-
1
-
-
84871903815
-
Ranking of fuzzy numbers, some recent and new formulas
-
S. Abbasbandy Ranking of fuzzy numbers, some recent and new formulas Proceedings of IFSA-EUSFLAT 2009 2009 642 646
-
(2009)
Proceedings of IFSA-EUSFLAT 2009
, pp. 642-646
-
-
Abbasbandy, S.1
-
2
-
-
84941511918
-
Fuzzy decision trees
-
J.M. Adamo Fuzzy decision trees Fuzzy Sets and Systems 4 3 1980 207 219
-
(1980)
Fuzzy Sets and Systems
, vol.4
, Issue.3
, pp. 207-219
-
-
Adamo, J.M.1
-
3
-
-
84867459885
-
Improving information security management: An analysis of ID-password usage and a new login vulnerability measure
-
Y. Bang, D.-Y. Lee, Y.-S. Bae, and J.-H. Ahnc Improving information security management: An analysis of ID-password usage and a new login vulnerability measure International Journal of Information Management 32 2012 409 418
-
(2012)
International Journal of Information Management
, vol.32
, pp. 409-418
-
-
Bang, Y.1
Lee, D.-Y.2
Bae, Y.-S.3
Ahnc, J.-H.4
-
10
-
-
84883862168
-
Model of information security risk assessment based on improved wavelet neural network
-
G. Chen, and D. Zhao Model of information security risk assessment based on improved wavelet neural network Journal of Networks 2013 8
-
(2013)
Journal of Networks
, pp. 8
-
-
Chen, G.1
Zhao, D.2
-
11
-
-
84877963990
-
Monitoring information security risks within health care
-
N.V. Deursen, W.J. Buchanan, and A. Duff Monitoring information security risks within health care Computers & Security 37 2013 31 45
-
(2013)
Computers & Security
, vol.37
, pp. 31-45
-
-
Deursen, N.V.1
Buchanan, W.J.2
Duff, A.3
-
12
-
-
0032498339
-
An introduction to fuzzy sets
-
D. Dubois, and H. Prade An introduction to fuzzy sets Clinica Chimica Acta 70 1 1998 3 29
-
(1998)
Clinica Chimica Acta
, vol.70
, Issue.1
, pp. 3-29
-
-
Dubois, D.1
Prade, H.2
-
13
-
-
80052636381
-
A systematic approach for diagnosing service failure: Service-specific FMEA and grey relational analysis approach
-
Y. Geum, Y. Cho, and Y. Park A systematic approach for diagnosing service failure: Service-specific FMEA and grey relational analysis approach Mathematical and Computer Modelling 54 2011 3126 3142
-
(2011)
Mathematical and Computer Modelling
, vol.54
, pp. 3126-3142
-
-
Geum, Y.1
Cho, Y.2
Park, Y.3
-
15
-
-
32644456297
-
-
(Working Paper) Consortium for Research on Information Security and Policy (CRISP), Stanford University Palo Alto, CA
-
K.S. Hoo How much is enough? A risk-management approach to computer security (Working Paper) 2000 Consortium for Research on Information Security and Policy (CRISP), Stanford University Palo Alto, CA
-
(2000)
How Much Is Enough? A Risk-management Approach to Computer Security
-
-
Hoo, K.S.1
-
17
-
-
84902255078
-
Information security engineering: A framework for research and practices
-
M. Li, and M. Tang Information security engineering: A framework for research and practices International Journal of Computers Communications 8 2013 578 587
-
(2013)
International Journal of Computers Communications
, vol.8
, pp. 578-587
-
-
Li, M.1
Tang, M.2
-
18
-
-
84884359507
-
Human reliability assessment for medical devices based on failure mode and effects analysis and fuzzy linguistic theory
-
Q.-L. Lin, D.-J. Wand, W.-G. Lin, and H.-C. Liu Human reliability assessment for medical devices based on failure mode and effects analysis and fuzzy linguistic theory Safety Science 62 2014 248 256
-
(2014)
Safety Science
, vol.62
, pp. 248-256
-
-
Lin, Q.-L.1
Wand, D.-J.2
Lin, W.-G.3
Liu, H.-C.4
-
19
-
-
84865045723
-
Risk evaluation in failure mode and effects analysis with extended VIKOR method under fuzzy environment
-
H.C. Liu, L. Liu, N. Liu, and L.X. Mao Risk evaluation in failure mode and effects analysis with extended VIKOR method under fuzzy environment Expert Systems with Applications 39 2012 12926 12934
-
(2012)
Expert Systems with Applications
, vol.39
, pp. 12926-12934
-
-
Liu, H.C.1
Liu, L.2
Liu, N.3
Mao, L.X.4
-
20
-
-
77957881878
-
Collaborative risk method for information security management practices: A case context within Turkey
-
S. Ozkan, and B. Karabacak Collaborative risk method for information security management practices: A case context within Turkey International Journal of Information Management 30 2010 567 572
-
(2010)
International Journal of Information Management
, vol.30
, pp. 567-572
-
-
Ozkan, S.1
Karabacak, B.2
-
21
-
-
84873297270
-
A subjective approach for ballast water risk estimation
-
E.D. Pam, K.X. Li, A. Wall, Z. Yang, and J. Wang A subjective approach for ballast water risk estimation Ocean Engineering 61 2013 66 76
-
(2013)
Ocean Engineering
, vol.61
, pp. 66-76
-
-
Pam, E.D.1
Li, K.X.2
Wall, A.3
Yang, Z.4
Wang, J.5
-
22
-
-
54949112031
-
Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements
-
S.C. Patel, J.H. Graham, and P.A.S. Ralston Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements International Journal of Information Management 28 2008 483 491
-
(2008)
International Journal of Information Management
, vol.28
, pp. 483-491
-
-
Patel, S.C.1
Graham, J.H.2
Ralston, P.A.S.3
-
25
-
-
84905837894
-
Fuzzy decision theory intelligent ways for solving real-world decision problems and for solving information costs
-
G. Della Riccia, R. Kruse, D. Dubois, H.-J. Lenz, CISM International Centre for Mechanical Sciences
-
H.J. Rommelfanger Fuzzy decision theory intelligent ways for solving real-world decision problems and for solving information costs G. Della Riccia, R. Kruse, D. Dubois, H.-J. Lenz, Planning based on decision theory Vol. 472 2003 CISM International Centre for Mechanical Sciences
-
(2003)
Planning Based on Decision Theory
, vol.472
-
-
Rommelfanger, H.J.1
-
26
-
-
0002699431
-
Discovering and disciplining computer abuse in organizations: A field study
-
D.W. Straub, and W.D. Nance Discovering and disciplining computer abuse in organizations: A field study MIS Quarterly 14 1 1990 45 60
-
(1990)
MIS Quarterly
, vol.14
, Issue.1
, pp. 45-60
-
-
Straub, D.W.1
Nance, W.D.2
-
27
-
-
56149085422
-
Generalised methodology for operational risk analysis
-
(Vol. 1)
-
J.E. Vinnem, J. Seljelid, S. Haugen, S. Sklet, and T. Aven Generalised methodology for operational risk analysis (Vol. 1) Proceedings of the European safety and reliability conference. ESREL 2007 - Risk, reliability and societal safety 2007 61 68
-
(2007)
Proceedings of the European Safety and Reliability Conference. ESREL 2007 - Risk, Reliability and Societal Safety
, pp. 61-68
-
-
Vinnem, J.E.1
Seljelid, J.2
Haugen, S.3
Sklet, S.4
Aven, T.5
-
28
-
-
84887104217
-
-
(Offshore Technology Report, 2001/073) HSE Books
-
M. Wall, H.R. Pugh, A. Reay, and J. Krol Failure modes, reliability and integrity of floating storage unit (FPSO FSU) turret and swivel systems (Offshore Technology Report, 2001/073) 2002 HSE Books
-
(2002)
Failure Modes, Reliability and Integrity of Floating Storage Unit (FPSO FSU) Turret and Swivel Systems
-
-
Wall, M.1
Pugh, H.R.2
Reay, A.3
Krol, J.4
-
29
-
-
0001160660
-
Reasonable properties for the ordering of fuzzy quantities (I)
-
DOI 10.1016/S0165-0114(99)00062-7, PII S0165011499000627
-
Z. Wang, and E.E. Kerre Reasonable properties for the ordering of fuzzy quantities (I) Fuzzy Sets and Systems 118 3 2001 375 385 (Pubitemid 33592816)
-
(2001)
Fuzzy Sets and Systems
, vol.118
, Issue.3
, pp. 375-385
-
-
Wang, X.1
Kerre, E.E.2
-
30
-
-
79958839771
-
Factors influencing information security management in small and medium-sized enterprises: A case study from Turkey
-
E.Y. Yildirim, G. Akalp, S. Aytac, and N. Bayram Factors influencing information security management in small and medium-sized enterprises: A case study from Turkey International Journal of Information Management 31 2011 360 365
-
(2011)
International Journal of Information Management
, vol.31
, pp. 360-365
-
-
Yildirim, E.Y.1
Akalp, G.2
Aytac, S.3
Bayram, N.4
-
32
-
-
0016459349
-
The concept of a linguistic variable and its application to approximate reasoning - I
-
L.A. Zadeh The concept of a linguistic variable and its application to approximate reasoning - I Information Sciences 8 3 1975 199 249
-
(1975)
Information Sciences
, vol.8
, Issue.3
, pp. 199-249
-
-
Zadeh, L.A.1
|