-
2
-
-
0242653680
-
Use of genetic algorithms to solve production and operations management problems: A review
-
H. Aytug, M. Khouja, and F.E. Vergara Use of genetic algorithms to solve production and operations management problems: a review International Journal of Production Research 41 2003 3955 4099
-
(2003)
International Journal of Production Research
, vol.41
, pp. 3955-4099
-
-
Aytug, H.1
Khouja, M.2
Vergara, F.E.3
-
3
-
-
34848920878
-
Necessary measures: Metric-driven information security risk assessment and decision making
-
DOI 10.1145/1290958.1290969, 1290969
-
W.H. Baker, L.P. Rees, and P.S. Tippett Necessary measures: metric-driven information security risk assessment and decision making Communications of the ACM 50 10 October 2007 101 106 (Pubitemid 47505006)
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 101-106
-
-
Baker, W.H.1
Rees, L.P.2
Tippett, P.S.3
-
4
-
-
33847748221
-
Is information security under control?
-
W.H. Baker, and L. Wallace Is information security under control? IEEE Security & Privacy 2007 24 32 January/February 2007
-
(2007)
IEEE Security & Privacy
, pp. 24-32
-
-
Baker, W.H.1
Wallace, L.2
-
6
-
-
34848836808
-
The State of Information Security 2003
-
S. Berinato The State of Information Security 2003 CIO Magazine 17 2 2003 1 3
-
(2003)
CIO Magazine
, vol.17
, Issue.2
, pp. 1-3
-
-
Berinato, S.1
-
7
-
-
35248812867
-
Using CP-nets as a guide for countermeasure selection
-
DOI 10.1145/1244002.1244073, Proceedings of the 2007 ACM Symposium on Applied Computing
-
S. Bistarelli, F. Fioravanti, and P. Peretti Using CP-nets as a guide for countermeasure selection Proceedings of the 2007 ACM Symposium on Applied Computing (Seoul, Korea, 2007) 2007 300 304 (Pubitemid 47568302)
-
(2007)
Proceedings of the ACM Symposium on Applied Computing
, pp. 300-304
-
-
Bistarelli, S.1
Fioravanti, F.2
Peretti, P.3
-
9
-
-
33144462443
-
Mission Oriented risk and Design Analysis of critical information systems
-
D.L. Buckshaw, G.S. Parnell, W.L. Unkenholz, D.L. Parks, J.M. Wallner, and O.S. Saydjari Mission oriented risk and design analysis of critical information systems Military Operations Research 10 2 2005 19 38 (Pubitemid 43264848)
-
(2005)
Military Operations Research
, vol.10
, Issue.2
, pp. 19-38
-
-
Buckshaw, D.L.1
Parnell, G.S.2
Unkenholz, W.L.3
Parks, D.L.4
Wallner, J.M.5
Saydjari, O.S.6
-
10
-
-
67649529385
-
Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems
-
H. Cavusoglu, S. Raghunathan, and H. Cavusoglu Configuration of and interaction between information security technologies: the case of firewalls and intrusion detection systems Information Systems Research 20 2009 198 217
-
(2009)
Information Systems Research
, vol.20
, pp. 198-217
-
-
Cavusoglu, H.1
Raghunathan, S.2
Cavusoglu, H.3
-
11
-
-
12944254986
-
Fuzzy value-at-risk: Accounting for market liquidity
-
U. Cherubini, and G. Della Lunga Fuzzy value-at-risk: accounting for market liquidity Economic Notes by Banca Monte dei Pascha di Siena SpA 30 2 2001 293 312 (Pubitemid 33755896)
-
(2001)
Economic Notes
, vol.30
, Issue.2
, pp. 293-312
-
-
Cherubini, U.1
Della Lunga, G.2
-
12
-
-
71249129470
-
Managing supply chain risk and disruption from IT security incidents
-
J.K. Deane, C.T. Ragsdale, T.R. Rakes, and L.P. Rees Managing supply chain risk and disruption from IT security incidents Operations Management Research 2 1 2009 4 12
-
(2009)
Operations Management Research
, vol.2
, Issue.1
, pp. 4-12
-
-
Deane, J.K.1
Ragsdale, C.T.2
Rakes, T.R.3
Rees, L.P.4
-
13
-
-
16444375607
-
Fuzzy weighted averages and implementation of the extension principle
-
W.M. Dong, and F.S. Wong Fuzzy weighted averages and implementation of the extension principle Fuzzy Sets and Systems 21 1987 183 199
-
(1987)
Fuzzy Sets and Systems
, vol.21
, pp. 183-199
-
-
Dong, W.M.1
Wong, F.S.2
-
19
-
-
46749158341
-
DIPS: A framework for distributed intrusion prediction and prevention using hidden Markov models and online fuzzy risk assessment
-
K. Haslum, A. Abraham, and S. Knapskog DIPS: a framework for distributed intrusion prediction and prevention using hidden Markov models and online fuzzy risk assessment Third International Symposium on Information Assurance and Security (Manchester, U.K., 2007) 2007 183 188
-
(2007)
Third International Symposium on Information Assurance and Security (Manchester, U.K., 2007)
, pp. 183-188
-
-
Haslum, K.1
Abraham, A.2
Knapskog, S.3
-
21
-
-
79955901491
-
-
IDC, Worldwide and U.S. security services 2006-2010 forecast (accessed December 22, 2006)
-
IDC, Worldwide and U.S. security services 2006-2010 forecast, http://www.idc.com/getdoc.jsp?containerId=200926 (accessed December 22, 2006).
-
-
-
-
22
-
-
0035247535
-
Centroid of a type-2 fuzzy set
-
DOI 10.1016/S0020-0255(01)00069-X, PII S002002550100069X
-
N. Karnik, and J. Mendel Centroid of a type-2 fuzzy set Information Sciences 132 2001 195 220 (Pubitemid 32273094)
-
(2001)
Information Sciences
, vol.132
, Issue.1-4
, pp. 195-220
-
-
Karnik, N.N.1
Mendel, J.M.2
-
23
-
-
36849072444
-
Quantitative risk-based analysis for military counterterrorism systems
-
DOI 10.1002/sys.20075
-
E. Kujawski, and G.A. Miller Quantitative risk-based analysis for military counterterrorism systems Systems Engineering 10 4 2007 273 289 (Pubitemid 350229691)
-
(2007)
Systems Engineering
, vol.10
, Issue.4
, pp. 273-289
-
-
Kujawski, E.1
Miller, G.A.2
-
24
-
-
4544317814
-
A fuzzy decision support systems for strategic portfolio management
-
C. Lin, and P. Hsieh A fuzzy decision support systems for strategic portfolio management Decision Support Systems 38 2004 383 398
-
(2004)
Decision Support Systems
, vol.38
, pp. 383-398
-
-
Lin, C.1
Hsieh, P.2
-
25
-
-
79955911873
-
-
2010 Lohr, Steve, The New York Times, Companies Fight Endless War Against Computer Attacks, January 18 Accessed February 14
-
Lohr, Steve, The New York Times, Companies Fight Endless War Against Computer Attacks, January 18, 2010, http://www.nytimes.com/2010/01/18/ technology/internet/18defend.html, accessed February 14, 2010.
-
(2010)
-
-
-
26
-
-
13944255907
-
Fuzzy decision support system for risk analysis in e-commerce development
-
DOI 10.1016/j.dss.2003.12.002, PII S0167923604000272
-
E. Ngai, and F. Wat Fuzzy decision support system for risk analysis in E-commerce development Decision Support Systems 40 2005 235 255 (Pubitemid 40266063)
-
(2005)
Decision Support Systems
, vol.40
, Issue.2
, pp. 235-255
-
-
Ngai, E.W.T.1
Wat, F.K.T.2
-
27
-
-
0026982010
-
A defuzzification strategy for a fuzzy logic controller employing prohibitive information in command formulation
-
N. Pfluger, J. Yen, and R. Langari A defuzzification strategy for a fuzzy controller employing prohibitive information in command formulation Proceedings of the IEEE International Conference on Fuzzy Systems (San Diego, CA, 1992) 1992 717 723 (Pubitemid 23590980)
-
(1992)
IEEE Int Conf Fuzzy Syst FUZZ-IEEE 92
, pp. 717-723
-
-
Pfluger Nathan1
Yen John2
Langari Reza3
-
28
-
-
79955912393
-
-
PITAC (President's Information Technology Advisory Council, National Coordination Office for Information Technology Research and Development, Arlington, VA, 2005)
-
PITAC, Report to the President - Cyber Security: A Crisis of Prioritization (President's Information Technology Advisory Council, National Coordination Office for Information Technology Research and Development, Arlington, VA, 2005).
-
Report to the President - Cyber Security: A Crisis of Prioritization
-
-
-
29
-
-
70449558168
-
Modeling an intrusion detection system using data mining and genetic algorithms based on fuzzy logic
-
G.V. Prasad, Y. Dhanalakshmi, V.V. Kumar, and I.R. Babu Modeling an intrusion detection system using data mining and genetic algorithms based on fuzzy logic International Journal of Computer Science and Network Security 8 7 2008 319 325
-
(2008)
International Journal of Computer Science and Network Security
, vol.8
, Issue.7
, pp. 319-325
-
-
Prasad, G.V.1
Dhanalakshmi, Y.2
Kumar, V.V.3
Babu, I.R.4
-
31
-
-
79955925668
-
Fuzzy representations of information-technology security threat-countermeasure effectiveness
-
T.R. Rakes, L.P. Rees, and J.K. Deane Fuzzy representations of information-technology security threat-countermeasure effectiveness Proceedings of the SEINFORMS Meeting (Myrtle Beach, SC, 2006) 2006 428 437
-
(2006)
Proceedings of the SEINFORMS Meeting (Myrtle Beach, SC, 2006)
, pp. 428-437
-
-
Rakes, T.R.1
Rees, L.P.2
Deane, J.K.3
-
33
-
-
0031076949
-
Selection of appropriate defuzzification methods using application specific properties
-
PII S106367069700043X
-
T. Runkler Selection of appropriate defuzzification methods using application specific properties IEEE Transactions on Fuzzy Systems 5 1 1997 72 79 (Pubitemid 127772312)
-
(1997)
IEEE Transactions on Fuzzy Systems
, vol.5
, Issue.1
, pp. 72-79
-
-
Runkler, T.A.1
-
36
-
-
33750448993
-
A fuzzy decision support system for IT Service Continuity threat assessment
-
DOI 10.1016/j.dss.2006.05.002, PII S0167923606000716
-
B. Van de Walle, and A. Rutkowski A fuzzy decision support system for IT service continuity threat assessment Decision Support Systems 42 2006 1931 1943 (Pubitemid 44649338)
-
(2006)
Decision Support Systems
, vol.42
, Issue.3
, pp. 1931-1943
-
-
Van De Walle, B.1
Rutkowski, A.-F.2
-
38
-
-
0015558134
-
Outline of a new approach to the analysis of complex systems and decision processes
-
L.A. Zadeh Outline of a new approach to the analysis of complex systems and decision processes Transactions on Systems, Man and Cybernetics, SMC-3 1973 28 44
-
(1973)
Transactions on Systems, Man and Cybernetics, SMC-3
, pp. 28-44
-
-
Zadeh, L.A.1
-
39
-
-
0016458950
-
The concept of a linguistic variable and its application to approximate reasoning
-
L.A. Zadeh The concept of a linguistic variable and its application to approximate reasoning Information Science 8 1975 199 249
-
(1975)
Information Science
, vol.8
, pp. 199-249
-
-
Zadeh, L.A.1
-
40
-
-
49349133217
-
Fuzzy sets as a basis for a theory of possibility
-
L.A. Zadeh Fuzzy sets as a basis for a theory of possibility Fuzzy Sets and Systems 1 1978 3 28
-
(1978)
Fuzzy Sets and Systems
, vol.1
, pp. 3-28
-
-
Zadeh, L.A.1
-
41
-
-
0001096516
-
A theory of approximate reasoning
-
L.A. Zadeh A theory of approximate reasoning Machine Intelligence 9 1979 149 194
-
(1979)
Machine Intelligence
, vol.9
, pp. 149-194
-
-
Zadeh, L.A.1
-
42
-
-
28444457356
-
Using Fuzzy logic and entropy theory to risk assessment of the information security
-
2005 International Conference on Machine Learning and Cybernetics, ICMLC 2005
-
D. Zhao, J. Wang, J. Wu, and J. Ma Using fuzzy logic and entropy theory to risk assessment of the information security Proceedings of the Fourth International Conference on Machine Learning and Cybernetics, (Guangzhou, China, 2005) 2005 2448 2453 (Pubitemid 41734335)
-
(2005)
2005 International Conference on Machine Learning and Cybernetics, ICMLC 2005
, pp. 2448-2453
-
-
Zhao, D.-M.1
Wang, J.-H.2
Jing, W.U.3
Ma, J.-F.4
|