Evaluating information assurance strategies
暂无分享,去创建一个
[1] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[2] David S Alberts,et al. Defensive Information Warfare , 1996 .
[3] Christine C. Davis. A Methodology for Evaluating and Enhancing C4I Networks. , 1999 .
[4] F. B. Vernadat,et al. Decisions with Multiple Objectives: Preferences and Value Tradeoffs , 1994 .
[5] Craig W. Kirkwood,et al. Strategic decision making : multiobjective decision analysis with spreadsheets : instructor's manual , 1996 .
[6] Richard F. Deckro,et al. Measures of Merit For Offensive Information Operations Courses of Action , 2000 .
[7] Richard Mesic,et al. Securing the U.S. Defense Information Infrastructure: A Proposed Approach , 1999 .
[8] James D. McKeen,et al. Assessing the Value of Information Technology: the Leverage Effect , 1997, ECIS.
[9] Ralph L. Keeney,et al. Using Values in Operations Research , 1994, Oper. Res..
[10] Ralph L. Keeney,et al. Value-Focused Thinking: A Path to Creative Decisionmaking , 1992 .
[11] C. Kirkwood. Strategic Decision Making , 1996 .
[12] R. Clemen,et al. Soft Computing , 2002 .
[13] R. L. Keeney,et al. Decisions with Multiple Objectives: Preferences and Value Trade-Offs , 1977, IEEE Transactions on Systems, Man, and Cybernetics.