共 50 条
- [31] A Logic-based Approach to Network Security Risk Assessment [J]. 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL III, 2009, : 9 - +
- [32] Information Resource Management Technology Based on Fuzzy Logic [J]. LECTURE NOTES IN COMPUTATIONAL INTELLIGENCE AND DECISION MAKING (ISDMCI 2020), 2020, 1246 : 164 - 182
- [33] A Fuzzy Logic-based Information Security Control Assessment for Organizations [J]. 2012 IEEE CONFERENCE ON OPEN SYSTEMS (ICOS 2012), 2012, : 190 - 195
- [34] A logic-based approach to semantic information extraction [J]. ICEIS 2006: PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: ARTIFICIAL INTELLIGENCE AND DECISION SUPPORT SYSTEMS, 2006, : 115 - 123
- [35] A parallel control approach to optimization of information security management measures [J]. Zidonghua Xuebao/Acta Automatica Sinica, 2011, 37 (11): : 1351 - 1355
- [37] The EDITH approach: The management of authorisations and security in healthcare information systems [J]. TOWARDS SECURITY IN MEDICAL TELEMATICS: LEGAL AND TECHNICAL ASPECTS, 1996, 27 : 200 - 213
- [39] Implementing a risk management approach for optimizing information security systems [J]. BUSINESS TRANSFORMATION THROUGH INNOVATION AND KNOWLEDGE MANAGEMENT: AN ACADEMIC PERSPECTIVE, VOLS 1-2, 2010, : 304 - 309
- [40] Experiential operations: An information-based operational management approach for managing national security operations [J]. ECIW 2007: PROCEEDINGS OF THE 6TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 291 - 302