1. bookVolume 9 (2018): Edition 2 (July 2018)
Détails du magazine
License
Format
Magazine
eISSN
1847-9375
Première parution
19 Sep 2012
Périodicité
2 fois par an
Langues
Anglais
Accès libre

Risk-Based Decision Support Model for Offshore Installations

Publié en ligne: 28 Jul 2018
Volume & Edition: Volume 9 (2018) - Edition 2 (July 2018)
Pages: 55 - 68
Reçu: 01 Dec 2017
Accepté: 08 Feb 2018
Détails du magazine
License
Format
Magazine
eISSN
1847-9375
Première parution
19 Sep 2012
Périodicité
2 fois par an
Langues
Anglais

1. Bohanec, M. (2015), "DEXi: Program for Multi-Attribute Decision Making. User's Manual version 5.00 IJS DP-11897", available at: http://kt.ijs.si/MarkoBohanec/DEXi/html/DEXiDoc.htm (14 November 2017).Search in Google Scholar

2. Bohanec, M. (2017), "DEXi: A Program for Multi-Attribute Decision Making", available at: http://kt.ijs.si/MarkoBohanec/dexi.html (14 November 2017).Search in Google Scholar

3. Bohanec, M., Delibasic, B. (2015), "Data-Mining and Expert Models for Predicting Injury Risk in Ski Resorts", in Delibasic, B. et al. (Eds.), Decision Support Systems V - Big Data Analytics for Decision Making, Springer, Cham, pp. 46-60.10.1007/978-3-319-18533-0_5Search in Google Scholar

4. Bohanec, M., Znidarsic, M., Rajkovic, V., Bratko, I., Zupan, B. (2013), "DEX Methodology: Three Decades of Qualitative Multi-Attribute Modeling", Informatica, Vol. 37, No. 1, pp. 49-54.Search in Google Scholar

5. Chen, Y., Okudan, G. E., Riley, D. R. (2010), "Decision support for construction method selection in concrete buildings: Prefabrication adoption and optimization", Automation in Construction, Vol. 19, No. 6, pp. 665-675.10.1016/j.autcon.2010.02.011Search in Google Scholar

6. Erdogan, G., Refsdal, A. (2018), "A Method for Developing Qualitative Security Risk Assessment Algorithms", in Cuppens, N. et al. (Eds.), Risks and Security of Internet and Systems, Springer, Cham, pp. 244-259.10.1007/978-3-319-76687-4_17Search in Google Scholar

7. Fishburn, P. C. (1967), "Conjoint measurement in utility theory with incomplete product sets", Journal of Mathematical Psychology, Vol. 4, No. 1, pp. 104-119.10.1016/0022-2496(67)90043-0Search in Google Scholar

8. Fishburn, P. C., Keeney, R. L. (1974), "Seven independence concepts and continuous multiattribute utility functions", Journal of Mathematical Psychology, Vol. 11, No. 3, pp. 294-327.10.1016/0022-2496(74)90024-8Search in Google Scholar

9. Keeney, R. L. (1977), "The art of assessing multiattribute utility functions", Organizational Behavior and Human Performance, Vol. 19, No. 2, pp. 267-310.10.1016/0030-5073(77)90065-4Search in Google Scholar

10. Konidari, P., Mavrakis, D. (2007), "A multi-criteria evaluation method for climate change mitigation policy instruments", Energy Policy, Vol. 35, No. 12, pp. 6235-6257.10.1016/j.enpol.2007.07.007Search in Google Scholar

11. Lund, M. S., Solhaug, B., Stølen, K. (2011), “Model-Driven Risk Analysis: The CORAS Approach”, Springer, Berlin, Heidelberg.10.1007/978-3-642-12323-8Search in Google Scholar

12. Omercevic, D., Zupancic, M., Bohanec, M., Kastelic, T. (2008), "Intelligent response to highway traffic situations and road incidents", in Transport Research Arena Europe 2008, Ljubljana, pp. 21-24.Search in Google Scholar

13. Refsdal, A., Erdogan, G. (2017), "D3.4 Cyber risk modelling language and guidelines", available at: https://www.cyberwiser.eu/ (14 November 2017).Search in Google Scholar

14. Saaty, T. L. (1980), “The analytic hierarchy process: planning, priority setting, resources allocation”, McGraw-Hill, New York.Search in Google Scholar

15. Saaty, T. L. (2008), "Decision making with the analytic hierarchy process", International Journal of Services Sciences, Vol. 1, No. 1, pp. 83-98.10.1504/IJSSCI.2008.017590Search in Google Scholar

16. Velasquez, M., Hester, P. T. (2013), "An analysis of multi-criteria decision making methods", International Journal of Operations Research, Vol. 10, No. 2, pp. 56-66.Search in Google Scholar

17. WISER (2017), "Wide-Impact cyber SEcurity Risk framework", available at: https://www.cyberwiser.eu/ (14 November 2017).Search in Google Scholar

Articles recommandés par Trend MD

Planifiez votre conférence à distance avec Sciendo