INFORMAZIONI SU QUESTO ARTICOLO

Cita

1. Landoll, D. (2006). The Security Risk Assesment Handbook. New York: Auerbach Publication.Search in Google Scholar

2. Wang, P, Da Ruan, Kerre E. (2007). Fuzzy Logic A Spectrum of Theoretical & Practical Issues. Berlin: Springer.10.1007/978-3-540-71258-9Search in Google Scholar

3. Jang, R., Gulley, N. (1997). Fuzzy Logic Toolbox User's Guide. Natick, Massachusetts: The MathWorks, Inc.Search in Google Scholar

4. Chavas, Jean-Paul. (2004). Risk analysis in theory and practice. London: Elsevier Academic Press.Search in Google Scholar

5. Da Ruan. (2000). Fuzzy Sets and Fuzzy Information. Key Selected Papers by Lofti A. Zadeh. Bejing: Bejing Normal University Press.Search in Google Scholar

6. Mcneill, M., Ellen, T. (1994). Fuzzy Logic, a Practical Approach. London: Academic Press.Search in Google Scholar

7. Peltier, Thomas R. (2005). Information security risk analysis. Boca Raton: CRC Press.10.1201/9781420031195Search in Google Scholar

8. Carr, V., Tah, J. H. M. (2001). A fuzzy approach to construction project risk assessment andanalysis: construction project risk management system. London: Advances in Engineering Software.Search in Google Scholar

9. Department of the Army, USA. (2001). FM 3-19.30: Physical Security, Headquarters. Department of the Army, USA.Search in Google Scholar

10. Bojadziev, G., Bojadziev, M. (2007). Fuzzy Logic for Business, Finance and Management. Singapore: World Scientific Publishing.10.1142/6451Search in Google Scholar

eISSN:
1407-6179
ISSN:
1407-6160
Lingua:
Inglese
Frequenza di pubblicazione:
4 volte all'anno
Argomenti della rivista:
Engineering, Introductions and Overviews, other