Chance-Constrained Programming Method by Constraints Aggregation for Social Consensus Making on IT Risk Countermeasure
暂无分享,去创建一个
[1] Thomas Peltier,et al. Information Security Risk Analysis: A Pedagogic Model Based on a Teaching Hospital , 2006 .
[2] Linda G. Wallace,et al. Is Information Security Under Control?: Investigating Quality in Information Security Management , 2007, IEEE Security & Privacy.
[3] A. Charnes,et al. Chance-Constrained Programming , 1959 .
[4] Alexander Shapiro,et al. Sample Average Approximation Method for Chance Constrained Programming: Theory and Applications , 2009, J. Optimization Theory and Applications.
[5] Ryoichi Sasaki,et al. Application of “Multiple Risk Communicator“ to the Personal Information Leakage Problem , 2008 .
[6] Giuseppe Carlo Calafiore,et al. Uncertain convex programs: randomized solutions and confidence levels , 2005, Math. Program..
[7] Masaki Samejima,et al. Approximation method for chance-constrained programming of social consensus formation concerning IT risk countermeasure , 2012, 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
[8] D. Vose. Risk Analysis: A Quantitative Guide , 2000 .
[9] อนิรุธ สืบสิงห์,et al. Data Mining Practical Machine Learning Tools and Techniques , 2014 .
[10] G. Nemhauser,et al. Integer Programming , 2020 .