Software Testing , 2006, AMT.
[4] Lotfi A. Zadeh,et al. Commonsense reasoning based on fuzzy logic , 1986, WSC '86.
[5] Lothar Philipps. Just decisions using multiple criteria or: who gets the Porsche? An application of Ronald R. Yager's Fuzzy Logic method , 1995, ICAIL '95.
[6] Minqiang Li,et al. An information systems security risk assessment model under uncertain environment , 2011, Appl. Soft Comput..
[7] Chen-Tung Chen,et al. A fuzzy approach to select the location of the distribution center , 2001, Fuzzy Sets Syst..
[8] Ching-Lai Hwang,et al. Fuzzy Multiple Attribute Decision Making - Methods and Applications , 1992, Lecture Notes in Economics and Mathematical Systems.
[9] Ching-Lai Hwang,et al. Multiple Attribute Decision Making: Methods and Applications - A State-of-the-Art Survey , 1981, Lecture Notes in Economics and Mathematical Systems.
[10] D. Dubois,et al. Operations on fuzzy numbers , 1978 .
[11] Omar F. El-Gayar. Application of fuzzy logic to multiple criteria decision making in aquacultural planning , 2004, SAC '04.