Fuzzy Multi-Criteria Decision-Making for Information Security Risk Assessment
暂无分享,去创建一个
Michel Dagenais | Mehdi Shajari | Alireza Shameli-Sendi | Masoume Jabbarifar | M. Hassanabadi | M. Dagenais | M. Shajari | Alireza Shameli-Sendi | M. Hassanabadi | Masoume Jabbarifar
[1] Ying-Ming Wang,et al. Fuzzy TOPSIS method based on alpha level sets with an application to bridge risk assessment , 2006, Expert Syst. Appl..
[2] A. Kaufmann,et al. Introduction to fuzzy arithmetic : theory and applications , 1986 .
[3] Michel Dagenais,et al. Intrusion Response Systems: Survey and Taxonomy , 2012 .
[4] Chi-Chun Lo,et al. Evaluation of information security related risks of an organization: the application of the multicriteria decision-making method , 2003, IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings..
[5] Svein J. Knapskog,et al. Fuzzy Online Risk Assessment for Distributed Intrusion Prediction and Prevention Systems , 2008, Tenth International Conference on Computer Modeling and Simulation (uksim 2008).
[6] Shuo-Yan Chou,et al. A fuzzy simple additive weighting system under group decision-making for facility location selection with objective/subjective attributes , 2008, Eur. J. Oper. Res..
[7] Ching-Lai Hwang,et al. Fuzzy Multiple Attribute Decision Making - Methods and Applications , 1992, Lecture Notes in Economics and Mathematical Systems.
[8] G. Stoneburner,et al. Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .
[9] C. Eastman. Introduction to fuzzy arithmetic: Theory and applications , 1987 .
[10] Michel Dagenais,et al. FEMRA: Fuzzy Expert Model for Risk Assessment , 2010, 2010 Fifth International Conference on Internet Monitoring and Protection.
[11] Jing-Hong Wang,et al. Fuzzy Risk Assessment of the Network Security , 2006, 2006 International Conference on Machine Learning and Cybernetics.
[12] S. H. Ghyym. A semi-linguistic fuzzy approach to multi-actor decision-making: Application to aggregation of experts' judgments , 1999 .
[13] Jing-Shing Yao,et al. Ranking fuzzy numbers based on decomposition principle and signed distance , 2000, Fuzzy Sets Syst..
[14] Gary Stoneburner,et al. SP 800-30. Risk Management Guide for Information Technology Systems , 2002 .
[15] Jing-Shing Yao,et al. Inventory without backorder with fuzzy total cost and fuzzy storing cost defuzzified by centroid and signed distance , 2003, Eur. J. Oper. Res..
[16] Douglas Landoll. The Security Risk Assessment Handbook , 2005 .
[17] Chen-Tung Chen,et al. A fuzzy approach to select the location of the distribution center , 2001, Fuzzy Sets Syst..