Towards a Cybersecurity Investment Assessment method using Primitive Cognitive Network Process
暂无分享,去创建一个
[1] Jian Liu,et al. Risk assessment of cyber attacks in ECPS based on attack tree and AHP , 2016, 2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD).
[2] Kevin Kam Fung Yuen,et al. Combining compound linguistic ordinal scale and cognitive pairwise comparison in the rectified fuzzy TOPSIS method for group decision making , 2013, Fuzzy Optimization and Decision Making.
[3] Kevin Kam Fung Yuen,et al. Important Facts and Observations about Pairwise Comparisons (the special issue edition) , 2016, Fundam. Informaticae.
[4] Mohamed Cheriet,et al. Taxonomy of information security risk assessment (ISRA) , 2016, Comput. Secur..
[5] Kevin Jones,et al. A review of cyber security risk assessment methods for SCADA systems , 2016, Comput. Secur..
[6] Kevin Kam Fung Yuen,et al. Pairwise opposite matrix and its cognitive prioritization operators: comparisons with pairwise reciprocal matrix and analytic prioritization operators , 2012, J. Oper. Res. Soc..
[7] David Hutchison,et al. A survey of cyber security management in industrial control systems , 2015, Int. J. Crit. Infrastructure Prot..
[8] Lawrence Bodin,et al. Evaluating information security investments using the analytic hierarchy process , 2005, CACM.
[9] Kevin Kam Fung Yuen,et al. Cognitive network process with fuzzy soft computing technique in collective decision aiding , 2009 .