共 50 条
- [1] Application of Fuzzy Logic in Computer Security and Forensics [J]. COMPUTATIONAL INTELLIGENCE FOR PRIVACY AND SECURITY, 2012, 394 : 35 - +
- [3] Performance analysis of medical image security using steganography based on fuzzy logic [J]. Cluster Computing, 2019, 22 : 3285 - 3291
- [4] Performance analysis of medical image security using steganography based on fuzzy logic [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (02): : S3285 - S3291
- [5] Fuzzy risk analysis of computer security threats [J]. 2005 International Symposium on Computer Science and Technology, Proceedings, 2005, : 1 - 8
- [7] Keystroke Identifier Using Fuzzy Logic to Increase Password Security [J]. 2020 21ST INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT), 2020,
- [8] Multicriteria Security System Performance Assessment Using Fuzzy Logic [J]. JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2007, 4 (04): : 356 - 376
- [9] Fault-tree Analysis on Computer Security System Using Intuitionistic Fuzzy Sets [J]. ICCSSE 2009: PROCEEDINGS OF 2009 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2009, : 459 - 463
- [10] Computer aided selection of cutting parameters by using fuzzy logic [J]. COMPUTATIONAL INTELLIGENCE: THEORY AND APPLICATIONS, PROCEEDINGS, 2001, 2206 : 854 - 870